Analysis
-
max time kernel
145s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26/03/2024, 19:42
Static task
static1
Behavioral task
behavioral1
Sample
dff1be24e79ca88d0015556ca63e9531.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
dff1be24e79ca88d0015556ca63e9531.exe
Resource
win10v2004-20240226-en
General
-
Target
dff1be24e79ca88d0015556ca63e9531.exe
-
Size
866KB
-
MD5
dff1be24e79ca88d0015556ca63e9531
-
SHA1
81e7c9edea8a1c30932fc09f7a3b6079877a5961
-
SHA256
d61866514e2dd4fe6bbd8c5483145b1f4ea54f49f52f5365c4c3c7c33c8ef6aa
-
SHA512
7eabe1655dcf909cb6b572e3715b690c0fdd3c3034891cb258df414f75f274f0ec4ffb5c7aa2e43f09ef5e1145e1519d96bc707cb853c7b727c4b6535dfc5adb
-
SSDEEP
12288:Hmmo7YNQzGnBaWnBsPDqWOFqetuiaSwXb0lvIfU+5wOAjgctw3+syodhw3a2:GvwQyBaWnBCqyaaNCM2OAjguDqhwq2
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" svchost.exe -
ModiLoader Second Stage 24 IoCs
resource yara_rule behavioral1/memory/1540-4-0x0000000000400000-0x0000000000445000-memory.dmp modiloader_stage2 behavioral1/memory/1540-5-0x0000000000400000-0x0000000000445000-memory.dmp modiloader_stage2 behavioral1/memory/1540-7-0x0000000000400000-0x0000000000445000-memory.dmp modiloader_stage2 behavioral1/memory/1540-8-0x0000000000400000-0x0000000000445000-memory.dmp modiloader_stage2 behavioral1/memory/1540-10-0x0000000000400000-0x0000000000445000-memory.dmp modiloader_stage2 behavioral1/memory/1540-14-0x00000000028B0000-0x00000000028C0000-memory.dmp modiloader_stage2 behavioral1/memory/1540-22-0x0000000000400000-0x0000000000445000-memory.dmp modiloader_stage2 behavioral1/memory/1696-35-0x0000000000400000-0x0000000000445000-memory.dmp modiloader_stage2 behavioral1/memory/1696-36-0x0000000000400000-0x0000000000445000-memory.dmp modiloader_stage2 behavioral1/memory/1696-37-0x0000000000400000-0x0000000000445000-memory.dmp modiloader_stage2 behavioral1/memory/1696-43-0x0000000000400000-0x0000000000445000-memory.dmp modiloader_stage2 behavioral1/memory/1696-45-0x0000000000400000-0x0000000000445000-memory.dmp modiloader_stage2 behavioral1/memory/1696-46-0x0000000000400000-0x0000000000445000-memory.dmp modiloader_stage2 behavioral1/memory/1696-47-0x0000000000400000-0x0000000000445000-memory.dmp modiloader_stage2 behavioral1/memory/1696-48-0x0000000000400000-0x0000000000445000-memory.dmp modiloader_stage2 behavioral1/memory/1696-50-0x0000000000400000-0x0000000000445000-memory.dmp modiloader_stage2 behavioral1/memory/1696-51-0x0000000000400000-0x0000000000445000-memory.dmp modiloader_stage2 behavioral1/memory/1696-52-0x0000000000400000-0x0000000000445000-memory.dmp modiloader_stage2 behavioral1/memory/1696-53-0x0000000000400000-0x0000000000445000-memory.dmp modiloader_stage2 behavioral1/memory/1696-54-0x0000000000400000-0x0000000000445000-memory.dmp modiloader_stage2 behavioral1/memory/1696-55-0x0000000000400000-0x0000000000445000-memory.dmp modiloader_stage2 behavioral1/memory/1696-56-0x0000000000400000-0x0000000000445000-memory.dmp modiloader_stage2 behavioral1/memory/1696-57-0x0000000000400000-0x0000000000445000-memory.dmp modiloader_stage2 behavioral1/memory/1696-58-0x0000000000400000-0x0000000000445000-memory.dmp modiloader_stage2 -
Executes dropped EXE 2 IoCs
pid Process 2676 svchost.exe 1696 svchost.exe -
