Analysis
-
max time kernel
320s -
max time network
345s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
08-12-2022 19:42
Static task
static1
Behavioral task
behavioral1
Sample
ERA_1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ERA_1.exe
Resource
win10v2004-20221111-en
General
-
Target
ERA_1.exe
-
Size
862KB
-
MD5
84bf18cdc14d7e2c5311ff6cd071a0dc
-
SHA1
a784ef5651e7e1530d4e77ab9f7f3507b51d9e67
-
SHA256
f53107b892a50e33ff130e01cf391a2b69524dbe09b75cc13192365bbd6eda11
-
SHA512
97434045c4c0c4d82296c668ec01a8ae31a9eee9bfba7db6f2d314f1574d3ee950b6a7566a0faa313a1e396541dff76be4cedac8d96bd342ed8783d1f7dc4c0d
-
SSDEEP
12288:fSj5lclcaywFMtTPWQOQSJU3FtJlpCBIUQZC8fRuHT6Kk/RqIkr:fSVKFp6rfn/VXPCyE8fMuqI
Malware Config
Extracted
bitrat
1.38
winery.nsupdate.info:5877
-
communication_password
e5ff7c52fb3501484ea7ca8641803415
-
tor_process
tor
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
Processes:
resource yara_rule behavioral2/memory/100-132-0x0000000003E90000-0x0000000003EBB000-memory.dmp modiloader_stage2 -
Processes:
resource yara_rule behavioral2/memory/100-135-0x0000000010410000-0x00000000107F4000-memory.dmp upx behavioral2/memory/100-136-0x0000000010410000-0x00000000107F4000-memory.dmp upx behavioral2/memory/4332-139-0x0000000010410000-0x00000000107F4000-memory.dmp upx behavioral2/memory/4332-138-0x0000000010410000-0x00000000107F4000-memory.dmp upx behavioral2/memory/4332-140-0x0000000010410000-0x00000000107F4000-memory.dmp upx behavioral2/memory/4332-141-0x0000000010410000-0x00000000107F4000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
ERA_1.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Kqrihjva = "C:\\Users\\Public\\Libraries\\avjhirqK.url" ERA_1.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
wscript.exepid process 4332 wscript.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
ERA_1.exepid process 100 ERA_1.exe 100 ERA_1.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
wscript.exedescription pid process Token: SeShutdownPrivilege 4332 wscript.exe -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
ERA_1.exedescription pid process target process PID 100 wrote to memory of 4332 100 ERA_1.exe wscript.exe PID 100 wrote to memory of 4332 100 ERA_1.exe wscript.exe PID 100 wrote to memory of 4332 100 ERA_1.exe wscript.exe PID 100 wrote to memory of 4332 100 ERA_1.exe wscript.exe PID 100 wrote to memory of 4332 100 ERA_1.exe wscript.exe PID 100 wrote to memory of 4332 100 ERA_1.exe wscript.exe PID 100 wrote to memory of 4332 100 ERA_1.exe wscript.exe PID 100 wrote to memory of 4332 100 ERA_1.exe wscript.exe PID 100 wrote to memory of 4332 100 ERA_1.exe wscript.exe PID 100 wrote to memory of 4332 100 ERA_1.exe wscript.exe PID 100 wrote to memory of 4332 100 ERA_1.exe wscript.exe PID 100 wrote to memory of 4332 100 ERA_1.exe wscript.exe PID 100 wrote to memory of 4332 100 ERA_1.exe wscript.exe PID 100 wrote to memory of 4332 100 ERA_1.exe wscript.exe PID 100 wrote to memory of 4332 100 ERA_1.exe wscript.exe PID 100 wrote to memory of 4332 100 ERA_1.exe wscript.exe PID 100 wrote to memory of 4332 100 ERA_1.exe wscript.exe PID 100 wrote to memory of 4332 100 ERA_1.exe wscript.exe PID 100 wrote to memory of 4332 100 ERA_1.exe wscript.exe PID 100 wrote to memory of 4332 100 ERA_1.exe wscript.exe PID 100 wrote to memory of 4332 100 ERA_1.exe wscript.exe PID 100 wrote to memory of 4332 100 ERA_1.exe wscript.exe PID 100 wrote to memory of 4332 100 ERA_1.exe wscript.exe PID 100 wrote to memory of 4332 100 ERA_1.exe wscript.exe PID 100 wrote to memory of 4332 100 ERA_1.exe wscript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ERA_1.exe"C:\Users\Admin\AppData\Local\Temp\ERA_1.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:100 -
C:\Windows\SysWOW64\wscript.exeC:\Windows\System32\wscript.exe2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:4332