Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2022 20:08
Static task
static1
Behavioral task
behavioral1
Sample
CJYUAEBL.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
CJYUAEBL.exe
Resource
win10v2004-20220812-en
General
-
Target
CJYUAEBL.exe
-
Size
1010KB
-
MD5
2ae6e69113d98e4f3bb815c21f626496
-
SHA1
78920f0064d350e24812fda6c5658ac6177b5cf5
-
SHA256
0305b3a95aff122c888a200de747a565208ea19494c8257b0c972084141f42c4
-
SHA512
c7afbd664a2eebeeac3bdd01a359ea74da953552cad187682d431f0af754725a08f1135457618618a51bf1e3893a6c3a0c05e68172ee9eefcb020187ab8dfd0e
-
SSDEEP
24576:owfXt2qCbasU3cyK9pNhMhtrjxLF7ZQ/ronBb5:oEcO+9bh+1lLFaMnBb
Malware Config
Extracted
bitrat
1.38
winery.nsupdate.info:5877
-
communication_password
e5ff7c52fb3501484ea7ca8641803415
-
tor_process
tor
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral2/memory/4104-132-0x00000000021F0000-0x000000000221B000-memory.dmp modiloader_stage2 -
resource yara_rule behavioral2/memory/4104-135-0x0000000010410000-0x00000000107F4000-memory.dmp upx behavioral2/memory/4104-136-0x0000000010410000-0x00000000107F4000-memory.dmp upx behavioral2/memory/4072-138-0x0000000010410000-0x00000000107F4000-memory.dmp upx behavioral2/memory/4072-139-0x0000000010410000-0x00000000107F4000-memory.dmp upx behavioral2/memory/4072-141-0x0000000010410000-0x00000000107F4000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Cjyuaebl = "C:\\Users\\Public\\Libraries\\lbeauyjC.url" CJYUAEBL.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 4072 colorcpl.exe 4072 colorcpl.exe 4072 colorcpl.exe 4072 colorcpl.exe 4072 colorcpl.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4104 CJYUAEBL.exe 4104 CJYUAEBL.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 4072 colorcpl.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4072 colorcpl.exe 4072 colorcpl.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 4104 wrote to memory of 4072 4104 CJYUAEBL.exe 83 PID 4104 wrote to memory of 4072 4104 CJYUAEBL.exe 83 PID 4104 wrote to memory of 4072 4104 CJYUAEBL.exe 83 PID 4104 wrote to memory of 4072 4104 CJYUAEBL.exe 83 PID 4104 wrote to memory of 4072 4104 CJYUAEBL.exe 83 PID 4104 wrote to memory of 4072 4104 CJYUAEBL.exe 83 PID 4104 wrote to memory of 4072 4104 CJYUAEBL.exe 83 PID 4104 wrote to memory of 4072 4104 CJYUAEBL.exe 83 PID 4104 wrote to memory of 4072 4104 CJYUAEBL.exe 83 PID 4104 wrote to memory of 4072 4104 CJYUAEBL.exe 83 PID 4104 wrote to memory of 4072 4104 CJYUAEBL.exe 83 PID 4104 wrote to memory of 4072 4104 CJYUAEBL.exe 83 PID 4104 wrote to memory of 4072 4104 CJYUAEBL.exe 83 PID 4104 wrote to memory of 4072 4104 CJYUAEBL.exe 83 PID 4104 wrote to memory of 4072 4104 CJYUAEBL.exe 83 PID 4104 wrote to memory of 4072 4104 CJYUAEBL.exe 83 PID 4104 wrote to memory of 4072 4104 CJYUAEBL.exe 83 PID 4104 wrote to memory of 4072 4104 CJYUAEBL.exe 83 PID 4104 wrote to memory of 4072 4104 CJYUAEBL.exe 83 PID 4104 wrote to memory of 4072 4104 CJYUAEBL.exe 83 PID 4104 wrote to memory of 4072 4104 CJYUAEBL.exe 83 PID 4104 wrote to memory of 4072 4104 CJYUAEBL.exe 83 PID 4104 wrote to memory of 4072 4104 CJYUAEBL.exe 83 PID 4104 wrote to memory of 4072 4104 CJYUAEBL.exe 83 PID 4104 wrote to memory of 4072 4104 CJYUAEBL.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\CJYUAEBL.exe"C:\Users\Admin\AppData\Local\Temp\CJYUAEBL.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Windows\SysWOW64\colorcpl.exeC:\Windows\System32\colorcpl.exe2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4072
-