Analysis
-
max time kernel
134s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/01/2024, 17:56
Static task
static1
Behavioral task
behavioral1
Sample
6ff1268d51431cadf2f47c3ec5916879.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6ff1268d51431cadf2f47c3ec5916879.exe
Resource
win10v2004-20231222-en
General
-
Target
6ff1268d51431cadf2f47c3ec5916879.exe
-
Size
577KB
-
MD5
6ff1268d51431cadf2f47c3ec5916879
-
SHA1
f104be510bccf61320e2d21209d9e93e62439b61
-
SHA256
d892a84a725b9756f0e155d7e0e89dc4dd6871ed09c381a8df5fecef4152d1f8
-
SHA512
747a82a44ffb730e0be11be6afd717d61578484aaad42aedc5fbe52d1d973d0d2041687273f605abbce8ca826b45407a02b166b0aec2e6a484f5299a362b14d6
-
SSDEEP
12288:F4FG8VIGj1D+cvxrh9AYkTNhwv0F3Z4mxxODqVTVOCJ:F4FG879V10QmXdVTzJ
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 8 IoCs
resource yara_rule behavioral1/files/0x002a000000014118-108.dat modiloader_stage2 behavioral1/memory/2056-110-0x0000000000400000-0x00000000004E3000-memory.dmp modiloader_stage2 behavioral1/memory/2780-114-0x00000000004C0000-0x000000000053C000-memory.dmp modiloader_stage2 behavioral1/memory/2780-115-0x00000000004C0000-0x000000000053C000-memory.dmp modiloader_stage2 behavioral1/memory/2780-116-0x00000000004C0000-0x000000000053C000-memory.dmp modiloader_stage2 behavioral1/memory/2780-118-0x00000000004C0000-0x000000000053C000-memory.dmp modiloader_stage2 behavioral1/memory/2780-120-0x00000000004C0000-0x000000000053C000-memory.dmp modiloader_stage2 behavioral1/memory/2780-124-0x00000000004C0000-0x000000000053C000-memory.dmp modiloader_stage2 -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\netns\Parameters\ServiceDll = "C:\\Windows\\System32\\dnsvr.dll" 6ff1268d51431cadf2f47c3ec5916879.exe -
Deletes itself 1 IoCs
pid Process 2880 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 2780 svchost.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\netservice.exe 6ff1268d51431cadf2f47c3ec5916879.exe File opened for modification C:\Windows\SysWOW64\netservice.exe 6ff1268d51431cadf2f47c3ec5916879.exe File created C:\Windows\SysWOW64\dnsvr.dll 6ff1268d51431cadf2f47c3ec5916879.exe File opened for modification C:\Windows\SysWOW64\dnsvr.dll 6ff1268d51431cadf2f47c3ec5916879.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2056 6ff1268d51431cadf2f47c3ec5916879.exe 2056 6ff1268d51431cadf2f47c3ec5916879.exe 2056 6ff1268d51431cadf2f47c3ec5916879.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeBackupPrivilege 2056 6ff1268d51431cadf2f47c3ec5916879.exe Token: SeRestorePrivilege 2056 6ff1268d51431cadf2f47c3ec5916879.exe Token: SeRestorePrivilege 2056 6ff1268d51431cadf2f47c3ec5916879.exe Token: SeRestorePrivilege 2056 6ff1268d51431cadf2f47c3ec5916879.exe Token: SeRestorePrivilege 2056 6ff1268d51431cadf2f47c3ec5916879.exe Token: SeRestorePrivilege 2056 6ff1268d51431cadf2f47c3ec5916879.exe Token: SeBackupPrivilege 2056 6ff1268d51431cadf2f47c3ec5916879.exe Token: SeRestorePrivilege 2056 6ff1268d51431cadf2f47c3ec5916879.exe Token: SeRestorePrivilege 2056 6ff1268d51431cadf2f47c3ec5916879.exe Token: SeRestorePrivilege 2056 6ff1268d51431cadf2f47c3ec5916879.exe Token: SeRestorePrivilege 2056 6ff1268d51431cadf2f47c3ec5916879.exe Token: SeRestorePrivilege 2056 6ff1268d51431cadf2f47c3ec5916879.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2056 wrote to memory of 2880 2056 6ff1268d51431cadf2f47c3ec5916879.exe 31 PID 2056 wrote to memory of 2880 2056 6ff1268d51431cadf2f47c3ec5916879.exe 31 PID 2056 wrote to memory of 2880 2056 6ff1268d51431cadf2f47c3ec5916879.exe 31 PID 2056 wrote to memory of 2880 2056 6ff1268d51431cadf2f47c3ec5916879.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\6ff1268d51431cadf2f47c3ec5916879.exe"C:\Users\Admin\AppData\Local\Temp\6ff1268d51431cadf2f47c3ec5916879.exe"1⤵
- Sets DLL path for service in the registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\6ff1268d51431cadf2f47c3ec5916879.exe"2⤵
- Deletes itself
PID:2880
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netns1⤵PID:2448
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netns1⤵
- Loads dropped DLL
PID:2780
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
476KB
MD59b530fa4299fe0e3cfd2cfd7a8818992
SHA1d34bf2e10ed04d698bead5555c8427129f9df609
SHA25625101109148a7676b6b4f359ad252ab860edecb70da5de47732270e8347c275d
SHA5121425af01088f61cebfc8a3bad2f3924039064c81b3b9208b03591d268695e6f5c192728275f58b7255b5e882b931a50103729875d51eea528be76d797203bc46