Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2023, 17:53
Static task
static1
Behavioral task
behavioral1
Sample
091fbd8d1a58a54f7d71cb449a3da0ccd6a845950017209d88e25d7b685a1bb7.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
091fbd8d1a58a54f7d71cb449a3da0ccd6a845950017209d88e25d7b685a1bb7.exe
Resource
win10v2004-20231020-en
General
-
Target
091fbd8d1a58a54f7d71cb449a3da0ccd6a845950017209d88e25d7b685a1bb7.exe
-
Size
1.8MB
-
MD5
95af57a740c5db3e1e52cdb5355daa28
-
SHA1
02fa230076b630be472086ffefa77a1a7a9a542c
-
SHA256
091fbd8d1a58a54f7d71cb449a3da0ccd6a845950017209d88e25d7b685a1bb7
-
SHA512
6fc5d5fb4274a262e0bec4306b67656ffe51020ce9902e1d8e9e979bf6d01dc4bb23cfa2a4fb8babea7b82709023b58a42e4461065b3244537471ed51da5ad71
-
SSDEEP
49152:bee0SeGwcSGQ3OvlzgzRlyYFT9xZdmPSw:blMGNQ3ywXFJQ
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral2/memory/1124-3-0x00000000048B0000-0x00000000058B0000-memory.dmp modiloader_stage2 -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Gnbqkrmu = "C:\\Users\\Public\\Gnbqkrmu.url" 091fbd8d1a58a54f7d71cb449a3da0ccd6a845950017209d88e25d7b685a1bb7.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1712 set thread context of 3132 1712 colorcpl.exe 30 PID 1712 set thread context of 4880 1712 colorcpl.exe 96 PID 4880 set thread context of 3132 4880 wscript.exe 30 -
description ioc Process Key created \Registry\User\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 wscript.exe -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 22 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 24 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 52 IoCs
pid Process 1124 091fbd8d1a58a54f7d71cb449a3da0ccd6a845950017209d88e25d7b685a1bb7.exe 1124 091fbd8d1a58a54f7d71cb449a3da0ccd6a845950017209d88e25d7b685a1bb7.exe 1712 colorcpl.exe 1712 colorcpl.exe 1712 colorcpl.exe 1712 colorcpl.exe 1712 colorcpl.exe 1712 colorcpl.exe 1712 colorcpl.exe 1712 colorcpl.exe 1712 colorcpl.exe 1712 colorcpl.exe 1712 colorcpl.exe 1712 colorcpl.exe 1712 colorcpl.exe 1712 colorcpl.exe 1712 colorcpl.exe 1712 colorcpl.exe 4880 wscript.exe 4880 wscript.exe 4880 wscript.exe 4880 wscript.exe 4880 wscript.exe 4880 wscript.exe 4880 wscript.exe 4880 wscript.exe 4880 wscript.exe 4880 wscript.exe 4880 wscript.exe 4880 wscript.exe 4880 wscript.exe 4880 wscript.exe 4880 wscript.exe 4880 wscript.exe 4880 wscript.exe 4880 wscript.exe 4880 wscript.exe 4880 wscript.exe 4880 wscript.exe 4880 wscript.exe 4880 wscript.exe 4880 wscript.exe 4880 wscript.exe 4880 wscript.exe 4880 wscript.exe 4880 wscript.exe 4880 wscript.exe 4880 wscript.exe 4880 wscript.exe 4880 wscript.exe 4880 wscript.exe 4880 wscript.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3132 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 1712 colorcpl.exe 3132 Explorer.EXE 3132 Explorer.EXE 4880 wscript.exe 4880 wscript.exe 4880 wscript.exe 4880 wscript.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1712 colorcpl.exe Token: SeShutdownPrivilege 3132 Explorer.EXE Token: SeCreatePagefilePrivilege 3132 Explorer.EXE Token: SeShutdownPrivilege 3132 Explorer.EXE Token: SeCreatePagefilePrivilege 3132 Explorer.EXE Token: SeDebugPrivilege 4880 wscript.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3132 Explorer.EXE -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1124 wrote to memory of 1712 1124 091fbd8d1a58a54f7d71cb449a3da0ccd6a845950017209d88e25d7b685a1bb7.exe 94 PID 1124 wrote to memory of 1712 1124 091fbd8d1a58a54f7d71cb449a3da0ccd6a845950017209d88e25d7b685a1bb7.exe 94 PID 1124 wrote to memory of 1712 1124 091fbd8d1a58a54f7d71cb449a3da0ccd6a845950017209d88e25d7b685a1bb7.exe 94 PID 1124 wrote to memory of 1712 1124 091fbd8d1a58a54f7d71cb449a3da0ccd6a845950017209d88e25d7b685a1bb7.exe 94 PID 3132 wrote to memory of 4880 3132 Explorer.EXE 96 PID 3132 wrote to memory of 4880 3132 Explorer.EXE 96 PID 3132 wrote to memory of 4880 3132 Explorer.EXE 96 PID 4880 wrote to memory of 1144 4880 wscript.exe 97 PID 4880 wrote to memory of 1144 4880 wscript.exe 97 PID 4880 wrote to memory of 1144 4880 wscript.exe 97
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Users\Admin\AppData\Local\Temp\091fbd8d1a58a54f7d71cb449a3da0ccd6a845950017209d88e25d7b685a1bb7.exe"C:\Users\Admin\AppData\Local\Temp\091fbd8d1a58a54f7d71cb449a3da0ccd6a845950017209d88e25d7b685a1bb7.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Windows\SysWOW64\colorcpl.exeC:\Windows\System32\colorcpl.exe3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1712
-
-
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:1144
-
-