Analysis

  • max time kernel
    180s
  • max time network
    186s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-12-2023 04:11

General

  • Target

    279e4b36527268f147af0f07e91bf272.exe

  • Size

    674KB

  • MD5

    279e4b36527268f147af0f07e91bf272

  • SHA1

    882d390271025a9fe766522707a6e55e71204c91

  • SHA256

    28e12f4eab7acab7b98bd0ffd6f5003bde0f0994da2497fdb9ce61dfda3c8a14

  • SHA512

    7baef741912ae5dd29475122ae9d387b7cc17cb5be43f926b7d40208d434c9b458075a2a302a358d3569b94aef9c08faf0fc978a1d26de2bfd2536ae0ddda092

  • SSDEEP

    12288:QZ2zG8GzJipNMQe6lmd0yS0C875TehNgNrAGEjIBKIPU1lHl35cUV/wr8URU3Z/:6cjMipNM36lmd0TkTVqGEjoKIIHlpcwB

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • UAC bypass 3 TTPs 1 IoCs
  • ModiLoader Second Stage 22 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NTFS ADS 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs
  • System policy modification 1 TTPs 1 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\279e4b36527268f147af0f07e91bf272.exe
    "C:\Users\Admin\AppData\Local\Temp\279e4b36527268f147af0f07e91bf272.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1728
    • C:\Users\Admin\AppData\Local\Temp\279e4b36527268f147af0f07e91bf272.exe
      C:\Users\Admin\AppData\Local\Temp\279e4b36527268f147af0f07e91bf272.exe
      2⤵
      • Checks computer location settings
      • Checks whether UAC is enabled
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1740
      • C:\Windows\mstwain32.exe
        "C:\Windows\mstwain32.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Drops file in Windows directory
        • NTFS ADS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4400
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3688
  • C:\Windows\mstwain32.exe
    C:\Windows\mstwain32.exe
    1⤵
    • UAC bypass
    • Executes dropped EXE
    • Loads dropped DLL
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • System policy modification
    PID:4980

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\DYA_UJRGBOUHHTEALCHTW\1.0.0\Data\app.dat

    Filesize

    971B

    MD5

    317acba37eb34096d15ed1e683dd1385

    SHA1

    7433c11079dcc5cf2c4bec9b2ea99ca1fdf18837

    SHA256

    6c2946b796c66f157bf5f6b02692a42a718db0e91a6aede5068ff422ff3189ac

    SHA512

    b07da81389c53ce0ca4421046cacd1640ec68f37b3c67c51c1ac31f69befcd50aecd8dba63a49dc5dbc645607808d49d9b23db237fff9027250401ab4e406738

  • C:\ProgramData\DYA_UJRGBOUHHTEALCHTW\1.0.0\Data\updates.dat

    Filesize

    971B

    MD5

    c343e422f5d303d4ce6be60ee3092b4a

    SHA1

    6ff22376e9156e7a7e0bb4408b22cb9592604715

    SHA256

    a7c3534c9587ae4e2f88b020579e88a5250a56fe957e5e2f984717880eff9017

    SHA512

    08aefd3697c405fb5a0b0a63a5daff41d4ba67cf400ac9b828bf5ac49f83f2e980aad7d820a63fe1de86b83edc71764035b323824c1e924abab73708898a5e37

  • C:\Users\Admin\AppData\Roaming\DYA_UJRGBOUHHTEALCHTW\1.0.0\Data\dya.dat

    Filesize

    971B

    MD5

    e1eb51da391c7f76b269b2d84be29e01

    SHA1

    e86a410f23e64771b8d42f5b48378e8dabd10923

    SHA256

    0507fe20ab862b39736a25eb13a03ece5bf14ad0bb883735ad9198a66e20b4e5

    SHA512

    5baa14a2914f6e1713af66ac882cf70145d283bee75f11bd1e5d192e3c8296bcead5bd595d989ba5960261a43e827475f607768a4e497e51d85627e0bc349cb2

  • memory/1728-61-0x0000000000400000-0x00000000004AA000-memory.dmp

    Filesize

    680KB

  • memory/1728-1-0x0000000000400000-0x00000000004AA000-memory.dmp

    Filesize

    680KB

  • memory/1728-2-0x0000000000400000-0x00000000004AA000-memory.dmp

    Filesize

    680KB

  • memory/1728-45-0x0000000000400000-0x00000000004AA000-memory.dmp

    Filesize

    680KB

  • memory/1728-44-0x0000000000400000-0x00000000004AA000-memory.dmp

    Filesize

    680KB

  • memory/1728-46-0x0000000000400000-0x00000000004AA000-memory.dmp

    Filesize

    680KB

  • memory/1728-49-0x0000000000400000-0x00000000004AA000-memory.dmp

    Filesize

    680KB

  • memory/1728-0-0x0000000000400000-0x00000000004AA000-memory.dmp

    Filesize

    680KB

  • memory/1740-128-0x0000000000A60000-0x0000000000A61000-memory.dmp

    Filesize

    4KB

  • memory/1740-74-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/1740-59-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/1740-57-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/1740-56-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/1740-55-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/1740-53-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/1740-51-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/1740-60-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/1740-78-0x0000000000A60000-0x0000000000A61000-memory.dmp

    Filesize

    4KB

  • memory/1740-50-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/4400-107-0x0000000000400000-0x00000000004AA000-memory.dmp

    Filesize

    680KB

  • memory/4400-104-0x0000000000400000-0x00000000004AA000-memory.dmp

    Filesize

    680KB

  • memory/4400-79-0x0000000000400000-0x00000000004AA000-memory.dmp

    Filesize

    680KB

  • memory/4400-75-0x0000000000400000-0x00000000004AA000-memory.dmp

    Filesize

    680KB

  • memory/4400-119-0x0000000000400000-0x00000000004AA000-memory.dmp

    Filesize

    680KB

  • memory/4400-103-0x0000000000400000-0x00000000004AA000-memory.dmp

    Filesize

    680KB

  • memory/4400-76-0x0000000000400000-0x00000000004AA000-memory.dmp

    Filesize

    680KB

  • memory/4980-126-0x0000000002460000-0x0000000002461000-memory.dmp

    Filesize

    4KB

  • memory/4980-133-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/4980-125-0x0000000000930000-0x0000000000931000-memory.dmp

    Filesize

    4KB

  • memory/4980-127-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/4980-120-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/4980-129-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/4980-130-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/4980-131-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/4980-132-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/4980-121-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/4980-134-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/4980-135-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/4980-136-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/4980-137-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/4980-138-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/4980-139-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/4980-140-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/4980-141-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB