Analysis
-
max time kernel
149s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 16:16
Behavioral task
behavioral1
Sample
b57aae31d652603c8b4452227becf1edcdbc851d9f03ded8ac567a3a70060783.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b57aae31d652603c8b4452227becf1edcdbc851d9f03ded8ac567a3a70060783.exe
Resource
win10v2004-20221111-en
General
-
Target
b57aae31d652603c8b4452227becf1edcdbc851d9f03ded8ac567a3a70060783.exe
-
Size
400KB
-
MD5
f574a0b3535a2e36cd5a49e5d5d4873a
-
SHA1
94590c998a2d60bb8407c8fe1cea45aa8b88c31e
-
SHA256
b57aae31d652603c8b4452227becf1edcdbc851d9f03ded8ac567a3a70060783
-
SHA512
bc984eaa2ac6cb7b340a8e7a455989854914e74f942cb82445afb784a216756ad5b23bdaa03adf1c154d10b6ef23dacd87ff03a7fb79f3535fb4e1f68e9bb0df
-
SSDEEP
12288:g1PO8MeQh81uhNmq+jhfgKBRKnb/ZPSUuXzE:gPO8MeQS143+jhfjonb/Z6jI
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" mstwain32.exe -
ModiLoader Second Stage 6 IoCs
resource yara_rule behavioral1/memory/1268-70-0x0000000000400000-0x000000000044F000-memory.dmp modiloader_stage2 behavioral1/memory/1268-71-0x0000000000400000-0x000000000044F000-memory.dmp modiloader_stage2 behavioral1/memory/1268-75-0x0000000000400000-0x000000000044F000-memory.dmp modiloader_stage2 behavioral1/memory/304-85-0x0000000000400000-0x000000000044F000-memory.dmp modiloader_stage2 behavioral1/memory/304-87-0x0000000000400000-0x000000000044F000-memory.dmp modiloader_stage2 behavioral1/memory/304-88-0x0000000000400000-0x000000000044F000-memory.dmp modiloader_stage2 -
Executes dropped EXE 4 IoCs
pid Process 1756 son.exe 1268 son.exe 828 mstwain32.exe 304 mstwain32.exe -
resource yara_rule behavioral1/memory/1956-59-0x0000000000400000-0x00000000004B2000-memory.dmp upx behavioral1/memory/1268-64-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral1/memory/1268-69-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral1/memory/1268-70-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral1/memory/1268-71-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral1/memory/1268-75-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral1/memory/304-84-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral1/memory/304-85-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral1/memory/304-87-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral1/memory/304-88-0x0000000000400000-0x000000000044F000-memory.dmp upx -
Loads dropped DLL 4 IoCs
pid Process 1956 b57aae31d652603c8b4452227becf1edcdbc851d9f03ded8ac567a3a70060783.exe 1956 b57aae31d652603c8b4452227becf1edcdbc851d9f03ded8ac567a3a70060783.exe 1756 son.exe 1268 son.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ mstwain32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\mstwain32 = "C:\\Windows\\mstwain32.exe" mstwain32.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA son.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mstwain32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" mstwain32.