Analysis

  • max time kernel
    149s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    30-01-2023 04:29

General

  • Target

    c9bfacf4a3cef8e1cc65b1b66d2b94fbf3a54cce4e3a65807df877a274ed75be.exe

  • Size

    982KB

  • MD5

    8d4ca9867e0f2f59057a0a5ab23442de

  • SHA1

    74aaa823e441bcd0e1075652bce2c234f702f8cf

  • SHA256

    c9bfacf4a3cef8e1cc65b1b66d2b94fbf3a54cce4e3a65807df877a274ed75be

  • SHA512

    40c0650470360868cac3624cabbfa7ed7ccbb0954e5f80866825aa87d9a61aca5c6af0d8d2db8617fe1f2265938beb7b6dbf268774de95d5dd0544f484cfe5ba

  • SSDEEP

    24576:wvh/9klHiSFnRdP3QYSel9Z+m8a6rsYShuOAq:gh87j4ax6ghuw

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • UAC bypass 3 TTPs 1 IoCs
  • ModiLoader Second Stage 15 IoCs
  • Executes dropped EXE 2 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies registry class 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c9bfacf4a3cef8e1cc65b1b66d2b94fbf3a54cce4e3a65807df877a274ed75be.exe
    "C:\Users\Admin\AppData\Local\Temp\c9bfacf4a3cef8e1cc65b1b66d2b94fbf3a54cce4e3a65807df877a274ed75be.exe"
    1⤵
    • Checks BIOS information in registry
    • Suspicious use of SetThreadContext
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1400
    • C:\Users\Admin\AppData\Local\Temp\c9bfacf4a3cef8e1cc65b1b66d2b94fbf3a54cce4e3a65807df877a274ed75be.exe
      C:\Users\Admin\AppData\Local\Temp\c9bfacf4a3cef8e1cc65b1b66d2b94fbf3a54cce4e3a65807df877a274ed75be.exe
      2⤵
      • Checks whether UAC is enabled
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1996
      • C:\Windows\mstwain32.exe
        "C:\Windows\mstwain32.exe"
        3⤵
        • Executes dropped EXE
        • Checks BIOS information in registry
        • Suspicious use of SetThreadContext
        • Enumerates system info in registry
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1836
        • C:\Windows\mstwain32.exe
          C:\Windows\mstwain32.exe
          4⤵
          • UAC bypass
          • Executes dropped EXE
          • Adds Run key to start application
          • Checks whether UAC is enabled
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • System policy modification
          PID:1224
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:564

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2292972927-2705560509-2768824231-1000\549b9b645cadfe6bb4bc69cf363c354c_4339b52c-c4ea-4bc4-b41f-93efca473d02

    Filesize

    2KB

    MD5

    f97f9e17eafdd0105a4e11bafde04b40

    SHA1

    ba06a7abe986a61b71889b80a6f9b02b22d40667

    SHA256

    4783424121e6c2f870dc931b374d20c62c764eddc5769d2f536609adc1226abb

    SHA512

    778c4aab55f6f0fe44dbc9a97f53b59ec8ed2e35901f77afebaea57c738ad301412760709ab909b51335ddd7676cd8f8c1410c5751f2ef5cc74282bcd6c5f50e

  • C:\Windows\mstwain32.exe

    Filesize

    982KB

    MD5

    8d4ca9867e0f2f59057a0a5ab23442de

    SHA1

    74aaa823e441bcd0e1075652bce2c234f702f8cf

    SHA256

    c9bfacf4a3cef8e1cc65b1b66d2b94fbf3a54cce4e3a65807df877a274ed75be

    SHA512

    40c0650470360868cac3624cabbfa7ed7ccbb0954e5f80866825aa87d9a61aca5c6af0d8d2db8617fe1f2265938beb7b6dbf268774de95d5dd0544f484cfe5ba

  • C:\Windows\mstwain32.exe

    Filesize

    982KB

    MD5

    8d4ca9867e0f2f59057a0a5ab23442de

    SHA1

    74aaa823e441bcd0e1075652bce2c234f702f8cf

    SHA256

    c9bfacf4a3cef8e1cc65b1b66d2b94fbf3a54cce4e3a65807df877a274ed75be

    SHA512

    40c0650470360868cac3624cabbfa7ed7ccbb0954e5f80866825aa87d9a61aca5c6af0d8d2db8617fe1f2265938beb7b6dbf268774de95d5dd0544f484cfe5ba

  • C:\Windows\mstwain32.exe

    Filesize

    982KB

    MD5

    8d4ca9867e0f2f59057a0a5ab23442de

    SHA1

    74aaa823e441bcd0e1075652bce2c234f702f8cf

    SHA256

    c9bfacf4a3cef8e1cc65b1b66d2b94fbf3a54cce4e3a65807df877a274ed75be

    SHA512

    40c0650470360868cac3624cabbfa7ed7ccbb0954e5f80866825aa87d9a61aca5c6af0d8d2db8617fe1f2265938beb7b6dbf268774de95d5dd0544f484cfe5ba

  • memory/1224-105-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/1224-106-0x0000000000330000-0x0000000000340000-memory.dmp

    Filesize

    64KB

  • memory/1224-104-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/1224-107-0x0000000000460000-0x0000000000465000-memory.dmp

    Filesize

    20KB

  • memory/1224-99-0x0000000000430464-mapping.dmp

  • memory/1224-108-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/1400-54-0x0000000075571000-0x0000000075573000-memory.dmp

    Filesize

    8KB

  • memory/1400-73-0x0000000000400000-0x00000000004AB000-memory.dmp

    Filesize

    684KB

  • memory/1400-55-0x0000000000400000-0x00000000004AB000-memory.dmp

    Filesize

    684KB

  • memory/1836-102-0x0000000000400000-0x00000000004AB000-memory.dmp

    Filesize

    684KB

  • memory/1836-81-0x0000000000400000-0x00000000004AB000-memory.dmp

    Filesize

    684KB

  • memory/1836-77-0x0000000000000000-mapping.dmp

  • memory/1996-66-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/1996-79-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/1996-76-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/1996-75-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/1996-72-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/1996-70-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/1996-71-0x0000000000430464-mapping.dmp

  • memory/1996-68-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/1996-65-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/1996-63-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/1996-61-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/1996-59-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/1996-58-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB