Analysis
-
max time kernel
65s -
max time network
35s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
28-04-2023 10:20
Static task
static1
Behavioral task
behavioral1
Sample
e06f360ca8f64621bf34e248da434adc6b65391e196bc9cb0a62a00baa134846.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
e06f360ca8f64621bf34e248da434adc6b65391e196bc9cb0a62a00baa134846.exe
Resource
win10v2004-20230220-en
General
-
Target
e06f360ca8f64621bf34e248da434adc6b65391e196bc9cb0a62a00baa134846.exe
-
Size
876KB
-
MD5
69fa88e706912bcfa3dc9cc07626c662
-
SHA1
3daaf1e070049dce9b621d48addcabe97150bdac
-
SHA256
e06f360ca8f64621bf34e248da434adc6b65391e196bc9cb0a62a00baa134846
-
SHA512
0e3c6ff3e5ab31a3c454b5df4c9e12aa2ae77e1e0c50bf7911a3c34b197ba3fd2b282ce9ee94e7228f8b772ae436c08266078d0720d948b6ac2f52d8d70918ef
-
SSDEEP
24576:NLX89GZ9NaJlSs0+w6nm2g5+zTwzwK30JV:NLs4mDSa6zPmV
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1296-54-0x0000000000490000-0x00000000004E9000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
wscript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Control Panel\International\Geo\Nation wscript.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
e06f360ca8f64621bf34e248da434adc6b65391e196bc9cb0a62a00baa134846.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Windows\CurrentVersion\Run\Qlbvm = "C:\\Users\\Public\\Libraries\\mvblQ.url" e06f360ca8f64621bf34e248da434adc6b65391e196bc9cb0a62a00baa134846.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
wscript.exedescription pid process target process PID 320 set thread context of 1200 320 wscript.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
e06f360ca8f64621bf34e248da434adc6b65391e196bc9cb0a62a00baa134846.exewscript.exepid process 1296 e06f360ca8f64621bf34e248da434adc6b65391e196bc9cb0a62a00baa134846.exe 320 wscript.exe 320 wscript.exe 320 wscript.exe 320 wscript.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 1200 Explorer.EXE -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
wscript.exepid process 320 wscript.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
wscript.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 320 wscript.exe Token: SeShutdownPrivilege 1200 Explorer.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
e06f360ca8f64621bf34e248da434adc6b65391e196bc9cb0a62a00baa134846.exeExplorer.EXEdescription pid process target process PID 1296 wrote to memory of 320 1296 e06f360ca8f64621bf34e248da434adc6b65391e196bc9cb0a62a00baa134846.exe wscript.exe PID 1296 wrote to memory of 320 1296 e06f360ca8f64621bf34e248da434adc6b65391e196bc9cb0a62a00baa134846.exe wscript.exe PID 1296 wrote to memory of 320 1296 e06f360ca8f64621bf34e248da434adc6b65391e196bc9cb0a62a00baa134846.exe wscript.exe PID 1296 wrote to memory of 320 1296 e06f360ca8f64621bf34e248da434adc6b65391e196bc9cb0a62a00baa134846.exe wscript.exe PID 1296 wrote to memory of 320 1296 e06f360ca8f64621bf34e248da434adc6b65391e196bc9cb0a62a00baa134846.exe wscript.exe PID 1296 wrote to memory of 320 1296 e06f360ca8f64621bf34e248da434adc6b65391e196bc9cb0a62a00baa134846.exe wscript.exe PID 1296 wrote to memory of 320 1296 e06f360ca8f64621bf34e248da434adc6b65391e196bc9cb0a62a00baa134846.exe wscript.exe PID 1200 wrote to memory of 780 1200 Explorer.EXE chkdsk.exe PID 1200 wrote to memory of 780 1200 Explorer.EXE chkdsk.exe PID 1200 wrote to memory of 780 1200 Explorer.EXE chkdsk.exe PID 1200 wrote to memory of 780 1200 Explorer.EXE chkdsk.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\e06f360ca8f64621bf34e248da434adc6b65391e196bc9cb0a62a00baa134846.exe"C:\Users\Admin\AppData\Local\Temp\e06f360ca8f64621bf34e248da434adc6b65391e196bc9cb0a62a00baa134846.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Windows\SysWOW64\wscript.exeC:\Windows\System32\wscript.exe3⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:320
-
-
-
C:\Windows\SysWOW64\chkdsk.exe"C:\Windows\SysWOW64\chkdsk.exe"2⤵PID:780
-