Analysis
-
max time kernel
7s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
04/07/2023, 15:05
Behavioral task
behavioral1
Sample
easy_Malicious_0308ee7ba23eb944f910e085a789935b4d525672f59d13033d936188f268c5af.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
easy_Malicious_0308ee7ba23eb944f910e085a789935b4d525672f59d13033d936188f268c5af.exe
Resource
win10v2004-20230703-en
General
-
Target
easy_Malicious_0308ee7ba23eb944f910e085a789935b4d525672f59d13033d936188f268c5af.exe
-
Size
898KB
-
MD5
9f47d742728c1d932f0413832ee4696b
-
SHA1
faa2f8a62517019ac9e3af94d3d23812de4c55e4
-
SHA256
2d5f0e00a9a7110d27ae329e565db43d58bfc0f12c72879174ea5b3e70dd1c5d
-
SHA512
bb91d2b41b3eeba0d31466c02918b2174dadbda904d06da158499350beced310fc4ab268e98e5d499ba5e72c40a3c9806cb85542d18e83b7bc9faee09a09255c
-
SSDEEP
24576:IAY+wzSBZYUiR+SgH/jw4+wWiT27w5+vGUtxW2:IAuOFhfc4VT27w5YGUtxW2
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 8 IoCs
resource yara_rule behavioral2/memory/4300-133-0x0000000000400000-0x00000000004BD000-memory.dmp modiloader_stage2 behavioral2/files/0x0007000000023223-145.dat modiloader_stage2 behavioral2/files/0x0007000000023223-146.dat modiloader_stage2 behavioral2/files/0x0007000000023226-154.dat modiloader_stage2 behavioral2/memory/4124-155-0x0000000000400000-0x00000000004BD000-memory.dmp modiloader_stage2 behavioral2/memory/4948-157-0x0000000000480000-0x000000000053D000-memory.dmp modiloader_stage2 behavioral2/memory/3912-159-0x0000000000400000-0x00000000004BD000-memory.dmp modiloader_stage2 behavioral2/memory/4300-163-0x0000000000400000-0x00000000004BD000-memory.dmp modiloader_stage2 -
ACProtect 1.3x - 1.4x DLL software 5 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x0008000000023215-135.dat acprotect behavioral2/files/0x0008000000023215-137.dat acprotect behavioral2/files/0x0007000000023224-147.dat acprotect behavioral2/files/0x0007000000023224-148.dat acprotect behavioral2/files/0x0007000000023224-150.dat acprotect -
Executes dropped EXE 1 IoCs
pid Process 3912 Server.exe -
Loads dropped DLL 4 IoCs
pid Process 4300 easy_Malicious_0308ee7ba23eb944f910e085a789935b4d525672f59d13033d936188f268c5af.exe 4300 easy_Malicious_0308ee7ba23eb944f910e085a789935b4d525672f59d13033d936188f268c5af.exe 3912 Server.exe 3912 Server.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\_Server.exe Server.exe File opened for modification C:\Windows\SysWOW64\_Server.exe Server.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3912 set thread context of 4124 3912 Server.exe 81 PID 3912 set thread context of 4948 3912 Server.exe 82 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Server.exe easy_Malicious_0308ee7ba23eb944f910e085a789935b4d525672f59d13033d936188f268c5af.exe File opened for modification C:\Windows\Server.exe easy_Malicious_0308ee7ba23eb944f910e085a789935b4d525672f59d13033d936188f268c5af.exe File created C:\Windows\Delet.bat easy_Malicious_0308ee7ba23eb944f910e085a789935b4d525672f59d13033d936188f268c5af.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 1240 4124 WerFault.exe 81 4836 4948 WerFault.exe 82 -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4300 easy_Malicious_0308ee7ba23eb944f910e085a789935b4d525672f59d13033d936188f268c5af.exe 3912 Server.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 4300 wrote to memory of 3912 4300 easy_Malicious_0308ee7ba23eb944f910e085a789935b4d525672f59d13033d936188f268c5af.exe 80 PID 4300 wrote to memory of 3912 4300 easy_Malicious_0308ee7ba23eb944f910e085a789935b4d525672f59d13033d936188f268c5af.exe 80 PID 4300 wrote to memory of 3912 4300 easy_Malicious_0308ee7ba23eb944f910e085a789935b4d525672f59d13033d936188f268c5af.exe 80 PID 3912 wrote to memory of 4124 3912 Server.exe 81 PID 3912 wrote to memory of 4124 3912 Server.exe 81 PID 3912 wrote to memory of 4124 3912 Server.exe 81 PID 3912 wrote to memory of 4124 3912 Server.exe 81 PID 3912 wrote to memory of 4124 3912 Server.exe 81 PID 3912 wrote to memory of 4948 3912 Server.exe 82 PID 3912 wrote to memory of 4948 3912 Server.exe 82 PID 3912 wrote to memory of 4948 3912 Server.exe 82 PID 3912 wrote to memory of 4948 3912 Server.exe 82 PID 3912 wrote to memory of 4948 3912 Server.exe 82 PID 4300 wrote to memory of 3940 4300 easy_Malicious_0308ee7ba23eb944f910e085a789935b4d525672f59d13033d936188f268c5af.exe 86 PID 4300 wrote to memory of 3940 4300 easy_Malicious_0308ee7ba23eb944f910e085a789935b4d525672f59d13033d936188f268c5af.exe 86 PID 4300 wrote to memory of 3940 4300 easy_Malicious_0308ee7ba23eb944f910e085a789935b4d525672f59d13033d936188f268c5af.