Analysis
-
max time kernel
147s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 12:05
Behavioral task
behavioral1
Sample
s.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
s.exe
Resource
win10v2004-20240226-en
General
-
Target
s.exe
-
Size
36KB
-
MD5
5ec6d91d2717b12c5168d1b8e6a6cfb9
-
SHA1
f5cb25beeb7b2bf46e68c62fdfc7c07d8b1844f0
-
SHA256
e55d4602fa8ddaee44f04d655c6d0084d31e5cd99125fb0d1f15e4b40a8ab4e0
-
SHA512
4176f4a909104b016b7b225e601d9749325574f924f4815038166af064ede499c45debed08f30424a59863cae8f937a21b20214b1a382b06237f66fd3cad9baf
-
SSDEEP
768:bycqOQ0bwMK2M3fQde8Pfymg0M9EQfRo0ys/KzB:OcqOQbB3fQc8Pfymg0yxpByxzB
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 3 IoCs
resource yara_rule behavioral2/memory/4692-1-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral2/files/0x0004000000022ea3-5.dat modiloader_stage2 behavioral2/memory/2212-10-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation s.exe -
Executes dropped EXE 1 IoCs
pid Process 2212 AdobeART.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AdobeART = "C:\\Users\\Admin\\AppData\\Roaming\\AdobeART.exe" AdobeART.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4692 wrote to memory of 2212 4692 s.exe 99 PID 4692 wrote to memory of 2212 4692 s.exe 99 PID 4692 wrote to memory of 2212 4692 s.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\s.exe"C:\Users\Admin\AppData\Local\Temp\s.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Users\Admin\AppData\Roaming\AdobeART.exe"C:\Users\Admin\AppData\Roaming\AdobeART.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4136 --field-trial-handle=2692,i,8678872182442199182,12502579059484928042,262144 --variations-seed-version /prefetch:81⤵PID:3916
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD55ec6d91d2717b12c5168d1b8e6a6cfb9
SHA1f5cb25beeb7b2bf46e68c62fdfc7c07d8b1844f0
SHA256e55d4602fa8ddaee44f04d655c6d0084d31e5cd99125fb0d1f15e4b40a8ab4e0
SHA5124176f4a909104b016b7b225e601d9749325574f924f4815038166af064ede499c45debed08f30424a59863cae8f937a21b20214b1a382b06237f66fd3cad9baf