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1956-59-0x0000000000400000-0x00000000004B2000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1756 set thread context of 1268 1756 son.exe 30 PID 828 set thread context of 304 828 mstwain32.exe 36 -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\mstwain32.exe son.exe File opened for modification C:\Windows\mstwain32.exe son.exe File created C:\Windows\ntdtcstp.dll mstwain32.exe File created C:\Windows\cmsetac.dll mstwain32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1268 son.exe Token: SeBackupPrivilege 1772 vssvc.exe Token: SeRestorePrivilege 1772 vssvc.exe Token: SeAuditPrivilege 1772 vssvc.exe Token: SeDebugPrivilege 304 mstwain32.exe Token: SeDebugPrivilege 304 mstwain32.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1956 b57aae31d652603c8b4452227becf1edcdbc851d9f03ded8ac567a3a70060783.exe 1956 b57aae31d652603c8b4452227becf1edcdbc851d9f03ded8ac567a3a70060783.exe 1956 b57aae31d652603c8b4452227becf1edcdbc851d9f03ded8ac567a3a70060783.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1956 b57aae31d652603c8b4452227becf1edcdbc851d9f03ded8ac567a3a70060783.exe 1956 b57aae31d652603c8b4452227becf1edcdbc851d9f03ded8ac567a3a70060783.exe 1956 b57aae31d652603c8b4452227becf1edcdbc851d9f03ded8ac567a3a70060783.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 304 mstwain32.exe 304 mstwain32.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1956 wrote to memory of 1756 1956 b57aae31d652603c8b4452227becf1edcdbc851d9f03ded8ac567a3a70060783.exe 28 PID 1956 wrote to memory of 1756 1956 b57aae31d652603c8b4452227becf1edcdbc851d9f03ded8ac567a3a70060783.exe 28 PID 1956 wrote to memory of 1756 1956 b57aae31d652603c8b4452227becf1edcdbc851d9f03ded8ac567a3a70060783.exe 28 PID 1956 wrote to memory of 1756 1956 b57aae31d652603c8b4452227becf1edcdbc851d9f03ded8ac567a3a70060783.exe 28 PID 1756 wrote to memory of 1268 1756 son.exe 30 PID 1756 wrote to memory of 1268 1756 son.exe 30 PID 1756 wrote to memory of 1268 1756 son.exe 30 PID 1756 wrote to memory of 1268 1756 son.exe 30 PID 1756 wrote to memory of 1268 1756 son.exe 30 PID 1756 wrote to memory of 1268 1756 son.exe 30 PID 1268 wrote to memory of 828 1268 son.exe 34 PID 1268 wrote to memory of 828 1268 son.exe 34 PID 1268 wrote to memory of 828 1268 son.exe 34 PID 1268 wrote to memory of 828 1268 son.exe 34 PID 828 wrote to memory of 304 828 mstwain32.exe 36 PID 828 wrote to memory of 304 828 mstwain32.exe 36 PID 828 wrote to memory of 304 828 mstwain32.exe 36 PID 828 wrote to memory of 304 828 mstwain32.exe 36 PID 828 wrote to memory of 304 828 mstwain32.exe 36 PID 828 wrote to memory of 304 828 mstwain32.exe 36 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" mstwain32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b57aae31d652603c8b4452227becf1edcdbc851d9f03ded8ac567a3a70060783.exe"C:\Users\Admin\AppData\Local\Temp\b57aae31d652603c8b4452227becf1edcdbc851d9f03ded8ac567a3a70060783.exe"1⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\son.exeC:\Users\Admin\AppData\Local\Temp/son.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\son.exeC:\Users\Admin\AppData\Local\Temp\son.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\mstwain32.exe"C:\Windows\mstwain32.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Windows\mstwain32.exeC:\Windows\mstwain32.exe5⤵
- UAC bypass
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:304
