Analysis
-
max time kernel
146s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2022 20:48
Static task
static1
Behavioral task
behavioral1
Sample
efeee7ded7860b291175a82f7bb1f90fa716d0ecf62e4990051bebd17fcdbe3d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
efeee7ded7860b291175a82f7bb1f90fa716d0ecf62e4990051bebd17fcdbe3d.exe
Resource
win10v2004-20220812-en
General
-
Target
efeee7ded7860b291175a82f7bb1f90fa716d0ecf62e4990051bebd17fcdbe3d.exe
-
Size
584KB
-
MD5
6b3ba129aea011182f92f249c3fcd453
-
SHA1
fffddd1ceee89595bc45b313c874acfa73bb417f
-
SHA256
efeee7ded7860b291175a82f7bb1f90fa716d0ecf62e4990051bebd17fcdbe3d
-
SHA512
644d5ac5d1b95c884efbb8ff38835f1f1cb7adc6e7b5620e8c4566f0d97ad999ce82208e5412ef0e748e4c4181264adeb29d34fbae2c740f621619c121300ac7
-
SSDEEP
12288:N9I2iW1DZZ/KvaNU5pyJzZrNNwRr0boVtsZGp4Lq0Az:N2NW1DZkdyJzZZyRrketsUF
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 2 IoCs
Processes:
resource yara_rule behavioral2/memory/5044-145-0x0000000000400000-0x00000000004EB000-memory.dmp modiloader_stage2 behavioral2/memory/5044-146-0x0000000000400000-0x00000000004EB000-memory.dmp modiloader_stage2 -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
efeee7ded7860b291175a82f7bb1f90fa716d0ecf62e4990051bebd17fcdbe3d.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion efeee7ded7860b291175a82f7bb1f90fa716d0ecf62e4990051bebd17fcdbe3d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate efeee7ded7860b291175a82f7bb1f90fa716d0ecf62e4990051bebd17fcdbe3d.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1952 5044 WerFault.exe efeee7ded7860b291175a82f7bb1f90fa716d0ecf62e4990051bebd17fcdbe3d.exe -
Modifies registry class 12 IoCs
Processes:
efeee7ded7860b291175a82f7bb1f90fa716d0ecf62e4990051bebd17fcdbe3d.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\ProgId efeee7ded7860b291175a82f7bb1f90fa716d0ecf62e4990051bebd17fcdbe3d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\ProgId\ = "System.Collections.SortedList" efeee7ded7860b291175a82f7bb1f90fa716d0ecf62e4990051bebd17fcdbe3d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\ = "System.Collections.SortedList" efeee7ded7860b291175a82f7bb1f90fa716d0ecf62e4990051bebd17fcdbe3d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\Implemented Categories\{62C8FE65-4EBB-45E7-B440-6E39B2CDBF29} efeee7ded7860b291175a82f7bb1f90fa716d0ecf62e4990051bebd17fcdbe3d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\InprocServer32 efeee7ded7860b291175a82f7bb1f90fa716d0ecf62e4990051bebd17fcdbe3d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\InprocServer32\Assembly = "mscorlib, Version=1.0.5000.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" efeee7ded7860b291175a82f7bb1f90fa716d0ecf62e4990051bebd17fcdbe3d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\InprocServer32\Class = "System.Collections.SortedList" efeee7ded7860b291175a82f7bb1f90fa716d0ecf62e4990051bebd17fcdbe3d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\InprocServer32\ThreadingModel = "Both" efeee7ded7860b291175a82f7bb1f90fa716d0ecf62e4990051bebd17fcdbe3d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA} efeee7ded7860b291175a82f7bb1f90fa716d0ecf62e4990051bebd17fcdbe3d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\Implemented Categories efeee7ded7860b291175a82f7bb1f90fa716d0ecf62e4990051bebd17fcdbe3d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\InprocServer32\ = "C:\\Windows\\SysWOW64\\mscoree.dll" efeee7ded7860b291175a82f7bb1f90fa716d0ecf62e4990051bebd17fcdbe3d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\InprocServer32\RuntimeVersion = "v1.1.4322" efeee7ded7860b291175a82f7bb1f90fa716d0ecf62e4990051bebd17fcdbe3d.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
efeee7ded7860b291175a82f7bb1f90fa716d0ecf62e4990051bebd17fcdbe3d.exedescription pid process Token: 33 5044 efeee7ded7860b291175a82f7bb1f90fa716d0ecf62e4990051bebd17fcdbe3d.exe Token: SeIncBasePriorityPrivilege 5044 efeee7ded7860b291175a82f7bb1f90fa716d0ecf62e4990051bebd17fcdbe3d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\efeee7ded7860b291175a82f7bb1f90fa716d0ecf62e4990051bebd17fcdbe3d.exe"C:\Users\Admin\AppData\Local\Temp\efeee7ded7860b291175a82f7bb1f90fa716d0ecf62e4990051bebd17fcdbe3d.exe"1⤵
- Checks BIOS information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5044 -s 10842⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 5044 -ip 50441⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/5044-133-0x0000000000400000-0x00000000004EB000-memory.dmpFilesize
940KB
-
memory/5044-134-0x0000000000720000-0x0000000000771000-memory.dmpFilesize
324KB
-
memory/5044-139-0x0000000000721000-0x0000000000754000-memory.dmpFilesize
204KB
-
memory/5044-141-0x0000000000400000-0x00000000004EB000-memory.dmpFilesize
940KB
-
memory/5044-142-0x0000000000400000-0x00000000004EB000-memory.dmpFilesize
940KB
-
memory/5044-140-0x0000000000400000-0x00000000004EB000-memory.dmpFilesize
940KB
-
memory/5044-143-0x0000000000400000-0x00000000004EB000-memory.dmpFilesize
940KB
-
memory/5044-144-0x0000000000400000-0x00000000004EB000-memory.dmpFilesize
940KB
-
memory/5044-145-0x0000000000400000-0x00000000004EB000-memory.dmpFilesize
940KB
-
memory/5044-146-0x0000000000400000-0x00000000004EB000-memory.dmpFilesize
940KB