Analysis

  • max time kernel
    156s
  • max time network
    166s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2023, 18:59

General

  • Target

    PO_3948.pdf.exe

  • Size

    1.2MB

  • MD5

    6932c9815bac84926d2dbbd7b4fc11a2

  • SHA1

    696cb6536679b44394bc0e4f6afe93b955789e4e

  • SHA256

    7d489f696a0cc6d2b4f6a046bfbfd575d3bc2a55df7be21d8359d406f677e533

  • SHA512

    e6a63dc0640fb46bbc56e4e1ae2229ca927a7fb751fce5e7b1e3379e11e879d044229f09a4f149d0011608573f3e8a638a6b47efd5c4cef1739defa6ab0d3d53

  • SSDEEP

    24576:iFoEhCKAXS/1+O9P1Bza+78soKoxm5OST6Iytld3BIwbgKcQrE/k2+ZVN:iF9ii/1+O9P1BB8soKXx7ytldx7V

Score
10/10

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Script User-Agent 2 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 57 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3184
    • C:\Users\Admin\AppData\Local\Temp\PO_3948.pdf.exe
      "C:\Users\Admin\AppData\Local\Temp\PO_3948.pdf.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1968
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Libraries\ZniiuwatO.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4308
        • C:\Windows\SysWOW64\cmd.exe
          cmd.exe /c mkdir "\\?\C:\Windows "
          4⤵
            PID:2532
          • C:\Windows\SysWOW64\cmd.exe
            cmd.exe /c mkdir "\\?\C:\Windows \System32"
            4⤵
              PID:4728
            • C:\Windows\SysWOW64\cmd.exe
              cmd.exe /c ECHO F
              4⤵
                PID:4884
              • C:\Windows\SysWOW64\xcopy.exe
                xcopy "easinvoker.exe" "C:\Windows \System32\" /K /D /H /Y
                4⤵
                • Enumerates system info in registry
                PID:408
              • C:\Windows\SysWOW64\cmd.exe
                cmd.exe /c ECHO F
                4⤵
                  PID:3708
                • C:\Windows\SysWOW64\xcopy.exe
                  xcopy "netutils.dll" "C:\Windows \System32\" /K /D /H /Y
                  4⤵
                  • Enumerates system info in registry
                  PID:2520
                • C:\Windows\SysWOW64\xcopy.exe
                  xcopy "KDECO.bat" "C:\Windows \System32\" /K /D /H /Y
                  4⤵
                  • Enumerates system info in registry
                  PID:336
                • C:\Windows\SysWOW64\cmd.exe
                  cmd.exe /c ECHO F
                  4⤵
                    PID:3220
                  • C:\Windows \System32\easinvoker.exe
                    "C:\Windows \System32\easinvoker.exe"
                    4⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of WriteProcessMemory
                    PID:3620
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c ""C:\windows \system32\KDECO.bat""
                      5⤵
                      • Suspicious use of WriteProcessMemory
                      PID:3360
                      • C:\Windows\system32\cmd.exe
                        cmd.exe /c start /min powershell.exe -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath 'C:\Users'"
                        6⤵
                        • Suspicious use of WriteProcessMemory
                        PID:4544
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          powershell.exe -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath 'C:\Users'"
                          7⤵
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:976
                  • C:\Windows\SysWOW64\PING.EXE
                    ping 127.0.0.1 -n 6
                    4⤵
                    • Runs ping.exe
                    PID:1288
                • C:\Windows\SysWOW64\colorcpl.exe
                  C:\Windows\System32\colorcpl.exe
                  3⤵
                  • Suspicious use of SetThreadContext
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious behavior: MapViewOfSection
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3380
              • C:\Windows\SysWOW64\autochk.exe
                "C:\Windows\SysWOW64\autochk.exe"
                2⤵
                  PID:4768
                • C:\Windows\SysWOW64\msdt.exe
                  "C:\Windows\SysWOW64\msdt.exe"
                  2⤵
                  • Suspicious use of SetThreadContext
                  • Modifies Internet Explorer settings
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious behavior: MapViewOfSection
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:4516
                  • C:\Program Files\Mozilla Firefox\Firefox.exe
                    "C:\Program Files\Mozilla Firefox\Firefox.exe"
                    3⤵
                      PID:3412

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_u3pzgj2s.at3.ps1

                  Filesize

                  60B

                  MD5

                  d17fe0a3f47be24a6453e9ef58c94641

                  SHA1

                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                  SHA256

                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                  SHA512

                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                • C:\Users\Public\Libraries\KDECO.bat

