Analysis
-
max time kernel
140s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
14/01/2024, 18:34
Static task
static1
Behavioral task
behavioral1
Sample
5b8ee624533eb1d03a75434c844d2020.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5b8ee624533eb1d03a75434c844d2020.exe
Resource
win10v2004-20231222-en
General
-
Target
5b8ee624533eb1d03a75434c844d2020.exe
-
Size
879KB
-
MD5
5b8ee624533eb1d03a75434c844d2020
-
SHA1
7e75be02565fa941adb52f285c6011dca1046895
-
SHA256
b82eb14e16332ed4abdaf6acddf4914e014fd387420c5352b57327a6de138451
-
SHA512
c200d7d0b155669c9b165b4eb6ac9f4e47c9f280e323b05be3f6ea114e0dda14b5d2b841e932037f67defc18f21c67ae97abd1f4b7d9dc2364f03e1927acd1b0
-
SSDEEP
24576:AktzYJvF6LiD/iZ4Il10mOgiMSDVEk5Xfax604:AkhovD/iaIU0eVjCxA
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5b8ee624533eb1d03a75434c844d2020.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ apocalyps32.exe -
ModiLoader Second Stage 4 IoCs
resource yara_rule behavioral2/memory/1900-2-0x0000000000010000-0x00000000001E9000-memory.dmp modiloader_stage2 behavioral2/memory/1900-7-0x0000000000010000-0x00000000001E9000-memory.dmp modiloader_stage2 behavioral2/memory/2740-8-0x0000000000010000-0x00000000001E9000-memory.dmp modiloader_stage2 behavioral2/memory/2740-11-0x0000000000010000-0x00000000001E9000-memory.dmp modiloader_stage2 -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Wine 5b8ee624533eb1d03a75434c844d2020.exe Key opened \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Wine apocalyps32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1900 5b8ee624533eb1d03a75434c844d2020.exe 2740 apocalyps32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1900 5b8ee624533eb1d03a75434c844d2020.exe 1900 5b8ee624533eb1d03a75434c844d2020.exe 2740 apocalyps32.exe 2740 apocalyps32.exe -
Suspicious behavior: RenamesItself 2 IoCs
pid Process 1900 5b8ee624533eb1d03a75434c844d2020.exe 2740 apocalyps32.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1900 wrote to memory of 2740 1900 5b8ee624533eb1d03a75434c844d2020.exe 64 PID 1900 wrote to memory of 2740 1900 5b8ee624533eb1d03a75434c844d2020.exe 64 PID 1900 wrote to memory of 2740 1900 5b8ee624533eb1d03a75434c844d2020.exe 64 PID 2740 wrote to memory of 1936 2740 apocalyps32.exe 91 PID 2740 wrote to memory of 1936 2740 apocalyps32.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b8ee624533eb1d03a75434c844d2020.exe"C:\Users\Admin\AppData\Local\Temp\5b8ee624533eb1d03a75434c844d2020.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\apocalyps32.exe-bs2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe-bs3⤵PID:1936
-
-