Analysis
-
max time kernel
135s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/01/2024, 07:10
Static task
static1
Behavioral task
behavioral1
Sample
7f363cdb63cc212982928c9770fa9ea4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7f363cdb63cc212982928c9770fa9ea4.exe
Resource
win10v2004-20231215-en
General
-
Target
7f363cdb63cc212982928c9770fa9ea4.exe
-
Size
369KB
-
MD5
7f363cdb63cc212982928c9770fa9ea4
-
SHA1
ce563062ab491a1187008c45f0ca21a56bb65dd8
-
SHA256
5902e474c2ec6955cc08b0d209960a3e52e90b169ca6bd7e05a8460eeef5eabe
-
SHA512
2b43e2dcae3888141f18d9dc1a08c13b2899b11cd8248369c3a35a0773cb87bce0ad8845940fb0cc917ea6bd046ca77ada1a0d7033409ce430cb76b35c04c505
-
SSDEEP
6144:jiqqeROq+9nBwSNxRVNexqtLpw9j37UbV2jy7YMUosWb+msy92NgvpnoJtEh:JQPqIixv9j3YV2y7YMUosWb+Fy2anwWh
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\System32\\userinit.exe,\"C:\\Users\\Admin\\Favorites\\netservice.exe\"un userinit.exe" IOQJ.exe -
ModiLoader Second Stage 9 IoCs
resource yara_rule behavioral1/files/0x0009000000012261-15.dat modiloader_stage2 behavioral1/files/0x000e000000015584-41.dat modiloader_stage2 behavioral1/memory/2580-53-0x0000000000400000-0x0000000000447000-memory.dmp modiloader_stage2 behavioral1/memory/1708-56-0x0000000000400000-0x000000000046E000-memory.dmp modiloader_stage2 behavioral1/memory/2640-59-0x0000000000240000-0x00000000002C4000-memory.dmp modiloader_stage2 behavioral1/memory/2640-62-0x0000000000240000-0x00000000002C4000-memory.dmp modiloader_stage2 behavioral1/memory/2640-66-0x0000000000240000-0x00000000002C4000-memory.dmp modiloader_stage2 behavioral1/memory/2640-70-0x0000000000240000-0x00000000002C4000-memory.dmp modiloader_stage2 behavioral1/memory/2640-78-0x0000000000240000-0x00000000002C4000-memory.dmp modiloader_stage2 -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\netns\Parameters\ServiceDll = "C:\\Windows\\System32\\sysns.dll" IOQJ.exe -
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0009000000015c51-51.dat acprotect -
Executes dropped EXE 2 IoCs
pid Process 2528 RunMgr.EXE 2580 IOQJ.exe -
Loads dropped DLL 3 IoCs
pid Process 2528 RunMgr.EXE 2528 RunMgr.EXE 2640 svchost.exe -
resource yara_rule behavioral1/files/0x0009000000015c51-51.dat upx behavioral1/memory/2640-55-0x0000000000240000-0x00000000002C4000-memory.dmp upx behavioral1/memory/2640-59-0x0000000000240000-0x00000000002C4000-memory.dmp upx behavioral1/memory/2640-62-0x0000000000240000-0x00000000002C4000-memory.dmp upx behavioral1/memory/2640-66-0x0000000000240000-0x00000000002C4000-memory.dmp upx behavioral1/memory/2640-70-0x0000000000240000-0x00000000002C4000-memory.dmp upx behavioral1/memory/2640-78-0x0000000000240000-0x00000000002C4000-memory.dmp upx -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 7f363cdb63cc212982928c9770fa9ea4.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\sysns.dll IOQJ.exe File opened for modification C:\Windows\SysWOW64\sysns.dll IOQJ.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\RunMgr.EXE 7f363cdb63cc212982928c9770fa9ea4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1708 7f363cdb63cc212982928c9770fa9ea4.