                  Filesize

                  152B

                  MD5

                  7e5fbd29557a68383dfb34e696964e93

                  SHA1

                  c1f748f89b47864301255d1fb2bfed04ed0d1300

                  SHA256

                  4e55b1bbe2e0e099592ac57a747fa8d4ef67409901d6c64323a1b73d50e5de67

                  SHA512

                  7dcb6582b03e7bf0cab2168dc775ca6d7a15ebb097fd2cdd3445b6d35ee128386fb9aa6a548b745c32540e358b2aa4d7c78a6f59f85c32065735fc54a6a2bb6a

                • C:\Users\Public\Libraries\ZniiuwatO.bat

                  Filesize

                  466B

                  MD5

                  9e80036aabe3227dbf98b3975051a53b

                  SHA1

                  9670aab8897770a93293d85426b7b13dda23a152

                  SHA256

                  964aab3b72b3545fabc58a209714ebeade739a0fec40b33af675d7157b9cb252

                  SHA512

                  107fb6b364cf92730aca1a044f7769a1f4aed39a72f031a5004ccf09b3bebabac5fc88b3d0f85eb64c665404136db13678718bad36bea4311f07726684ed0a03

                • C:\Users\Public\Libraries\easinvoker.exe

                  Filesize

                  128KB

                  MD5

                  231ce1e1d7d98b44371ffff407d68b59

                  SHA1

                  25510d0f6353dbf0c9f72fc880de7585e34b28ff

                  SHA256

                  30951db8bfc21640645aa9144cfeaa294bb7c6980ef236d28552b6f4f3f92a96

                  SHA512

                  520887b01bda96b7c4f91b9330a5c03a12f7c7f266d4359432e7bacc76b0eef377c05a4361f8fa80ad0b94b5865699d747a5d94a2d3dcdb85dabf5887bb6c612

                • C:\Users\Public\Libraries\netutils.dll

                  Filesize

                  108KB

                  MD5

                  8184a5a46c31d95b7c0057dd5aa90136

                  SHA1

                  b2ba89c94bd07b811e74d9c6897d95638e15d2ac

                  SHA256

                  0e1ebed2c43fdca6759e1a4be9382bb34a3be143c27c6494df67794c1adcd7b2

                  SHA512

                  3fa13f10c3070473cd7a80f2d90b1f879da0cfdeed583c9312697f9c66268d51435a93fc641ac06078bd3c2807c498ede11c7afae3183cebc3b1e6d30cc659db

                • C:\Windows \System32\easinvoker.exe

                  Filesize

                  128KB

                  MD5

                  231ce1e1d7d98b44371ffff407d68b59

                  SHA1

                  25510d0f6353dbf0c9f72fc880de7585e34b28ff

                  SHA256

                  30951db8bfc21640645aa9144cfeaa294bb7c6980ef236d28552b6f4f3f92a96

                  SHA512

                  520887b01bda96b7c4f91b9330a5c03a12f7c7f266d4359432e7bacc76b0eef377c05a4361f8fa80ad0b94b5865699d747a5d94a2d3dcdb85dabf5887bb6c612

                • C:\Windows \System32\easinvoker.exe

                  Filesize

                  128KB

                  MD5

                  231ce1e1d7d98b44371ffff407d68b59

                  SHA1

                  25510d0f6353dbf0c9f72fc880de7585e34b28ff

                  SHA256

                  30951db8bfc21640645aa9144cfeaa294bb7c6980ef236d28552b6f4f3f92a96

                  SHA512

                  520887b01bda96b7c4f91b9330a5c03a12f7c7f266d4359432e7bacc76b0eef377c05a4361f8fa80ad0b94b5865699d747a5d94a2d3dcdb85dabf5887bb6c612

                • C:\Windows \System32\netutils.dll

                  Filesize

                  108KB

                  MD5

                  8184a5a46c31d95b7c0057dd5aa90136

                  SHA1

                  b2ba89c94bd07b811e74d9c6897d95638e15d2ac

                  SHA256

                  0e1ebed2c43fdca6759e1a4be9382bb34a3be143c27c6494df67794c1adcd7b2

                  SHA512

                  3fa13f10c3070473cd7a80f2d90b1f879da0cfdeed583c9312697f9c66268d51435a93fc641ac06078bd3c2807c498ede11c7afae3183cebc3b1e6d30cc659db

                • C:\Windows \System32\netutils.dll

                  Filesize

                  108KB

                  MD5

                  8184a5a46c31d95b7c0057dd5aa90136

                  SHA1

                  b2ba89c94bd07b811e74d9c6897d95638e15d2ac

                  SHA256

                  0e1ebed2c43fdca6759e1a4be9382bb34a3be143c27c6494df67794c1adcd7b2

                  SHA512

                  3fa13f10c3070473cd7a80f2d90b1f879da0cfdeed583c9312697f9c66268d51435a93fc641ac06078bd3c2807c498ede11c7afae3183cebc3b1e6d30cc659db

