Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
09/01/2024, 11:06
Behavioral task
behavioral1
Sample
4e22775699416e81275fea3266e14bba.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4e22775699416e81275fea3266e14bba.exe
Resource
win10v2004-20231222-en
General
-
Target
4e22775699416e81275fea3266e14bba.exe
-
Size
138KB
-
MD5
4e22775699416e81275fea3266e14bba
-
SHA1
32cc2479a30abd1b40b3b7e959ac32317fa124fd
-
SHA256
95dc812e94d5ba0842af45685ca7262b55607336fcf4becda83dbb6416beffa9
-
SHA512
34b13e9142a9c4251c78d876f02f9e86f22253950d3f9126dacd8ec6f0f3bbd36146381ce16b130d794c4bbc1ba08aa4df8e2e7af0c3900035d486242c81e3bf
-
SSDEEP
3072:oPinzlxMF/kJaTcig4l4V+U9yg0Url/9CqUfh:oPipyF/T1MwOd8T
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral2/memory/1492-3-0x0000000000400000-0x000000000041B000-memory.dmp modiloader_stage2 -
resource yara_rule behavioral2/memory/4064-0-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4064-1-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4064-5-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4064-7-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4064-6-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4064-8-0x0000000000400000-0x0000000000427000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 4e22775699416e81275fea3266e14bba.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 4e22775699416e81275fea3266e14bba.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1492 set thread context of 4064 1492 4e22775699416e81275fea3266e14bba.exe 92 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4064 4e22775699416e81275fea3266e14bba.exe 4064 4e22775699416e81275fea3266e14bba.exe 4064 4e22775699416e81275fea3266e14bba.exe 4064 4e22775699416e81275fea3266e14bba.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1492 wrote to memory of 4064 1492 4e22775699416e81275fea3266e14bba.exe 92 PID 1492 wrote to memory of 4064 1492 4e22775699416e81275fea3266e14bba.exe 92 PID 1492 wrote to memory of 4064 1492 4e22775699416e81275fea3266e14bba.exe 92 PID 1492 wrote to memory of 4064 1492 4e22775699416e81275fea3266e14bba.exe 92 PID 1492 wrote to memory of 4064 1492 4e22775699416e81275fea3266e14bba.exe 92 PID 1492 wrote to memory of 4064 1492 4e22775699416e81275fea3266e14bba.exe 92 PID 1492 wrote to memory of 4064 1492 4e22775699416e81275fea3266e14bba.exe 92 PID 1492 wrote to memory of 4064 1492 4e22775699416e81275fea3266e14bba.exe 92 PID 1492 wrote to memory of 4064 1492 4e22775699416e81275fea3266e14bba.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e22775699416e81275fea3266e14bba.exe"C:\Users\Admin\AppData\Local\Temp\4e22775699416e81275fea3266e14bba.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\4e22775699416e81275fea3266e14bba.exe4e22775699416e81275fea3266e14bba.exe2⤵
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
PID:4064
-