Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/10/2023, 08:30

General

  • Target

    SPPB socbel.PDF.exe

  • Size

    1.5MB

  • MD5

    c8489d614d4b4594933998e68669c94a

  • SHA1

    48beb566783f54c1b5725136eb210bd872ff9f30

  • SHA256

    85d5d8fee53df94ccc480e1ad9cdc75f47f4db122d67ec5d4d95f93a551949d8

  • SHA512

    9451749b06e6c22a073d546f0c4ee920ef7de4b76a1e642534225d40a097afde27a40b918f8f71de02b331be805b5fe31b39273d828dacae8c8f3e857c4ea2bb

  • SSDEEP

    24576:PQYmRM7kYk7XW+LLkxodkG16Be0jsb/ipPUVRWn6MgnVqZk1J3Hu9kQ9:PQwuBkxc2k1JrQ

Score
10/10

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Script User-Agent 2 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 55 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 19 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of UnmapMainImage
    PID:3172
    • C:\Users\Admin\AppData\Local\Temp\SPPB socbel.PDF.exe
      "C:\Users\Admin\AppData\Local\Temp\SPPB socbel.PDF.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1488
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Libraries\WdqsszhbO.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4784
        • C:\Windows\SysWOW64\cmd.exe
          cmd.exe /c mkdir "\\?\C:\Windows "
          4⤵
            PID:756
          • C:\Windows\SysWOW64\cmd.exe
            cmd.exe /c mkdir "\\?\C:\Windows \System32"
            4⤵
              PID:4372
            • C:\Windows\SysWOW64\cmd.exe
              cmd.exe /c ECHO F
              4⤵
                PID:5000
              • C:\Windows\SysWOW64\xcopy.exe
                xcopy "easinvoker.exe" "C:\Windows \System32\" /K /D /H /Y
                4⤵
                • Enumerates system info in registry
                PID:1816
              • C:\Windows\SysWOW64\cmd.exe
                cmd.exe /c ECHO F
                4⤵
                  PID:4980
                • C:\Windows\SysWOW64\xcopy.exe
                  xcopy "netutils.dll" "C:\Windows \System32\" /K /D /H /Y
                  4⤵
                  • Enumerates system info in registry
                  PID:2236
                • C:\Windows\SysWOW64\cmd.exe
                  cmd.exe /c ECHO F
                  4⤵
                    PID:4488
                  • C:\Windows\SysWOW64\xcopy.exe
                    xcopy "KDECO.bat" "C:\Windows \System32\" /K /D /H /Y
                    4⤵
                    • Enumerates system info in registry
                    PID:3684
                  • C:\Windows \System32\easinvoker.exe
                    "C:\Windows \System32\easinvoker.exe"
                    4⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of WriteProcessMemory
                    PID:1864
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c ""C:\windows \system32\KDECO.bat""
                      5⤵
                      • Suspicious use of WriteProcessMemory
                      PID:3772
                      • C:\Windows\system32\cmd.exe
                        cmd.exe /c start /min powershell.exe -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath 'C:\Users'"
                        6⤵
                        • Suspicious use of WriteProcessMemory
                        PID:2452
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          powershell.exe -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath 'C:\Users'"
                          7⤵
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4656
                  • C:\Windows\SysWOW64\PING.EXE
                    ping 127.0.0.1 -n 6
                    4⤵
                    • Runs ping.exe
                    PID:3124
                • C:\Windows\SysWOW64\colorcpl.exe
                  C:\Windows\System32\colorcpl.exe
                  3⤵
                  • Suspicious use of SetThreadContext
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious behavior: MapViewOfSection
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:4564
                  • C:\Windows\SysWOW64\wlanext.exe
                    "C:\Windows\SysWOW64\wlanext.exe"
                    4⤵
                    • Suspicious use of SetThreadContext
                    • Modifies Internet Explorer settings
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious behavior: MapViewOfSection
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:2916
                    • C:\Program Files\Mozilla Firefox\Firefox.exe
                      "C:\Program Files\Mozilla Firefox\Firefox.exe"
                      5⤵
                        PID:228

              Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_piqxed43.4wk.ps1

                      Filesize

                      60B

                      MD5

                      d17fe0a3f47be24a6453e9ef58c94641

                      SHA1

                      6ab83620379fc69f80c0242105ddffd7d98d5d9d

                      SHA256

                      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                      SHA512

                      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                    • C:\Users\Public\Libraries\KDECO.bat