                • C:\windows \system32\KDECO.bat

                  Filesize

                  152B

                  MD5

                  7e5fbd29557a68383dfb34e696964e93

                  SHA1

                  c1f748f89b47864301255d1fb2bfed04ed0d1300

                  SHA256

                  4e55b1bbe2e0e099592ac57a747fa8d4ef67409901d6c64323a1b73d50e5de67

                  SHA512

                  7dcb6582b03e7bf0cab2168dc775ca6d7a15ebb097fd2cdd3445b6d35ee128386fb9aa6a548b745c32540e358b2aa4d7c78a6f59f85c32065735fc54a6a2bb6a

                • memory/976-40-0x000001957C460000-0x000001957C470000-memory.dmp

                  Filesize

                  64KB

                • memory/976-44-0x00007FFBE9990000-0x00007FFBEA451000-memory.dmp

                  Filesize

                  10.8MB

                • memory/976-29-0x000001957CB20000-0x000001957CB42000-memory.dmp

                  Filesize

                  136KB

                • memory/976-39-0x00007FFBE9990000-0x00007FFBEA451000-memory.dmp

                  Filesize

                  10.8MB

                • memory/976-41-0x000001957C460000-0x000001957C470000-memory.dmp

                  Filesize

                  64KB

                • memory/1968-4-0x0000000000400000-0x0000000000546000-memory.dmp

                  Filesize

                  1.3MB

                • memory/1968-5-0x0000000002310000-0x0000000002311000-memory.dmp

                  Filesize

                  4KB

                • memory/1968-2-0x0000000002980000-0x0000000003980000-memory.dmp

                  Filesize

                  16.0MB

                • memory/1968-1-0x0000000002980000-0x0000000003980000-memory.dmp

                  Filesize

                  16.0MB

                • memory/1968-0-0x0000000002310000-0x0000000002311000-memory.dmp

                  Filesize

                  4KB

                • memory/3184-54-0x000000000BAF0000-0x000000000BDAF000-memory.dmp

                  Filesize

                  2.7MB

                • memory/3184-61-0x000000000BAF0000-0x000000000BDAF000-memory.dmp

                  Filesize

                  2.7MB

                • memory/3184-67-0x0000000008F10000-0x0000000008FFE000-memory.dmp

                  Filesize

                  952KB

                • memory/3184-64-0x0000000008F10000-0x0000000008FFE000-memory.dmp

                  Filesize

                  952KB

                • memory/3184-63-0x0000000008F10000-0x0000000008FFE000-memory.dmp

                  Filesize

                  952KB

                • memory/3380-51-0x00000000173F0000-0x000000001773A000-memory.dmp

                  Filesize

                  3.3MB

                • memory/3380-52-0x0000000005220000-0x0000000006220000-memory.dmp

                  Filesize

                  16.0MB

                • memory/3380-53-0x0000000005220000-0x0000000006220000-memory.dmp

                  Filesize

                  16.0MB

                • memory/3380-45-0x0000000005220000-0x0000000006220000-memory.dmp

                  Filesize

                  16.0MB

                • memory/3380-55-0x0000000017320000-0x0000000017340000-memory.dmp

                  Filesize

                  128KB

                • memory/3380-58-0x0000000005220000-0x0000000006220000-memory.dmp

                  Filesize

                  16.0MB

                • memory/3620-25-0x00000000613C0000-0x00000000613E2000-memory.dmp

                  Filesize

                  136KB

                • memory/4516-60-0x0000000001000000-0x0000000001036000-memory.dmp

                  Filesize

                  216KB

                • memory/4516-62-0x0000000002DE0000-0x0000000002E7F000-memory.dmp

                  Filesize

                  636KB

                • memory/4516-59-0x0000000002EF0000-0x000000000323A000-memory.dmp

                  Filesize

                  3.3MB

                • memory/4516-57-0x0000000001000000-0x0000000001036000-memory.dmp

                  Filesize

                  216KB

                • memory/4516-65-0x0000000001000000-0x0000000001036000-memory.dmp

                  Filesize

                  216KB

                • memory/4516-66-0x0000000002DE0000-0x0000000002E7F000-memory.dmp

                  Filesize

                  636KB

                • memory/4516-56-0x0000000001000000-0x0000000001036000-memory.dmp

                  Filesize

                  216KB