Analysis

  • max time kernel
    147s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    15-02-2023 05:07

General

  • Target

    Payment_Advice/Payment_Advice (SECURED)/Payment_Advice - Copy.exe

  • Size

    884KB

  • MD5

    7e32d4a4c1bbc8a01a87d00cad0c6551

  • SHA1

    1bfdf5697335531398f13300a912979dd146b99a

  • SHA256

    caf42d835224609c61dcc1b6ddfcf517e47088e750ee67b16508c4fb2fdc5e6b

  • SHA512

    88a42409399b4a6a03350d51181964a6922c16b83a17f7cd11bdd414fc72ad8d6078de5d4a5c866a7397b8c069a67839c34ea4125e97e1270898a8fb3b43da7c

  • SSDEEP

    12288:Cb8A+lyMML0gN55kXFyqf0bGBvGoE3IhAf1nAhglR:C4ZzML0gN5WXFaK9GoEHf1nAhglR

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1244
    • C:\Users\Admin\AppData\Local\Temp\Payment_Advice\Payment_Advice (SECURED)\Payment_Advice - Copy.exe
      "C:\Users\Admin\AppData\Local\Temp\Payment_Advice\Payment_Advice (SECURED)\Payment_Advice - Copy.exe"
      2⤵
      • Adds Run key to start application
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1696
      • C:\Windows\SysWOW64\iexpress.exe
        C:\Windows\System32\iexpress.exe
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:1800
    • C:\Windows\SysWOW64\colorcpl.exe
      "C:\Windows\SysWOW64\colorcpl.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1652
      • C:\Program Files\Mozilla Firefox\Firefox.exe
        "C:\Program Files\Mozilla Firefox\Firefox.exe"
        3⤵
          PID:980

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    3
    T1112

    Install Root Certificate

    1
    T1130

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \Users\Admin\AppData\Local\Temp\sqlite3.dll
      Filesize

      895KB

      MD5

      1eb6acf76a15b74b38333af47dc1218d

      SHA1

      a3fbc817f59b6a8899dc338cc15a75cdd17dfff1

      SHA256

      a5ef3a78eb333b0e6dca194ea711dcbb036119a788ecfe125f05176fb0fb70a3

      SHA512

      717931aa928de150abbb70d523c7dbd472bfa6c511ab55e0b50df8d9661d33635156ed7b750285fa383cdd4064f225ea022f0bead3e066ee2beba84ef5731c15

    • memory/1244-67-0x0000000006AA0000-0x0000000006B80000-memory.dmp
      Filesize

      896KB

    • memory/1244-75-0x0000000006B80000-0x0000000006C8F000-memory.dmp
      Filesize

      1.1MB

    • memory/1244-74-0x0000000006B80000-0x0000000006C8F000-memory.dmp
      Filesize

      1.1MB

    • memory/1652-73-0x00000000006B0000-0x000000000073F000-memory.dmp
      Filesize

      572KB

    • memory/1652-72-0x0000000002000000-0x0000000002303000-memory.dmp
      Filesize

      3.0MB

    • memory/1652-71-0x0000000000080000-0x00000000000AD000-memory.dmp
      Filesize

      180KB

    • memory/1652-70-0x0000000000780000-0x0000000000798000-memory.dmp
      Filesize

      96KB

    • memory/1652-68-0x0000000000000000-mapping.dmp
    • memory/1696-60-0x0000000010410000-0x000000001043F000-memory.dmp
      Filesize

      188KB

    • memory/1696-59-0x0000000010410000-0x000000001043F000-memory.dmp
      Filesize

      188KB

    • memory/1696-54-0x0000000075C81000-0x0000000075C83000-memory.dmp
      Filesize

      8KB

    • memory/1696-55-0x00000000002A0000-0x00000000002CC000-memory.dmp
      Filesize

      176KB

    • memory/1800-66-0x0000000000300000-0x0000000000310000-memory.dmp
      Filesize

      64KB

    • memory/1800-65-0x0000000002600000-0x0000000002903000-memory.dmp
      Filesize

      3.0MB

    • memory/1800-64-0x0000000010410000-0x000000001043F000-memory.dmp
      Filesize

      188KB

    • memory/1800-63-0x0000000010410000-0x000000001043F000-memory.dmp
      Filesize

      188KB

    • memory/1800-61-0x0000000010410000-0x000000001043F000-memory.dmp
      Filesize

      188KB

    • memory/1800-57-0x0000000000000000-mapping.dmp