Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
27/03/2023, 11:06
Static task
static1
Behavioral task
behavioral1
Sample
761F42F03E50EF9B2EB1B1041C81CC6ED24CBC8CE2D6D.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
761F42F03E50EF9B2EB1B1041C81CC6ED24CBC8CE2D6D.exe
Resource
win10v2004-20230220-en
General
-
Target
761F42F03E50EF9B2EB1B1041C81CC6ED24CBC8CE2D6D.exe
-
Size
334KB
-
MD5
a11ae57c068442f751c4a7f4f5f542b0
-
SHA1
131eaded2b2507fa0b1fbf5677705a09496d0f4c
-
SHA256
761f42f03e50ef9b2eb1b1041c81cc6ed24cbc8ce2d6df3c87f193493b4a4772
-
SHA512
c62d70a3391f30cd5084d8ca4cfe0bdc65205205ac3913d4f9a9af847e1f224a780b3ddb4e981e105dd1dde6a1d52d628c6bb5380901f357156e3063dde2e674
-
SSDEEP
6144:5P8U5dPZDa/iuqO2pi14MlxYSCG1H95dp4kq5bx4fbJr/CYzCIbeY3opBMc:F5VZDaj5xZC2dGkebubJr/CIbbopBp
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 952 2040 mshta.exe 27 -
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Oracle\VirtualBox Guest Additions regsvr32.exe -
Looks for VirtualBox drivers on disk 2 TTPs 1 IoCs
description ioc Process File opened (read-only) C:\WINDOWS\SysWOW64\drivers\VBoxMouse.sys regsvr32.exe -
ModiLoader Second Stage 44 IoCs
resource yara_rule behavioral1/memory/1704-54-0x0000000000400000-0x000000000045C5E8-memory.dmp modiloader_stage2 behavioral1/memory/1704-57-0x0000000001F80000-0x000000000205C000-memory.dmp modiloader_stage2 behavioral1/memory/1704-56-0x0000000001F80000-0x000000000205C000-memory.dmp modiloader_stage2 behavioral1/memory/1704-55-0x0000000001F80000-0x000000000205C000-memory.dmp modiloader_stage2 behavioral1/memory/1704-60-0x0000000001F80000-0x000000000205C000-memory.dmp modiloader_stage2 behavioral1/memory/1704-61-0x0000000001F80000-0x000000000205C000-memory.dmp modiloader_stage2 behavioral1/memory/1704-66-0x0000000000400000-0x000000000045C5E8-memory.dmp modiloader_stage2 behavioral1/memory/1704-67-0x0000000001F80000-0x000000000205C000-memory.dmp modiloader_stage2 behavioral1/memory/800-71-0x0000000005C50000-0x0000000005D2C000-memory.dmp modiloader_stage2 behavioral1/memory/800-72-0x0000000005C50000-0x0000000005D2C000-memory.dmp modiloader_stage2 behavioral1/memory/1232-73-0x0000000000220000-0x000000000036A000-memory.dmp modiloader_stage2 behavioral1/memory/1232-77-0x0000000000220000-0x000000000036A000-memory.dmp modiloader_stage2 behavioral1/memory/800-76-0x0000000005C50000-0x0000000005D2C000-memory.dmp modiloader_stage2 behavioral1/memory/1232-79-0x0000000000220000-0x000000000036A000-memory.dmp modiloader_stage2 behavioral1/memory/1232-81-0x0000000000220000-0x000000000036A000-memory.dmp modiloader_stage2 behavioral1/memory/1232-83-0x0000000000220000-0x000000000036A000-memory.dmp modiloader_stage2 behavioral1/memory/1232-85-0x0000000000220000-0x000000000036A000-memory.dmp modiloader_stage2 behavioral1/memory/1232-87-0x0000000000220000-0x000000000036A000-memory.dmp modiloader_stage2 behavioral1/memory/1232-89-0x0000000000220000-0x000000000036A000-memory.dmp modiloader_stage2 behavioral1/memory/1232-91-0x0000000000220000-0x000000000036A000-memory.dmp modiloader_stage2 behavioral1/memory/1232-93-0x0000000000220000-0x000000000036A000-memory.dmp modiloader_stage2 behavioral1/memory/1232-95-0x0000000000220000-0x000000000036A000-memory.dmp modiloader_stage2 behavioral1/memory/1232-97-0x0000000000220000-0x000000000036A000-memory.dmp modiloader_stage2 behavioral1/memory/1232-99-0x0000000000220000-0x000000000036A000-memory.dmp modiloader_stage2 behavioral1/memory/1232-101-0x0000000000220000-0x000000000036A000-memory.dmp modiloader_stage2 behavioral1/memory/1232-103-0x0000000000220000-0x000000000036A000-memory.dmp modiloader_stage2 