Analysis
-
max time kernel
72s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
16-12-2022 08:31
Static task
static1
Behavioral task
behavioral1
Sample
0305b3a95aff122c888a200de747a565208ea19494c8257b0c972084141f42c4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0305b3a95aff122c888a200de747a565208ea19494c8257b0c972084141f42c4.exe
Resource
win10v2004-20221111-en
General
-
Target
0305b3a95aff122c888a200de747a565208ea19494c8257b0c972084141f42c4.exe
-
Size
1010KB
-
MD5
2ae6e69113d98e4f3bb815c21f626496
-
SHA1
78920f0064d350e24812fda6c5658ac6177b5cf5
-
SHA256
0305b3a95aff122c888a200de747a565208ea19494c8257b0c972084141f42c4
-
SHA512
c7afbd664a2eebeeac3bdd01a359ea74da953552cad187682d431f0af754725a08f1135457618618a51bf1e3893a6c3a0c05e68172ee9eefcb020187ab8dfd0e
-
SSDEEP
24576:owfXt2qCbasU3cyK9pNhMhtrjxLF7ZQ/ronBb5:oEcO+9bh+1lLFaMnBb
Malware Config
Extracted
bitrat
1.38
winery.nsupdate.info:5877
-
communication_password
e5ff7c52fb3501484ea7ca8641803415
-
tor_process
tor
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral2/memory/4576-132-0x00000000028A0000-0x00000000028CB000-memory.dmp modiloader_stage2 -
Blocklisted process makes network request 1 IoCs
flow pid Process 22 308 wscript.exe -
resource yara_rule behavioral2/memory/4576-135-0x0000000010410000-0x00000000107F4000-memory.dmp upx behavioral2/memory/4576-136-0x0000000010410000-0x00000000107F4000-memory.dmp upx behavioral2/memory/308-138-0x0000000010410000-0x00000000107F4000-memory.dmp upx behavioral2/memory/308-139-0x0000000010410000-0x00000000107F4000-memory.dmp upx behavioral2/memory/308-141-0x0000000010410000-0x00000000107F4000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Cjyuaebl = "C:\\Users\\Public\\Libraries\\lbeauyjC.url" 0305b3a95aff122c888a200de747a565208ea19494c8257b0c972084141f42c4.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 308 wscript.exe 308 wscript.exe 308 wscript.exe 308 wscript.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4576 0305b3a95aff122c888a200de747a565208ea19494c8257b0c972084141f42c4.exe 4576 0305b3a95aff122c888a200de747a565208ea19494c8257b0c972084141f42c4.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 308 wscript.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 308 wscript.exe 308 wscript.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 4576 wrote to memory of 308 4576 0305b3a95aff122c888a200de747a565208ea19494c8257b0c972084141f42c4.exe 87 PID 4576 wrote to memory of 308 4576 0305b3a95aff122c888a200de747a565208ea19494c8257b0c972084141f42c4.exe 87 PID 4576 wrote to memory of 308 4576 0305b3a95aff122c888a200de747a565208ea19494c8257b0c972084141f42c4.exe 87 PID 4576 wrote to memory of 308 4576 0305b3a95aff122c888a200de747a565208ea19494c8257b0c972084141f42c4.exe 87 PID 4576 wrote to memory of 308 4576 0305b3a95aff122c888a200de747a565208ea19494c8257b0c972084141f42c4.exe 87 PID 4576 wrote to memory of 308 4576 0305b3a95aff122c888a200de747a565208ea19494c8257b0c972084141f42c4.exe 87 PID 4576 wrote to memory of 308 4576 0305b3a95aff122c888a200de747a565208ea19494c8257b0c972084141f42c4.exe 87 PID 4576 wrote to memory of 308 4576 0305b3a95aff122c888a200de747a565208ea19494c8257b0c972084141f42c4.exe 87 PID 4576 wrote to memory of 308 4576 0305b3a95aff122c888a200de747a565208ea19494c8257b0c972084141f42c4.exe 87 PID 4576 wrote to memory of 308 4576 0305b3a95aff122c888a200de747a565208ea19494c8257b0c972084141f42c4.exe 87 PID 4576 wrote to memory of 308 4576 0305b3a95aff122c888a200de747a565208ea19494c8257b0c972084141f42c4.exe 87 PID 4576 wrote to memory of 308 4576 0305b3a95aff122c888a200de747a565208ea19494c8257b0c972084141f42c4.exe 87 PID 4576 wrote to memory of 308 4576 0305b3a95aff122c888a200de747a565208ea19494c8257b0c972084141f42c4.exe 87 PID 4576 wrote to memory of 308 4576 0305b3a95aff122c888a200de747a565208ea19494c8257b0c972084141f42c4.exe 87 PID 4576 wrote to memory of 308 4576 0305b3a95aff122c888a200de747a565208ea19494c8257b0c972084141f42c4.exe 87 PID 4576 wrote to memory of 308 4576 0305b3a95aff122c888a200de747a565208ea19494c8257b0c972084141f42c4.exe 87 PID 4576 wrote to memory of 308 4576 0305b3a95aff122c888a200de747a565208ea19494c8257b0c972084141f42c4.exe 87 PID 4576 wrote to memory of 308 4576 0305b3a95aff122c888a200de747a565208ea19494c8257b0c972084141f42c4.exe 87 PID 4576 wrote to memory of 308 4576 0305b3a95aff122c888a200de747a565208ea19494c8257b0c972084141f42c4.exe 87 PID 4576 wrote to memory of 308 4576 0305b3a95aff122c888a200de747a565208ea19494c8257b0c972084141f42c4.exe 87 PID 4576 wrote to memory of 308 4576 0305b3a95aff122c888a200de747a565208ea19494c8257b0c972084141f42c4.exe 87 PID 4576 wrote to memory of 308 4576 0305b3a95aff122c888a200de747a565208ea19494c8257b0c972084141f42c4.exe 87 PID 4576 wrote to memory of 308 4576 0305b3a95aff122c888a200de747a565208ea19494c8257b0c972084141f42c4.exe 87 PID 4576 wrote to memory of 308 4576 0305b3a95aff122c888a200de747a565208ea19494c8257b0c972084141f42c4.exe 87 PID 4576 wrote to memory of 308 4576 0305b3a95aff122c888a200de747a565208ea19494c8257b0c972084141f42c4.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\0305b3a95aff122c888a200de747a565208ea19494c8257b0c972084141f42c4.exe"C:\Users\Admin\AppData\Local\Temp\0305b3a95aff122c888a200de747a565208ea19494c8257b0c972084141f42c4.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Windows\SysWOW64\wscript.exeC:\Windows\System32\wscript.exe2⤵
- Blocklisted process makes network request
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:308
-