-
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1772
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128KB
MD5789117b67b82e99d4a2047d393fa676f
SHA18367e221345959fa5a8c06b0f0c9cb13d08df056
SHA256546ee5556fcec4d9ccd2baf25284b9e36eb42dc05315854b4f2d58a2692539a0
SHA512f8de6d79a05bcbcd53d0e3db78967b16b7488db16b82f2486a298ff36e5614155639a8fdbbce4495d9c8b938aa8f34ee60d61bf3f8cabffcea50edada9d28852
-
Filesize
128KB
MD5789117b67b82e99d4a2047d393fa676f
SHA18367e221345959fa5a8c06b0f0c9cb13d08df056
SHA256546ee5556fcec4d9ccd2baf25284b9e36eb42dc05315854b4f2d58a2692539a0
SHA512f8de6d79a05bcbcd53d0e3db78967b16b7488db16b82f2486a298ff36e5614155639a8fdbbce4495d9c8b938aa8f34ee60d61bf3f8cabffcea50edada9d28852
-
Filesize
128KB
MD5789117b67b82e99d4a2047d393fa676f
SHA18367e221345959fa5a8c06b0f0c9cb13d08df056
SHA256546ee5556fcec4d9ccd2baf25284b9e36eb42dc05315854b4f2d58a2692539a0
SHA512f8de6d79a05bcbcd53d0e3db78967b16b7488db16b82f2486a298ff36e5614155639a8fdbbce4495d9c8b938aa8f34ee60d61bf3f8cabffcea50edada9d28852
-
Filesize
128KB
MD5789117b67b82e99d4a2047d393fa676f
SHA18367e221345959fa5a8c06b0f0c9cb13d08df056
SHA256546ee5556fcec4d9ccd2baf25284b9e36eb42dc05315854b4f2d58a2692539a0
SHA512f8de6d79a05bcbcd53d0e3db78967b16b7488db16b82f2486a298ff36e5614155639a8fdbbce4495d9c8b938aa8f34ee60d61bf3f8cabffcea50edada9d28852
-
Filesize
128KB
MD5789117b67b82e99d4a2047d393fa676f
SHA18367e221345959fa5a8c06b0f0c9cb13d08df056
SHA256546ee5556fcec4d9ccd2baf25284b9e36eb42dc05315854b4f2d58a2692539a0
SHA512f8de6d79a05bcbcd53d0e3db78967b16b7488db16b82f2486a298ff36e5614155639a8fdbbce4495d9c8b938aa8f34ee60d61bf3f8cabffcea50edada9d28852
-
Filesize
128KB
MD5789117b67b82e99d4a2047d393fa676f
SHA18367e221345959fa5a8c06b0f0c9cb13d08df056
SHA256546ee5556fcec4d9ccd2baf25284b9e36eb42dc05315854b4f2d58a2692539a0
SHA512f8de6d79a05bcbcd53d0e3db78967b16b7488db16b82f2486a298ff36e5614155639a8fdbbce4495d9c8b938aa8f34ee60d61bf3f8cabffcea50edada9d28852
-
Filesize
128KB
MD5789117b67b82e99d4a2047d393fa676f
SHA18367e221345959fa5a8c06b0f0c9cb13d08df056
SHA256546ee5556fcec4d9ccd2baf25284b9e36eb42dc05315854b4f2d58a2692539a0
SHA512f8de6d79a05bcbcd53d0e3db78967b16b7488db16b82f2486a298ff36e5614155639a8fdbbce4495d9c8b938aa8f34ee60d61bf3f8cabffcea50edada9d28852
-
Filesize
128KB
MD5789117b67b82e99d4a2047d393fa676f
SHA18367e221345959fa5a8c06b0f0c9cb13d08df056
SHA256546ee5556fcec4d9ccd2baf25284b9e36eb42dc05315854b4f2d58a2692539a0
SHA512f8de6d79a05bcbcd53d0e3db78967b16b7488db16b82f2486a298ff36e5614155639a8fdbbce4495d9c8b938aa8f34ee60d61bf3f8cabffcea50edada9d28852
-
Filesize
128KB
MD5789117b67b82e99d4a2047d393fa676f
SHA18367e221345959fa5a8c06b0f0c9cb13d08df056
SHA256546ee5556fcec4d9ccd2baf25284b9e36eb42dc05315854b4f2d58a2692539a0
SHA512f8de6d79a05bcbcd53d0e3db78967b16b7488db16b82f2486a298ff36e5614155639a8fdbbce4495d9c8b938aa8f34ee60d61bf3f8cabffcea50edada9d28852
-
Filesize
128KB
MD5789117b67b82e99d4a2047d393fa676f
SHA18367e221345959fa5a8c06b0f0c9cb13d08df056
SHA256546ee5556fcec4d9ccd2baf25284b9e36eb42dc05315854b4f2d58a2692539a0
SHA512f8de6d79a05bcbcd53d0e3db78967b16b7488db16b82f2486a298ff36e5614155639a8fdbbce4495d9c8b938aa8f34ee60d61bf3f8cabffcea50edada9d28852