                      Filesize

                      152B

                      MD5

                      7e5fbd29557a68383dfb34e696964e93

                      SHA1

                      c1f748f89b47864301255d1fb2bfed04ed0d1300

                      SHA256

                      4e55b1bbe2e0e099592ac57a747fa8d4ef67409901d6c64323a1b73d50e5de67

                      SHA512

                      7dcb6582b03e7bf0cab2168dc775ca6d7a15ebb097fd2cdd3445b6d35ee128386fb9aa6a548b745c32540e358b2aa4d7c78a6f59f85c32065735fc54a6a2bb6a

                    • C:\Users\Public\Libraries\WdqsszhbO.bat

                      Filesize

                      466B

                      MD5

                      9e80036aabe3227dbf98b3975051a53b

                      SHA1

                      9670aab8897770a93293d85426b7b13dda23a152

                      SHA256

                      964aab3b72b3545fabc58a209714ebeade739a0fec40b33af675d7157b9cb252

                      SHA512

                      107fb6b364cf92730aca1a044f7769a1f4aed39a72f031a5004ccf09b3bebabac5fc88b3d0f85eb64c665404136db13678718bad36bea4311f07726684ed0a03

                    • C:\Users\Public\Libraries\easinvoker.exe

                      Filesize

                      128KB

                      MD5

                      231ce1e1d7d98b44371ffff407d68b59

                      SHA1

                      25510d0f6353dbf0c9f72fc880de7585e34b28ff

                      SHA256

                      30951db8bfc21640645aa9144cfeaa294bb7c6980ef236d28552b6f4f3f92a96

                      SHA512

                      520887b01bda96b7c4f91b9330a5c03a12f7c7f266d4359432e7bacc76b0eef377c05a4361f8fa80ad0b94b5865699d747a5d94a2d3dcdb85dabf5887bb6c612

                    • C:\Users\Public\Libraries\netutils.dll

                      Filesize

                      108KB

                      MD5

                      8184a5a46c31d95b7c0057dd5aa90136

                      SHA1

                      b2ba89c94bd07b811e74d9c6897d95638e15d2ac

                      SHA256

                      0e1ebed2c43fdca6759e1a4be9382bb34a3be143c27c6494df67794c1adcd7b2

                      SHA512

                      3fa13f10c3070473cd7a80f2d90b1f879da0cfdeed583c9312697f9c66268d51435a93fc641ac06078bd3c2807c498ede11c7afae3183cebc3b1e6d30cc659db

                    • C:\Windows \System32\easinvoker.exe

                      Filesize

                      128KB

                      MD5

                      231ce1e1d7d98b44371ffff407d68b59

                      SHA1

                      25510d0f6353dbf0c9f72fc880de7585e34b28ff

                      SHA256

                      30951db8bfc21640645aa9144cfeaa294bb7c6980ef236d28552b6f4f3f92a96

                      SHA512

                      520887b01bda96b7c4f91b9330a5c03a12f7c7f266d4359432e7bacc76b0eef377c05a4361f8fa80ad0b94b5865699d747a5d94a2d3dcdb85dabf5887bb6c612

                    • C:\Windows \System32\easinvoker.exe

                      Filesize

                      128KB

                      MD5

                      231ce1e1d7d98b44371ffff407d68b59

                      SHA1

                      25510d0f6353dbf0c9f72fc880de7585e34b28ff

                      SHA256

                      30951db8bfc21640645aa9144cfeaa294bb7c6980ef236d28552b6f4f3f92a96

                      SHA512

                      520887b01bda96b7c4f91b9330a5c03a12f7c7f266d4359432e7bacc76b0eef377c05a4361f8fa80ad0b94b5865699d747a5d94a2d3dcdb85dabf5887bb6c612

                    • C:\Windows \System32\netutils.dll

                      Filesize

                      108KB

                      MD5

                      8184a5a46c31d95b7c0057dd5aa90136

                      SHA1

                      b2ba89c94bd07b811e74d9c6897d95638e15d2ac

                      SHA256

                      0e1ebed2c43fdca6759e1a4be9382bb34a3be143c27c6494df67794c1adcd7b2

                      SHA512

                      3fa13f10c3070473cd7a80f2d90b1f879da0cfdeed583c9312697f9c66268d51435a93fc641ac06078bd3c2807c498ede11c7afae3183cebc3b1e6d30cc659db