behavioral1/memory/1232-105-0x0000000000220000-0x000000000036A000-memory.dmp modiloader_stage2 behavioral1/memory/1232-107-0x0000000000220000-0x000000000036A000-memory.dmp modiloader_stage2 behavioral1/memory/1232-108-0x0000000000220000-0x000000000036A000-memory.dmp modiloader_stage2 behavioral1/memory/1232-109-0x0000000000220000-0x000000000036A000-memory.dmp modiloader_stage2 behavioral1/memory/1232-110-0x0000000000220000-0x000000000036A000-memory.dmp modiloader_stage2 behavioral1/memory/1232-113-0x0000000000220000-0x000000000036A000-memory.dmp modiloader_stage2 behavioral1/memory/1232-114-0x0000000000220000-0x000000000036A000-memory.dmp modiloader_stage2 behavioral1/memory/1232-116-0x0000000000220000-0x000000000036A000-memory.dmp modiloader_stage2 behavioral1/memory/1232-115-0x0000000000220000-0x000000000036A000-memory.dmp modiloader_stage2 behavioral1/memory/1232-118-0x0000000000220000-0x000000000036A000-memory.dmp modiloader_stage2 behavioral1/memory/1232-117-0x0000000000220000-0x000000000036A000-memory.dmp modiloader_stage2 behavioral1/memory/1232-119-0x0000000000220000-0x000000000036A000-memory.dmp modiloader_stage2 behavioral1/memory/1232-126-0x0000000000220000-0x000000000036A000-memory.dmp modiloader_stage2 behavioral1/memory/1232-127-0x0000000000220000-0x000000000036A000-memory.dmp modiloader_stage2 behavioral1/memory/1704-130-0x0000000001F80000-0x000000000205C000-memory.dmp modiloader_stage2 behavioral1/memory/1536-176-0x00000000001D0000-0x000000000031A000-memory.dmp modiloader_stage2 behavioral1/memory/1232-217-0x0000000000220000-0x000000000036A000-memory.dmp modiloader_stage2 behavioral1/memory/1536-230-0x00000000001D0000-0x000000000031A000-memory.dmp modiloader_stage2 -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\VMware, Inc.\VMware Tools regsvr32.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion regsvr32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion regsvr32.exe -
Deletes itself 1 IoCs
pid Process 1232 regsvr32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Windows\CurrentVersion\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\516d\\b1b1.bat\"" regsvr32.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum regsvr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 regsvr32.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 800 set thread context of 1232 800 powershell.exe 31 PID 1232 set thread context of 1536 1232 regsvr32.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\International regsvr32.exe -
Modifies registry class 7 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\a437\shell regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\a437\shell\open regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\a437\shell\open\command regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\a437\shell\open\command\ = "\"C:\\Windows\\system32\\mshta.exe\" \"javascript:K2iabwyQ=\"5l3Ub\";Q6p=new ActiveXObject(\"WScript.Shell\");c3m3cx=\"kXT\";Ov7KX=Q6p.RegRead(\"HKCU\\\\software\\\\gytcjql\\\\orhmjlm\");iXnBE9U=\"6zV6\";eval(Ov7KX);vA2swp0H=\"rGhlBj\";\"" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\.1389f regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\.1389f\ = "a437" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000_CLASSES\a437 regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 800 powershell.exe 800 powershell.exe 800 powershell.exe 800 powershell.exe 1232 regsvr32.exe 1232 regsvr32.exe 1232 regsvr32.exe 1232 regsvr32.exe 1232 regsvr32.exe 1232 regsvr32.exe 1232 regsvr32.exe 1232 regsvr32.exe 1232 regsvr32.exe 1232 regsvr32.exe 1232 regsvr32.exe 1232 