Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-01-2023 04:29

General

  • Target

    c9bfacf4a3cef8e1cc65b1b66d2b94fbf3a54cce4e3a65807df877a274ed75be.exe

  • Size

    982KB

  • MD5

    8d4ca9867e0f2f59057a0a5ab23442de

  • SHA1

    74aaa823e441bcd0e1075652bce2c234f702f8cf

  • SHA256

    c9bfacf4a3cef8e1cc65b1b66d2b94fbf3a54cce4e3a65807df877a274ed75be

  • SHA512

    40c0650470360868cac3624cabbfa7ed7ccbb0954e5f80866825aa87d9a61aca5c6af0d8d2db8617fe1f2265938beb7b6dbf268774de95d5dd0544f484cfe5ba

  • SSDEEP

    24576:wvh/9klHiSFnRdP3QYSel9Z+m8a6rsYShuOAq:gh87j4ax6ghuw

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • UAC bypass 3 TTPs 1 IoCs
  • ModiLoader Second Stage 10 IoCs
  • Executes dropped EXE 2 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies registry class 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c9bfacf4a3cef8e1cc65b1b66d2b94fbf3a54cce4e3a65807df877a274ed75be.exe
    "C:\Users\Admin\AppData\Local\Temp\c9bfacf4a3cef8e1cc65b1b66d2b94fbf3a54cce4e3a65807df877a274ed75be.exe"
    1⤵
    • Checks BIOS information in registry
    • Suspicious use of SetThreadContext
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1048
    • C:\Users\Admin\AppData\Local\Temp\c9bfacf4a3cef8e1cc65b1b66d2b94fbf3a54cce4e3a65807df877a274ed75be.exe
      C:\Users\Admin\AppData\Local\Temp\c9bfacf4a3cef8e1cc65b1b66d2b94fbf3a54cce4e3a65807df877a274ed75be.exe
      2⤵
      • Checks computer location settings
      • Checks whether UAC is enabled
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4764
      • C:\Windows\mstwain32.exe
        "C:\Windows\mstwain32.exe"
        3⤵
        • Executes dropped EXE
        • Checks BIOS information in registry
        • Suspicious use of SetThreadContext
        • Enumerates system info in registry
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1984
        • C:\Windows\mstwain32.exe
          C:\Windows\mstwain32.exe
          4⤵
          • UAC bypass
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Checks whether UAC is enabled
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • System policy modification
          PID:2032
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4392

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2629973501-4017243118-3254762364-1000\c0528c2346cb928a9052304ef3ab8fd4_e32e1c79-b88e-4709-94fb-81034ca3398e

    Filesize

    2KB

    MD5

    8882037a0674a329b5ab8c870e58c422

    SHA1

    fa2b896ce7908548eb54f6897a57dfcc9a333a49

    SHA256

    bf58499bf43bec8d41f04779dac5618a081455a657667c157de019657224fead

    SHA512

    aae711e67cab35a320c533b2b939b1c171f9219b4813292f7ce0a64af785679ddc23dbd61a3d31876558fa19c4e88d3df845242c2210c226fb5d9d3daece6891

  • C:\Windows\mstwain32.exe

    Filesize

    982KB

    MD5

    8d4ca9867e0f2f59057a0a5ab23442de

    SHA1

    74aaa823e441bcd0e1075652bce2c234f702f8cf

    SHA256

    c9bfacf4a3cef8e1cc65b1b66d2b94fbf3a54cce4e3a65807df877a274ed75be

    SHA512

    40c0650470360868cac3624cabbfa7ed7ccbb0954e5f80866825aa87d9a61aca5c6af0d8d2db8617fe1f2265938beb7b6dbf268774de95d5dd0544f484cfe5ba

  • C:\Windows\mstwain32.exe

    Filesize

    982KB

    MD5

    8d4ca9867e0f2f59057a0a5ab23442de

    SHA1

    74aaa823e441bcd0e1075652bce2c234f702f8cf

    SHA256

    c9bfacf4a3cef8e1cc65b1b66d2b94fbf3a54cce4e3a65807df877a274ed75be

    SHA512

    40c0650470360868cac3624cabbfa7ed7ccbb0954e5f80866825aa87d9a61aca5c6af0d8d2db8617fe1f2265938beb7b6dbf268774de95d5dd0544f484cfe5ba

  • C:\Windows\mstwain32.exe

    Filesize

    982KB

    MD5

    8d4ca9867e0f2f59057a0a5ab23442de

    SHA1

    74aaa823e441bcd0e1075652bce2c234f702f8cf

    SHA256

    c9bfacf4a3cef8e1cc65b1b66d2b94fbf3a54cce4e3a65807df877a274ed75be

    SHA512

    40c0650470360868cac3624cabbfa7ed7ccbb0954e5f80866825aa87d9a61aca5c6af0d8d2db8617fe1f2265938beb7b6dbf268774de95d5dd0544f484cfe5ba

  • C:\Windows\ntdtcstp.dll

    Filesize

    11KB

    MD5

    196221b916e29ff0eec2efcd33c52eac

    SHA1

    16f8665beb6fe2cf954153250c39ae90d5cbdaaa

    SHA256

    2f88a767f47fff8fa5f97b59930c175f82fc0f176dee0bfc920057bebfc99211

    SHA512

    8ce80e47f4b7426db7b1079c48088e11a75f613ec25cc99efe50b8d32db930d2fae5c859342b7ec481206e5ada52ee2b05a2b8c6ec38917dd3127bdce1843a12

  • C:\Windows\ntdtcstp.dll

    Filesize

    11KB

    MD5

    196221b916e29ff0eec2efcd33c52eac

    SHA1

    16f8665beb6fe2cf954153250c39ae90d5cbdaaa

    SHA256

    2f88a767f47fff8fa5f97b59930c175f82fc0f176dee0bfc920057bebfc99211

    SHA512

    8ce80e47f4b7426db7b1079c48088e11a75f613ec25cc99efe50b8d32db930d2fae5c859342b7ec481206e5ada52ee2b05a2b8c6ec38917dd3127bdce1843a12

  • memory/1048-138-0x0000000000400000-0x00000000004AB000-memory.dmp

    Filesize

    684KB

  • memory/1048-132-0x0000000000400000-0x00000000004AB000-memory.dmp

    Filesize

    684KB

  • memory/1984-141-0x0000000000000000-mapping.dmp

  • memory/1984-145-0x0000000000400000-0x00000000004AB000-memory.dmp

    Filesize

    684KB

  • memory/1984-153-0x0000000000400000-0x00000000004AB000-memory.dmp

    Filesize

    684KB

  • memory/2032-157-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/2032-158-0x00000000007B0000-0x00000000007C0000-memory.dmp

    Filesize

    64KB

  • memory/2032-159-0x0000000000A70000-0x0000000000A75000-memory.dmp

    Filesize

    20KB

  • memory/2032-149-0x0000000000000000-mapping.dmp

  • memory/2032-160-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/2032-154-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/4764-139-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/4764-144-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/4764-140-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/4764-137-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/4764-136-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/4764-135-0x0000000000000000-mapping.dmp