Analysis
-
max time kernel
58s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
12/01/2024, 19:44
Static task
static1
Behavioral task
behavioral1
Sample
5757d5ec03e99b277a43c48e87ebe048.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
5757d5ec03e99b277a43c48e87ebe048.exe
Resource
win10v2004-20231215-en
General
-
Target
5757d5ec03e99b277a43c48e87ebe048.exe
-
Size
331KB
-
MD5
5757d5ec03e99b277a43c48e87ebe048
-
SHA1
7bf820845a432e67211624403768247700dd5e85
-
SHA256
134a0c288f08cb49f7748de5f9a825117c52a66f6c3d17452e2a771c5c11d806
-
SHA512
8aff3b4c32d78140a7b16a2e96af71a4b2d188cdd6b6424f9cfd15d45874ebb3b70c497872cf5755a9a6ba723927fce20bd3eb266bddda088a3d0fe5f4befe4c
-
SSDEEP
6144:aXlo65DDwUIvE4XZr0tELTS9EF4Sn4R5ZifT48keatK6ROt7Zhdelq2Acrc:ODwUuEk/SA4wsy48ke4RO+lq7crc
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 10 IoCs
resource yara_rule behavioral1/memory/2524-11-0x0000000000400000-0x000000000044C000-memory.dmp modiloader_stage2 behavioral1/memory/2524-10-0x0000000000400000-0x000000000044C000-memory.dmp modiloader_stage2 behavioral1/memory/2524-9-0x0000000000400000-0x000000000044C000-memory.dmp modiloader_stage2 behavioral1/memory/2524-8-0x0000000000400000-0x000000000044C000-memory.dmp modiloader_stage2 behavioral1/memory/2524-20-0x0000000000400000-0x000000000044C000-memory.dmp modiloader_stage2 behavioral1/memory/1628-49-0x0000000000400000-0x000000000044C000-memory.dmp modiloader_stage2 behavioral1/memory/1628-42-0x0000000000400000-0x000000000044C000-memory.dmp modiloader_stage2 behavioral1/memory/1628-41-0x0000000000400000-0x000000000044C000-memory.dmp modiloader_stage2 behavioral1/memory/1628-40-0x0000000000400000-0x000000000044C000-memory.dmp modiloader_stage2 behavioral1/memory/1628-60-0x0000000000400000-0x000000000044C000-memory.dmp modiloader_stage2 -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 5757d5ec03e99b277a43c48e87ebe048.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2760 set thread context of 2524 2760 5757d5ec03e99b277a43c48e87ebe048.exe 30 -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2524 5757d5ec03e99b277a43c48e87ebe048.exe Token: SeBackupPrivilege 2856 vssvc.exe Token: SeRestorePrivilege 2856 vssvc.exe Token: SeAuditPrivilege 2856 vssvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2760 wrote to memory of 2524 2760 5757d5ec03e99b277a43c48e87ebe048.exe 30 PID 2760 wrote to memory of 2524 2760 5757d5ec03e99b277a43c48e87ebe048.exe 30 PID 2760 wrote to memory of 2524 2760 5757d5ec03e99b277a43c48e87ebe048.exe 30 PID 2760 wrote to memory of 2524 2760 5757d5ec03e99b277a43c48e87ebe048.exe 30 PID 2760 wrote to memory of 2524 2760 5757d5ec03e99b277a43c48e87ebe048.exe 30 PID 2760 wrote to memory of 2524 2760 5757d5ec03e99b277a43c48e87ebe048.exe 30 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\5757d5ec03e99b277a43c48e87ebe048.exe"C:\Users\Admin\AppData\Local\Temp\5757d5ec03e99b277a43c48e87ebe048.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\5757d5ec03e99b277a43c48e87ebe048.exeC:\Users\Admin\AppData\Local\Temp\5757d5ec03e99b277a43c48e87ebe048.exe2⤵
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
PID:2524 -
C:\Windows\mstwain32.exe"C:\Windows\mstwain32.exe"3⤵PID:556
-
C:\Windows\mstwain32.exeC:\Windows\mstwain32.exe4⤵PID:1628
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2856
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD5fd9ef34d0769f24cce3f3243431650e2
SHA1a729396511ec2ece5d421ed93f3f89a067cd998c
SHA256c3af58121b840881e6f55e0ef0591dbad1548801c4a0ef34f50e90d54cfc72ab
SHA51288ecf37e4502acf68da2131f78438e7bc09b14a3e30a5eab22c31eb58c1b57be39a8a81f7677f5559a753737281865bfcba2c97c3ba0532ebaf3cffb700b65bc
-
Filesize
92KB
MD57ace51855fe5e514d99c7e81f68f44eb
SHA1fec4f4fee641991716a619825ef31a45522f5de5
SHA2564bff8d80423bc6e34a2b0921544b35916aeeeef6cc91a9dc5e353a03a9b1286a
SHA5128ca1637b36249d7caadf4d5266ec0535ca5ae182fc6cc6fadcf2b7f9573bce31e087e03d1a27065029ffd7b8a48dee6173eda4e007104e944e6b249645c09177
-
Filesize
16KB
MD546154a1df20f5c910a9d590c06f4a693
SHA1c3712e13e2f509ea35adcd8f7c5a43a2ccb77666
SHA2561258fd8ecf5d386525d5ba50f9a96f06bd828aa44e1ee3d4c3fa2dd89a49591b
SHA512718d933a26e6b932fe5033dbf968b035885dfbbc6a5568921fd37cee9d65086d5708c421375d74a4d5d03c5967e67b7ebe32261ba50f1baacc6d51bedc3709fb