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1708 wrote to memory of 2528 1708 7f363cdb63cc212982928c9770fa9ea4.exe 30 PID 1708 wrote to memory of 2528 1708 7f363cdb63cc212982928c9770fa9ea4.exe 30 PID 1708 wrote to memory of 2528 1708 7f363cdb63cc212982928c9770fa9ea4.exe 30 PID 1708 wrote to memory of 2528 1708 7f363cdb63cc212982928c9770fa9ea4.exe 30 PID 1708 wrote to memory of 2284 1708 7f363cdb63cc212982928c9770fa9ea4.exe 29 PID 1708 wrote to memory of 2284 1708 7f363cdb63cc212982928c9770fa9ea4.exe 29 PID 1708 wrote to memory of 2284 1708 7f363cdb63cc212982928c9770fa9ea4.exe 29 PID 1708 wrote to memory of 2284 1708 7f363cdb63cc212982928c9770fa9ea4.exe 29 PID 1708 wrote to memory of 2020 1708 7f363cdb63cc212982928c9770fa9ea4.exe 31 PID 1708 wrote to memory of 2020 1708 7f363cdb63cc212982928c9770fa9ea4.exe 31 PID 1708 wrote to memory of 2020 1708 7f363cdb63cc212982928c9770fa9ea4.exe 31 PID 1708 wrote to memory of 2020 1708 7f363cdb63cc212982928c9770fa9ea4.exe 31 PID 2528 wrote to memory of 2580 2528 RunMgr.EXE 32 PID 2528 wrote to memory of 2580 2528 RunMgr.EXE 32 PID 2528 wrote to memory of 2580 2528 RunMgr.EXE 32 PID 2528 wrote to memory of 2580 2528 RunMgr.EXE 32 PID 2528 wrote to memory of 2744 2528 RunMgr.EXE 34 PID 2528 wrote to memory of 2744 2528 RunMgr.EXE 34 PID 2528 wrote to memory of 2744 2528 RunMgr.EXE 34 PID 2528 wrote to memory of 2744 2528 RunMgr.EXE 34 PID 2580 wrote to memory of 2696 2580 IOQJ.exe 36 PID 2580 wrote to memory of 2696 2580 IOQJ.exe 36 PID 2580 wrote to memory of 2696 2580 IOQJ.exe 36 PID 2580 wrote to memory of 2696 2580 IOQJ.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\7f363cdb63cc212982928c9770fa9ea4.exe"C:\Users\Admin\AppData\Local\Temp\7f363cdb63cc212982928c9770fa9ea4.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\cmd.execmd.exe /c del %SystemRoot%\Debug.exe2⤵PID:2284
-
-
C:\Windows\RunMgr.EXE"C:\Windows\RunMgr.EXE"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\IOQJ.exe"C:\Users\Admin\AppData\Local\Temp\IOQJ.exe"3⤵
- Modifies WinLogon for persistence
- Sets DLL path for service in the registry
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\IOQJ.exe"4⤵PID:2696
-
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\»Æ½ðÕʺÅ.txt3⤵PID:2744
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\7F363C~1.EXE > nul2⤵PID:2020
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k network1⤵
- Loads dropped DLL
PID:2640
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Pre-OS Boot
1Bootkit
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
265KB
MD5256a31388e297e32461ea5db14686447
SHA10117eda444b4905384ecda5caef53049112ae231
SHA256e7a0714d6854396c3022528354170780e0587a6a214db38824f8039a8381b71b
SHA5124bb5bfabe07dd3d6f92c6f4727bc9ad8c4d785afc53642e877840f5010919d30e2925309ff15f0d54e291e8f2fc11e8709b66d312db7e2c0ae1529453e29359e
-
Filesize
495B
MD54738cce5bb28ffefd41079d2b021d23a
SHA1f7037a36b40287d74b6d9f9104fa85b7a18e1b84
SHA256b90086be71a1d5046ed85cdfd3fb3e4934b7e03ada119e2168bdcfbd36f0c2c2
SHA51297f0535b5516b3c1bb40fe58cb17fba1077656f5b7abbdb62d0b35cc23e5913c9f4b87c94389f13f5dc7edb69954a83ad2bd39ea7ec5f77da460685c88bdb9e8
-
Filesize
289KB
MD5cf3c0efbac5ce00742b8406e1ab3934f
SHA134cf7bbb3d56d36d9838633fa9efc683f9bef793
SHA256039ec23ccf0ae73c15fc9703d2f08da448e930b5c1d9ab02e8657422d9f1bfcb
SHA51290e84e328f7496e489ddddcec937f10c27fdbbbc7699726e38b9419b45b0ca2955bdd1e6c3447b979071ee395fb2344e7024bee866f19af57a57714f6d337eb9
-
Filesize
191KB
MD5007fb208b6cde541b9e4f372bb1ad186
SHA10f54350aa21ef2935b4d8b62f6c0455ca0d32174
SHA25684a510265baaaace2dc3b053480299a34b5a8a9f7302788764ee75d4f8b6dc59
SHA512dfb32a988801905dec5aeb772702dc7467c83c4fd330874990bc742a7177006ba7cac58d855e4b504176d3667badf4ef9535e4d3bde832d6ed8febd9e522e8a3