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\easy_Malicious_0308ee7ba23eb944f910e085a789935b4d525672f59d13033d936188f268c5af.exe"C:\Users\Admin\AppData\Local\Temp\easy_Malicious_0308ee7ba23eb944f910e085a789935b4d525672f59d13033d936188f268c5af.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Windows\Server.exeC:\Windows\Server.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"3⤵PID:4124
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4124 -s 124⤵
- Program crash
PID:1240
-
-
-
C:\Windows\SysWOW64\mmc.exe"C:\Windows\system32\mmc.exe"3⤵PID:4948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4948 -s 124⤵
- Program crash
PID:4836
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\Delet.bat2⤵PID:3940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4124 -ip 41241⤵PID:1768
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4948 -ip 49481⤵PID:2920
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172KB
MD5685f1cbd4af30a1d0c25f252d399a666
SHA16a1b978f5e6150b88c8634146f1406ed97d2f134
SHA2560e478c95a7a07570a69e6061e7c1da9001bccad9cc454f2ed4da58824a13e0f4
SHA5126555ad6b4f4f26105ca8aad64501d74519a3e091f559b4b563d6ffb20a2ddfcde65e4fe94971a9bc65e86db577f2548ca00f9920d341c8ea808b04c0947d61d9
-
Filesize
172KB
MD5685f1cbd4af30a1d0c25f252d399a666
SHA16a1b978f5e6150b88c8634146f1406ed97d2f134
SHA2560e478c95a7a07570a69e6061e7c1da9001bccad9cc454f2ed4da58824a13e0f4
SHA5126555ad6b4f4f26105ca8aad64501d74519a3e091f559b4b563d6ffb20a2ddfcde65e4fe94971a9bc65e86db577f2548ca00f9920d341c8ea808b04c0947d61d9
-
Filesize
172KB
MD5685f1cbd4af30a1d0c25f252d399a666
SHA16a1b978f5e6150b88c8634146f1406ed97d2f134
SHA2560e478c95a7a07570a69e6061e7c1da9001bccad9cc454f2ed4da58824a13e0f4
SHA5126555ad6b4f4f26105ca8aad64501d74519a3e091f559b4b563d6ffb20a2ddfcde65e4fe94971a9bc65e86db577f2548ca00f9920d341c8ea808b04c0947d61d9
-
Filesize
172KB
MD5685f1cbd4af30a1d0c25f252d399a666
SHA16a1b978f5e6150b88c8634146f1406ed97d2f134
SHA2560e478c95a7a07570a69e6061e7c1da9001bccad9cc454f2ed4da58824a13e0f4
SHA5126555ad6b4f4f26105ca8aad64501d74519a3e091f559b4b563d6ffb20a2ddfcde65e4fe94971a9bc65e86db577f2548ca00f9920d341c8ea808b04c0947d61d9
-
Filesize
172KB
MD5685f1cbd4af30a1d0c25f252d399a666
SHA16a1b978f5e6150b88c8634146f1406ed97d2f134
SHA2560e478c95a7a07570a69e6061e7c1da9001bccad9cc454f2ed4da58824a13e0f4
SHA5126555ad6b4f4f26105ca8aad64501d74519a3e091f559b4b563d6ffb20a2ddfcde65e4fe94971a9bc65e86db577f2548ca00f9920d341c8ea808b04c0947d61d9
-
Filesize
278B
MD564145e97b2855322be6b238a48fb4407
SHA12cc927c1e3ce6360d24f0d1200a3491e3987ff79
SHA2561c9365718aa0d3d73c8a4a2111f51c48d69112f9acc6c35b909fb40f2b9849a7
SHA5128349422c1108f24908479d5f782a70ed31b078238ab37fe88ee240ac7973b56af85a5eec295abe43c2cf491026f1f6b05ab7a45b4fa9a815dc6846ef41299d70
-
Filesize
898KB
MD59f47d742728c1d932f0413832ee4696b
SHA1faa2f8a62517019ac9e3af94d3d23812de4c55e4
SHA2562d5f0e00a9a7110d27ae329e565db43d58bfc0f12c72879174ea5b3e70dd1c5d
SHA512bb91d2b41b3eeba0d31466c02918b2174dadbda904d06da158499350beced310fc4ab268e98e5d499ba5e72c40a3c9806cb85542d18e83b7bc9faee09a09255c
-
Filesize
898KB
MD59f47d742728c1d932f0413832ee4696b
SHA1faa2f8a62517019ac9e3af94d3d23812de4c55e4
SHA2562d5f0e00a9a7110d27ae329e565db43d58bfc0f12c72879174ea5b3e70dd1c5d
SHA512bb91d2b41b3eeba0d31466c02918b2174dadbda904d06da158499350beced310fc4ab268e98e5d499ba5e72c40a3c9806cb85542d18e83b7bc9faee09a09255c
-
Filesize
898KB
MD59f47d742728c1d932f0413832ee4696b
SHA1faa2f8a62517019ac9e3af94d3d23812de4c55e4
SHA2562d5f0e00a9a7110d27ae329e565db43d58bfc0f12c72879174ea5b3e70dd1c5d
SHA512bb91d2b41b3eeba0d31466c02918b2174dadbda904d06da158499350beced310fc4ab268e98e5d499ba5e72c40a3c9806cb85542d18e83b7bc9faee09a09255c