                    • C:\Windows \System32\netutils.dll

                      Filesize

                      108KB

                      MD5

                      8184a5a46c31d95b7c0057dd5aa90136

                      SHA1

                      b2ba89c94bd07b811e74d9c6897d95638e15d2ac

                      SHA256

                      0e1ebed2c43fdca6759e1a4be9382bb34a3be143c27c6494df67794c1adcd7b2

                      SHA512

                      3fa13f10c3070473cd7a80f2d90b1f879da0cfdeed583c9312697f9c66268d51435a93fc641ac06078bd3c2807c498ede11c7afae3183cebc3b1e6d30cc659db

                    • C:\windows \system32\KDECO.bat

                      Filesize

                      152B

                      MD5

                      7e5fbd29557a68383dfb34e696964e93

                      SHA1

                      c1f748f89b47864301255d1fb2bfed04ed0d1300

                      SHA256

                      4e55b1bbe2e0e099592ac57a747fa8d4ef67409901d6c64323a1b73d50e5de67

                      SHA512

                      7dcb6582b03e7bf0cab2168dc775ca6d7a15ebb097fd2cdd3445b6d35ee128386fb9aa6a548b745c32540e358b2aa4d7c78a6f59f85c32065735fc54a6a2bb6a

                    • memory/1488-1-0x0000000002960000-0x0000000003960000-memory.dmp

                      Filesize

                      16.0MB

                    • memory/1488-5-0x0000000000840000-0x0000000000841000-memory.dmp

                      Filesize

                      4KB

                    • memory/1488-0-0x0000000000840000-0x0000000000841000-memory.dmp

                      Filesize

                      4KB

                    • memory/1488-2-0x0000000002960000-0x0000000003960000-memory.dmp

                      Filesize

                      16.0MB

                    • memory/1488-4-0x0000000000400000-0x0000000000593000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/1864-25-0x00000000613C0000-0x00000000613E2000-memory.dmp

                      Filesize

                      136KB

                    • memory/2916-59-0x0000000000110000-0x0000000000146000-memory.dmp

                      Filesize

                      216KB

                    • memory/2916-68-0x0000000000910000-0x00000000009B5000-memory.dmp

                      Filesize

                      660KB

                    • memory/2916-67-0x0000000000110000-0x0000000000146000-memory.dmp

                      Filesize

                      216KB

                    • memory/2916-64-0x0000000000910000-0x00000000009B5000-memory.dmp

                      Filesize

                      660KB

                    • memory/2916-63-0x0000000000110000-0x0000000000146000-memory.dmp

                      Filesize

                      216KB

                    • memory/2916-62-0x0000000000A90000-0x0000000000DDA000-memory.dmp

                      Filesize

                      3.3MB

                    • memory/2916-60-0x0000000000110000-0x0000000000146000-memory.dmp

                      Filesize

                      216KB

                    • memory/3172-92-0x0000000003330000-0x0000000003340000-memory.dmp

                      Filesize

                      64KB

                    • memory/3172-94-0x0000000003330000-0x0000000003340000-memory.dmp

                      Filesize

                      64KB

                    • memory/3172-109-0x0000000003330000-0x0000000003340000-memory.dmp

                      Filesize

                      64KB

                    • memory/3172-105-0x0000000003330000-0x0000000003340000-memory.dmp

                      Filesize

                      64KB

                    • memory/3172-108-0x0000000003330000-0x0000000003340000-memory.dmp

                      Filesize

                      64KB

                    • memory/3172-56-0x00000000148B0000-0x0000000015FE2000-memory.dmp

                      Filesize

                      23.2MB

                    • memory/3172-107-0x0000000003330000-0x0000000003340000-memory.dmp

                      Filesize

                      64KB

                    • memory/3172-106-0x0000000003330000-0x0000000003340000-memory.dmp

                      Filesize

                      64KB

                    • memory/3172-103-0x0000000003330000-0x0000000003340000-memory.dmp

                      Filesize

                      64KB

                    • memory/3172-104-0x0000000003330000-0x0000000003340000-memory.dmp

                      Filesize

                      64KB

                    • memory/3172-102-0x0000000003330000-0x0000000003340000-memory.dmp

                      Filesize

                      64KB

                    • memory/3172-101-0x0000000003360000-0x0000000003370000-memory.dmp

                      Filesize

                      64KB

                    • memory/3172-100-0x0000000003330000-0x0000000003340000-memory.dmp

                      Filesize

                      64KB

                    • memory/3172-99-0x0000000003330000-0x0000000003340000-memory.dmp

                      Filesize

                      64KB

                    • memory/3172-65-0x00000000093C0000-0x00000000094DE000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/3172-66-0x00000000093C0000-0x00000000094DE000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/3172-93-0x0000000003360000-0x0000000003370000-memory.dmp

