Analysis

  • max time kernel
    315s
  • max time network
    392s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/12/2022, 17:15

General

  • Target

    99bb89c7ca8d437ca93c4ee8ba4522ce6ffdb311cf8c46a4dd828d87a6ab8bd0.exe

  • Size

    508KB

  • MD5

    19fa3ff91a70ebb08f4c8908a641cc26

  • SHA1

    3a05d25ed1627c6232ca626edef26904144b7ceb

  • SHA256

    99bb89c7ca8d437ca93c4ee8ba4522ce6ffdb311cf8c46a4dd828d87a6ab8bd0

  • SHA512

    6988a2f5abc40c9d7a39d39cb125f7d156bf86b2957d17fe655511053d28657892c51e5ef032a3c3919d1bcad88fe46ccadf14acbce4d8d8e0ed2a264c1d8361

  • SSDEEP

    12288:f30gycnV8kJDAAcS7fQWRHcKcO7pskvvy6fZAY7CTi:f0gvneQ85ifDRxTakny6O/T

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Sets file execution options in registry 2 TTPs 64 IoCs
  • VMProtect packed file 3 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 11 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\99bb89c7ca8d437ca93c4ee8ba4522ce6ffdb311cf8c46a4dd828d87a6ab8bd0.exe
    "C:\Users\Admin\AppData\Local\Temp\99bb89c7ca8d437ca93c4ee8ba4522ce6ffdb311cf8c46a4dd828d87a6ab8bd0.exe"
    1⤵
    • Sets file execution options in registry
    • Checks computer location settings
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4988
    • C:\Temp\2009_server.exe
      "C:\Temp\2009_server.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:2308
      • C:\program files\internet explorer\IEXPLORE.EXE
        "C:\program files\internet explorer\IEXPLORE.EXE"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3420
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3420 CREDAT:17410 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:4472
    • C:\Windows\SysWOW64\Reg.exe
      Reg Delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options" /F
      2⤵
      • Sets file execution options in registry
      PID:3200
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ping 127.0.0.1&&del /f /q /a:- "C:\Users\Admin\AppData\Local\Temp\99bb89c7ca8d437ca93c4ee8ba4522ce6ffdb311cf8c46a4dd828d87a6ab8bd0.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3688
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:3500

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Temp\2009_server.exe

          Filesize

          401KB

          MD5

          01e089843c89e8b729940b0beac7727e

          SHA1

          3c6684a0634fbe238e1c1e0ab4b700f49a129739

          SHA256

          508522746a7b25d609e7dbf6ec2b334f63826d5b6bc9d59274b16d44e475777f

          SHA512

          6ab633f4b1ce107c392523141b49e79cf3292a6d87d095e74807f3593e0883711f1c407a187edd764c3e137095f09306cf557a70728315a1b46ff06f48ac4a73

        • C:\Temp\2009_server.exe

          Filesize

          401KB

          MD5

          01e089843c89e8b729940b0beac7727e

          SHA1

          3c6684a0634fbe238e1c1e0ab4b700f49a129739

          SHA256

          508522746a7b25d609e7dbf6ec2b334f63826d5b6bc9d59274b16d44e475777f

          SHA512

          6ab633f4b1ce107c392523141b49e79cf3292a6d87d095e74807f3593e0883711f1c407a187edd764c3e137095f09306cf557a70728315a1b46ff06f48ac4a73

        • memory/2308-143-0x0000000000400000-0x00000000005E7000-memory.dmp

          Filesize

          1.9MB

        • memory/2308-144-0x0000000000400000-0x00000000005E7000-memory.dmp

          Filesize

          1.9MB

        • memory/4988-132-0x0000000000400000-0x00000000004F1000-memory.dmp

          Filesize

          964KB

        • memory/4988-133-0x0000000000400000-0x00000000004F1000-memory.dmp

          Filesize

          964KB

        • memory/4988-142-0x0000000000400000-0x00000000004F1000-memory.dmp

          Filesize

          964KB