Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
22/01/2024, 17:56
Static task
static1
Behavioral task
behavioral1
Sample
6ff1268d51431cadf2f47c3ec5916879.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6ff1268d51431cadf2f47c3ec5916879.exe
Resource
win10v2004-20231222-en
General
-
Target
6ff1268d51431cadf2f47c3ec5916879.exe
-
Size
577KB
-
MD5
6ff1268d51431cadf2f47c3ec5916879
-
SHA1
f104be510bccf61320e2d21209d9e93e62439b61
-
SHA256
d892a84a725b9756f0e155d7e0e89dc4dd6871ed09c381a8df5fecef4152d1f8
-
SHA512
747a82a44ffb730e0be11be6afd717d61578484aaad42aedc5fbe52d1d973d0d2041687273f605abbce8ca826b45407a02b166b0aec2e6a484f5299a362b14d6
-
SSDEEP
12288:F4FG8VIGj1D+cvxrh9AYkTNhwv0F3Z4mxxODqVTVOCJ:F4FG879V10QmXdVTzJ
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 8 IoCs
resource yara_rule behavioral2/files/0x000a000000023109-98.dat modiloader_stage2 behavioral2/memory/2744-107-0x0000000000400000-0x00000000004E3000-memory.dmp modiloader_stage2 behavioral2/memory/4984-111-0x0000000000400000-0x000000000047C000-memory.dmp modiloader_stage2 behavioral2/memory/4984-112-0x0000000000400000-0x000000000047C000-memory.dmp modiloader_stage2 behavioral2/memory/4984-114-0x0000000000400000-0x000000000047C000-memory.dmp modiloader_stage2 behavioral2/memory/4984-116-0x0000000000400000-0x000000000047C000-memory.dmp modiloader_stage2 behavioral2/memory/4984-120-0x0000000000400000-0x000000000047C000-memory.dmp modiloader_stage2 behavioral2/memory/4984-124-0x0000000000400000-0x000000000047C000-memory.dmp modiloader_stage2 -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\netns\Parameters\ServiceDll = "C:\\Windows\\System32\\dnsvr.dll" 6ff1268d51431cadf2f47c3ec5916879.exe -
Loads dropped DLL 1 IoCs
pid Process 4984 svchost.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\netservice.exe 6ff1268d51431cadf2f47c3ec5916879.exe File opened for modification C:\Windows\SysWOW64\netservice.exe 6ff1268d51431cadf2f47c3ec5916879.exe File created C:\Windows\SysWOW64\dnsvr.dll 6ff1268d51431cadf2f47c3ec5916879.exe File opened for modification C:\Windows\SysWOW64\dnsvr.dll 6ff1268d51431cadf2f47c3ec5916879.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2744 6ff1268d51431cadf2f47c3ec5916879.exe 2744 6ff1268d51431cadf2f47c3ec5916879.exe 2744 6ff1268d51431cadf2f47c3ec5916879.exe 2744 6ff1268d51431cadf2f47c3ec5916879.exe 2744 6ff1268d51431cadf2f47c3ec5916879.exe 2744 6ff1268d51431cadf2f47c3ec5916879.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeBackupPrivilege 2744 6ff1268d51431cadf2f47c3ec5916879.exe Token: SeRestorePrivilege 2744 6ff1268d51431cadf2f47c3ec5916879.exe Token: SeRestorePrivilege 2744 6ff1268d51431cadf2f47c3ec5916879.exe Token: SeRestorePrivilege 2744 6ff1268d51431cadf2f47c3ec5916879.exe Token: SeRestorePrivilege 2744 6ff1268d51431cadf2f47c3ec5916879.exe Token: SeRestorePrivilege 2744 6ff1268d51431cadf2f47c3ec5916879.exe Token: SeBackupPrivilege 2744 6ff1268d51431cadf2f47c3ec5916879.exe Token: SeRestorePrivilege 2744 6ff1268d51431cadf2f47c3ec5916879.exe Token: SeRestorePrivilege 2744 6ff1268d51431cadf2f47c3ec5916879.exe Token: SeRestorePrivilege 2744 6ff1268d51431cadf2f47c3ec5916879.exe Token: SeRestorePrivilege 2744 6ff1268d51431cadf2f47c3ec5916879.exe Token: SeRestorePrivilege 2744 6ff1268d51431cadf2f47c3ec5916879.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2744 wrote to memory of 1324 2744 6ff1268d51431cadf2f47c3ec5916879.exe 90 PID 2744 wrote to memory of 1324 2744 6ff1268d51431cadf2f47c3ec5916879.exe 90 PID 2744 wrote to memory of 1324 2744 6ff1268d51431cadf2f47c3ec5916879.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\6ff1268d51431cadf2f47c3ec5916879.exe"C:\Users\Admin\AppData\Local\Temp\6ff1268d51431cadf2f47c3ec5916879.exe"1⤵
- Sets DLL path for service in the registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\6ff1268d51431cadf2f47c3ec5916879.exe"2⤵PID:1324
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netns1⤵
- Loads dropped DLL
PID:4984
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
476KB
MD59b530fa4299fe0e3cfd2cfd7a8818992
SHA1d34bf2e10ed04d698bead5555c8427129f9df609
SHA25625101109148a7676b6b4f359ad252ab860edecb70da5de47732270e8347c275d
SHA5121425af01088f61cebfc8a3bad2f3924039064c81b3b9208b03591d268695e6f5c192728275f58b7255b5e882b931a50103729875d51eea528be76d797203bc46