regsvr32.exe 1232 regsvr32.exe 1232 regsvr32.exe 1232 regsvr32.exe 1232 regsvr32.exe 1232 regsvr32.exe 1232 regsvr32.exe 1232 regsvr32.exe 1232 regsvr32.exe 1232 regsvr32.exe 1232 regsvr32.exe 1232 regsvr32.exe 1232 regsvr32.exe 1232 regsvr32.exe 1232 regsvr32.exe 1232 regsvr32.exe 1232 regsvr32.exe 1232 regsvr32.exe 1232 regsvr32.exe 1232 regsvr32.exe 1232 regsvr32.exe 1232 regsvr32.exe 1232 regsvr32.exe 1232 regsvr32.exe 1232 regsvr32.exe 1232 regsvr32.exe 1232 regsvr32.exe 1232 regsvr32.exe 1232 regsvr32.exe 1232 regsvr32.exe 1232 regsvr32.exe 1232 regsvr32.exe 1232 regsvr32.exe 1232 regsvr32.exe 1232 regsvr32.exe 1232 regsvr32.exe 1232 regsvr32.exe 1232 regsvr32.exe 1232 regsvr32.exe 1232 regsvr32.exe 1232 regsvr32.exe 1232 regsvr32.exe 1232 regsvr32.exe 1232 regsvr32.exe 1232 regsvr32.exe 1232 regsvr32.exe 1232 regsvr32.exe 1232 regsvr32.exe 1232 regsvr32.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 800 powershell.exe 1232 regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 800 powershell.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 952 wrote to memory of 800 952 mshta.exe 29 PID 952 wrote to memory of 800 952 mshta.exe 29 PID 952 wrote to memory of 800 952 mshta.exe 29 PID 952 wrote to memory of 800 952 mshta.exe 29 PID 800 wrote to memory of 1232 800 powershell.exe 31 PID 800 wrote to memory of 1232 800 powershell.exe 31 PID 800 wrote to memory of 1232 800 powershell.exe 31 PID 800 wrote to memory of 1232 800 powershell.exe 31 PID 800 wrote to memory of 1232 800 powershell.exe 31 PID 800 wrote to memory of 1232 800 powershell.exe 31 PID 800 wrote to memory of 1232 800 powershell.exe 31 PID 800 wrote to memory of 1232 800 powershell.exe 31 PID 1232 wrote to memory of 1536 1232 regsvr32.exe 32 PID 1232 wrote to memory of 1536 1232 regsvr32.exe 32 PID 1232 wrote to memory of 1536 1232 regsvr32.exe 32 PID 1232 wrote to memory of 1536 1232 regsvr32.exe 32 PID 1232 wrote to memory of 1536 1232 regsvr32.exe 32 PID 1232 wrote to memory of 1536 1232 regsvr32.exe 32 PID 1232 wrote to memory of 1536 1232 regsvr32.exe 32 PID 1232 wrote to memory of 1536 1232 regsvr32.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\761F42F03E50EF9B2EB1B1041C81CC6ED24CBC8CE2D6D.exe"C:\Users\Admin\AppData\Local\Temp\761F42F03E50EF9B2EB1B1041C81CC6ED24CBC8CE2D6D.exe"1⤵PID:1704
-
C:\Windows\system32\mshta.exe"C:\Windows\system32\mshta.exe" javascript:ho5tm8Z="DFUS83";gd9=new%20ActiveXObject("WScript.Shell");A3lilIOk="qNSPA4U0";ZaU6r=gd9.RegRead("HKCU\\software\\h8RI9jV0\\EqpJDGj");Ax0p3ticr="Fx7ExEfu";eval(ZaU6r);cGE8o="Gr";1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" iex $env:vsjxirfb2⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe3⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VirtualBox drivers on disk
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Deletes itself
- Adds Run key to start application
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\SysWOW64\regsvr32.exe"4⤵PID:1536
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
30KB
MD502a25f8877254b57ae64defd393eac51
SHA16d549d2c7c093b37ba42908f6fcd360a3130d943
SHA2567f368fbb1d11175992c9c1d1837b6162417769e8c7eea91251093c94a89e162e
SHA512c79005844bee7087b45df0553b2a979d647d9e3dad920410687f26904a1abcb9889cd01f8df1509363c7ac0d8f7bfaa26b96dae25f288297e535a4e42ab9a5e9
-
Filesize
65B
MD50f0e2181bd7e755e5b4368f7bfa43bf4
SHA1057c40c16a76f83cc1801facaf88dcdbbc2ae98a
SHA256570a4e9ca1242958796a4910f07bbc802281964d32029d1050150524908560aa
SHA51238fd95b67cf9ff46224a1c379b1746c6666534a57f0f4f970ce9bc06e97c72b80cc4cbd99a01d3a37e7066a708d5609ac3cc4c234029c06725b32ee1cfcd74bb