                      Filesize

                      64KB

                    • memory/3172-97-0x0000000003330000-0x0000000003340000-memory.dmp

                      Filesize

                      64KB

                    • memory/3172-69-0x00000000093C0000-0x00000000094DE000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/3172-76-0x0000000003330000-0x0000000003340000-memory.dmp

                      Filesize

                      64KB

                    • memory/3172-77-0x0000000003330000-0x0000000003340000-memory.dmp

                      Filesize

                      64KB

                    • memory/3172-80-0x0000000003330000-0x0000000003340000-memory.dmp

                      Filesize

                      64KB

                    • memory/3172-79-0x0000000003330000-0x0000000003340000-memory.dmp

                      Filesize

                      64KB

                    • memory/3172-78-0x0000000003340000-0x0000000003350000-memory.dmp

                      Filesize

                      64KB

                    • memory/3172-81-0x0000000003330000-0x0000000003340000-memory.dmp

                      Filesize

                      64KB

                    • memory/3172-82-0x0000000003330000-0x0000000003340000-memory.dmp

                      Filesize

                      64KB

                    • memory/3172-83-0x0000000003330000-0x0000000003340000-memory.dmp

                      Filesize

                      64KB

                    • memory/3172-85-0x0000000003330000-0x0000000003340000-memory.dmp

                      Filesize

                      64KB

                    • memory/3172-87-0x0000000003330000-0x0000000003340000-memory.dmp

                      Filesize

                      64KB

                    • memory/3172-88-0x0000000003330000-0x0000000003340000-memory.dmp

                      Filesize

                      64KB

                    • memory/3172-89-0x0000000003330000-0x0000000003340000-memory.dmp

                      Filesize

                      64KB

                    • memory/3172-95-0x0000000003340000-0x0000000003350000-memory.dmp

                      Filesize

                      64KB

                    • memory/3172-91-0x0000000003330000-0x0000000003340000-memory.dmp

                      Filesize

                      64KB

                    • memory/3172-90-0x0000000003330000-0x0000000003340000-memory.dmp

                      Filesize

                      64KB

                    • memory/4564-45-0x0000000004D70000-0x0000000005D70000-memory.dmp

                      Filesize

                      16.0MB

                    • memory/4564-61-0x0000000004D70000-0x0000000005D70000-memory.dmp

                      Filesize

                      16.0MB

                    • memory/4564-53-0x0000000002E70000-0x0000000002E96000-memory.dmp

                      Filesize

                      152KB

                    • memory/4564-52-0x0000000004D70000-0x0000000005D70000-memory.dmp

                      Filesize

                      16.0MB

                    • memory/4564-54-0x0000000004D70000-0x0000000005D70000-memory.dmp

                      Filesize

                      16.0MB

                    • memory/4564-55-0x0000000004D70000-0x0000000005D70000-memory.dmp

                      Filesize

                      16.0MB

                    • memory/4564-57-0x0000000004D70000-0x0000000005D70000-memory.dmp

                      Filesize

                      16.0MB

                    • memory/4564-58-0x0000000002ED0000-0x0000000002EF6000-memory.dmp

                      Filesize

                      152KB

                    • memory/4564-50-0x0000000016F50000-0x000000001729A000-memory.dmp

                      Filesize

                      3.3MB

                    • memory/4564-51-0x0000000004D70000-0x0000000005D70000-memory.dmp

                      Filesize

                      16.0MB

                    • memory/4656-29-0x00000181FA030000-0x00000181FA052000-memory.dmp

                      Filesize

                      136KB

                    • memory/4656-39-0x00007FF931F70000-0x00007FF932A31000-memory.dmp

                      Filesize

                      10.8MB

                    • memory/4656-44-0x00007FF931F70000-0x00007FF932A31000-memory.dmp

                      Filesize

                      10.8MB

                    • memory/4656-41-0x00000181FA170000-0x00000181FA180000-memory.dmp

                      Filesize

                      64KB

                    • memory/4656-40-0x00000181FA170000-0x00000181FA180000-memory.dmp

                      Filesize

                      64KB