Analysis
-
max time kernel
185s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
13-12-2022 22:46
Static task
static1
Behavioral task
behavioral1
Sample
ERA.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ERA.exe
Resource
win10v2004-20221111-en
General
-
Target
ERA.exe
-
Size
886KB
-
MD5
aa462529d2aeac2d47d599794e6aa197
-
SHA1
deb061568a3feda4c8a2c19aba853da89d96c3a3
-
SHA256
4a0fc5341e04f28dcef70ca4c6370233993e887baeeab0d507a94a129a0421c6
-
SHA512
6378787105600b1d2aaf7dae995d434f389fc85735c777cb25540082fae52a456c32782030ba02bea54d5fd1ba2841803171848eef440d8c55d4c41d73b72d77
-
SSDEEP
12288:quIa+LnuIlkjgAEysB96kF2SW0BONQe/m3mY6Fap4kruadYaeLw2Ylg:tZ4uIlkjgAEvB5cjnEUap4kya6RxYi
Malware Config
Extracted
bitrat
1.38
winery.nsupdate.info:5877
-
communication_password
e5ff7c52fb3501484ea7ca8641803415
-
tor_process
tor
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4800-132-0x0000000002870000-0x000000000289B000-memory.dmp modiloader_stage2 -
Processes:
resource yara_rule behavioral2/memory/4800-135-0x0000000010410000-0x00000000107F4000-memory.dmp upx behavioral2/memory/4800-136-0x0000000010410000-0x00000000107F4000-memory.dmp upx behavioral2/memory/2104-138-0x0000000010410000-0x00000000107F4000-memory.dmp upx behavioral2/memory/2104-139-0x0000000010410000-0x00000000107F4000-memory.dmp upx behavioral2/memory/2104-140-0x0000000010410000-0x00000000107F4000-memory.dmp upx behavioral2/memory/2104-141-0x0000000010410000-0x00000000107F4000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
ERA.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Lpoovxrz = "C:\\Users\\Public\\Libraries\\zrxvoopL.url" ERA.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
wscript.exepid process 2104 wscript.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
ERA.exepid process 4800 ERA.exe 4800 ERA.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
wscript.exedescription pid process Token: SeShutdownPrivilege 2104 wscript.exe -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
ERA.exedescription pid process target process PID 4800 wrote to memory of 2104 4800 ERA.exe wscript.exe PID 4800 wrote to memory of 2104 4800 ERA.exe wscript.exe PID 4800 wrote to memory of 2104 4800 ERA.exe wscript.exe PID 4800 wrote to memory of 2104 4800 ERA.exe wscript.exe PID 4800 wrote to memory of 2104 4800 ERA.exe wscript.exe PID 4800 wrote to memory of 2104 4800 ERA.exe wscript.exe PID 4800 wrote to memory of 2104 4800 ERA.exe wscript.exe PID 4800 wrote to memory of 2104 4800 ERA.exe wscript.exe PID 4800 wrote to memory of 2104 4800 ERA.exe wscript.exe PID 4800 wrote to memory of 2104 4800 ERA.exe wscript.exe PID 4800 wrote to memory of 2104 4800 ERA.exe wscript.exe PID 4800 wrote to memory of 2104 4800 ERA.exe wscript.exe PID 4800 wrote to memory of 2104 4800 ERA.exe wscript.exe PID 4800 wrote to memory of 2104 4800 ERA.exe wscript.exe PID 4800 wrote to memory of 2104 4800 ERA.exe wscript.exe PID 4800 wrote to memory of 2104 4800 ERA.exe wscript.exe PID 4800 wrote to memory of 2104 4800 ERA.exe wscript.exe PID 4800 wrote to memory of 2104 4800 ERA.exe wscript.exe PID 4800 wrote to memory of 2104 4800 ERA.exe wscript.exe PID 4800 wrote to memory of 2104 4800 ERA.exe wscript.exe PID 4800 wrote to memory of 2104 4800 ERA.exe wscript.exe PID 4800 wrote to memory of 2104 4800 ERA.exe wscript.exe PID 4800 wrote to memory of 2104 4800 ERA.exe wscript.exe PID 4800 wrote to memory of 2104 4800 ERA.exe wscript.exe PID 4800 wrote to memory of 2104 4800 ERA.exe wscript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ERA.exe"C:\Users\Admin\AppData\Local\Temp\ERA.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Windows\SysWOW64\wscript.exeC:\Windows\System32\wscript.exe2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:2104