Analysis
-
max time kernel
178s -
max time network
190s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2022 23:34
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.Trojan-gen.5467.15765.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Win32.Trojan-gen.5467.15765.exe
Resource
win10v2004-20221111-en
General
-
Target
SecuriteInfo.com.Win32.Trojan-gen.5467.15765.exe
-
Size
1010KB
-
MD5
2ae6e69113d98e4f3bb815c21f626496
-
SHA1
78920f0064d350e24812fda6c5658ac6177b5cf5
-
SHA256
0305b3a95aff122c888a200de747a565208ea19494c8257b0c972084141f42c4
-
SHA512
c7afbd664a2eebeeac3bdd01a359ea74da953552cad187682d431f0af754725a08f1135457618618a51bf1e3893a6c3a0c05e68172ee9eefcb020187ab8dfd0e
-
SSDEEP
24576:owfXt2qCbasU3cyK9pNhMhtrjxLF7ZQ/ronBb5:oEcO+9bh+1lLFaMnBb
Malware Config
Extracted
bitrat
1.38
winery.nsupdate.info:5877
-
communication_password
e5ff7c52fb3501484ea7ca8641803415
-
tor_process
tor
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1172-132-0x00000000021F0000-0x000000000221B000-memory.dmp modiloader_stage2 -
Processes:
resource yara_rule behavioral2/memory/1172-135-0x0000000010410000-0x00000000107F4000-memory.dmp upx behavioral2/memory/1172-136-0x0000000010410000-0x00000000107F4000-memory.dmp upx behavioral2/memory/2784-138-0x0000000010410000-0x00000000107F4000-memory.dmp upx behavioral2/memory/2784-139-0x0000000010410000-0x00000000107F4000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
SecuriteInfo.com.Win32.Trojan-gen.5467.15765.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Cjyuaebl = "C:\\Users\\Public\\Libraries\\lbeauyjC.url" SecuriteInfo.com.Win32.Trojan-gen.5467.15765.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
colorcpl.exepid process 2784 colorcpl.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
SecuriteInfo.com.Win32.Trojan-gen.5467.15765.exepid process 1172 SecuriteInfo.com.Win32.Trojan-gen.5467.15765.exe 1172 SecuriteInfo.com.Win32.Trojan-gen.5467.15765.exe -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
SecuriteInfo.com.Win32.Trojan-gen.5467.15765.exedescription pid process target process PID 1172 wrote to memory of 2784 1172 SecuriteInfo.com.Win32.Trojan-gen.5467.15765.exe colorcpl.exe PID 1172 wrote to memory of 2784 1172 SecuriteInfo.com.Win32.Trojan-gen.5467.15765.exe colorcpl.exe PID 1172 wrote to memory of 2784 1172 SecuriteInfo.com.Win32.Trojan-gen.5467.15765.exe colorcpl.exe PID 1172 wrote to memory of 2784 1172 SecuriteInfo.com.Win32.Trojan-gen.5467.15765.exe colorcpl.exe PID 1172 wrote to memory of 2784 1172 SecuriteInfo.com.Win32.Trojan-gen.5467.15765.exe colorcpl.exe PID 1172 wrote to memory of 2784 1172 SecuriteInfo.com.Win32.Trojan-gen.5467.15765.exe colorcpl.exe PID 1172 wrote to memory of 2784 1172 SecuriteInfo.com.Win32.Trojan-gen.5467.15765.exe colorcpl.exe PID 1172 wrote to memory of 2784 1172 SecuriteInfo.com.Win32.Trojan-gen.5467.15765.exe colorcpl.exe PID 1172 wrote to memory of 2784 1172 SecuriteInfo.com.Win32.Trojan-gen.5467.15765.exe colorcpl.exe PID 1172 wrote to memory of 2784 1172 SecuriteInfo.com.Win32.Trojan-gen.5467.15765.exe colorcpl.exe PID 1172 wrote to memory of 2784 1172 SecuriteInfo.com.Win32.Trojan-gen.5467.15765.exe colorcpl.exe PID 1172 wrote to memory of 2784 1172 SecuriteInfo.com.Win32.Trojan-gen.5467.15765.exe colorcpl.exe PID 1172 wrote to memory of 2784 1172 SecuriteInfo.com.Win32.Trojan-gen.5467.15765.exe colorcpl.exe PID 1172 wrote to memory of 2784 1172 SecuriteInfo.com.Win32.Trojan-gen.5467.15765.exe colorcpl.exe PID 1172 wrote to memory of 2784 1172 SecuriteInfo.com.Win32.Trojan-gen.5467.15765.exe colorcpl.exe PID 1172 wrote to memory of 2784 1172 SecuriteInfo.com.Win32.Trojan-gen.5467.15765.exe colorcpl.exe PID 1172 wrote to memory of 2784 1172 SecuriteInfo.com.Win32.Trojan-gen.5467.15765.exe colorcpl.exe PID 1172 wrote to memory of 2784 1172 SecuriteInfo.com.Win32.Trojan-gen.5467.15765.exe colorcpl.exe PID 1172 wrote to memory of 2784 1172 SecuriteInfo.com.Win32.Trojan-gen.5467.15765.exe colorcpl.exe PID 1172 wrote to memory of 2784 1172 SecuriteInfo.com.Win32.Trojan-gen.5467.15765.exe colorcpl.exe PID 1172 wrote to memory of 2784 1172 SecuriteInfo.com.Win32.Trojan-gen.5467.15765.exe colorcpl.exe PID 1172 wrote to memory of 2784 1172 SecuriteInfo.com.Win32.Trojan-gen.5467.15765.exe colorcpl.exe PID 1172 wrote to memory of 2784 1172 SecuriteInfo.com.Win32.Trojan-gen.5467.15765.exe colorcpl.exe PID 1172 wrote to memory of 2784 1172 SecuriteInfo.com.Win32.Trojan-gen.5467.15765.exe colorcpl.exe PID 1172 wrote to memory of 2784 1172 SecuriteInfo.com.Win32.Trojan-gen.5467.15765.exe colorcpl.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.Trojan-gen.5467.15765.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.Trojan-gen.5467.15765.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Windows\SysWOW64\colorcpl.exeC:\Windows\System32\colorcpl.exe2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2784
-