resource yara_rule behavioral1/memory/1696-40-0x0000000010000000-0x000000001000E000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Windows\\svchost.exe" svchost.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dff1be24e79ca88d0015556ca63e9531.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" svchost.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2216 set thread context of 1540 2216 dff1be24e79ca88d0015556ca63e9531.exe 28 PID 2676 set thread context of 1696 2676 svchost.exe 33 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\svchost.exe dff1be24e79ca88d0015556ca63e9531.exe File opened for modification C:\Windows\svchost.exe dff1be24e79ca88d0015556ca63e9531.exe File created C:\Windows\ntdtcstp.dll svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1540 dff1be24e79ca88d0015556ca63e9531.exe Token: SeBackupPrivilege 2664 vssvc.exe Token: SeRestorePrivilege 2664 vssvc.exe Token: SeAuditPrivilege 2664 vssvc.exe Token: SeDebugPrivilege 1696 svchost.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2216 dff1be24e79ca88d0015556ca63e9531.exe 2216 dff1be24e79ca88d0015556ca63e9531.exe 2676 svchost.exe 2676 svchost.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2216 wrote to memory of 1540 2216 dff1be24e79ca88d0015556ca63e9531.exe 28 PID 2216 wrote to memory of 1540 2216 dff1be24e79ca88d0015556ca63e9531.exe 28 PID 2216 wrote to memory of 1540 2216 dff1be24e79ca88d0015556ca63e9531.exe 28 PID 2216 wrote to memory of 1540 2216 dff1be24e79ca88d0015556ca63e9531.exe 28 PID 2216 wrote to memory of 1540 2216 dff1be24e79ca88d0015556ca63e9531.exe 28 PID 2216 wrote to memory of 1540 2216 dff1be24e79ca88d0015556ca63e9531.exe 28 PID 2216 wrote to memory of 1540 2216 dff1be24e79ca88d0015556ca63e9531.exe 28 PID 2216 wrote to memory of 1540 2216 dff1be24e79ca88d0015556ca63e9531.exe 28 PID 2216 wrote to memory of 1540 2216 dff1be24e79ca88d0015556ca63e9531.exe 28 PID 2216 wrote to memory of 1540 2216 dff1be24e79ca88d0015556ca63e9531.exe 28 PID 2216 wrote to memory of 1540 2216 dff1be24e79ca88d0015556ca63e9531.exe 28 PID 2216 wrote to memory of 1540 2216 dff1be24e79ca88d0015556ca63e9531.exe 28 PID 2216 wrote to memory of 1540 2216 dff1be24e79ca88d0015556ca63e9531.exe 28 PID 2216 wrote to memory of 1540 2216 dff1be24e79ca88d0015556ca63e9531.exe 28 PID 1540 wrote to memory of 2676 1540 dff1be24e79ca88d0015556ca63e9531.exe 32 PID 1540 wrote to memory of 2676 1540 dff1be24e79ca88d0015556ca63e9531.exe 32 PID 1540 wrote to memory of 2676 1540 dff1be24e79ca88d0015556ca63e9531.exe 32 PID 1540 wrote to memory of 2676 1540 dff1be24e79ca88d0015556ca63e9531.exe 32 PID 2676 wrote to memory of 1696 2676 svchost.exe 33 PID 2676 wrote to memory of 1696 2676 svchost.exe 33 PID 2676 wrote to memory of 1696 2676 svchost.exe 33 PID 2676 wrote to memory of 1696 2676 svchost.exe 33 PID 2676 wrote to memory of 1696 2676 svchost.exe 33 PID 2676 wrote to memory of 1696 2676 svchost.exe 33 PID 2676 wrote to memory of 1696 2676 svchost.exe 33 PID 2676 wrote to memory of 1696 2676 svchost.exe 33 PID 2676 wrote to memory of 1696 2676 svchost.exe 33 PID 2676 wrote to memory of 1696 2676 svchost.exe 33 PID 2676 wrote to memory of 1696 2676 svchost.exe 33 PID 2676 wrote to memory of 1696 2676 svchost.exe 33 PID 2676 wrote to memory of 1696 2676 svchost.exe 33 PID 2676 wrote to memory of 1696 2676 svchost.exe 33 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" svchost.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\dff1be24e79ca88d0015556ca63e9531.exe"C:\Users\Admin\AppData\Local\Temp\dff1be24e79ca88d0015556ca63e9531.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\dff1be24e79ca88d0015556ca63e9531.exeC:\Users\Admin\AppData\Local\Temp\dff1be24e79ca88d0015556ca63e9531.exe2⤵
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe" \melt "C:\Users\Admin\AppData\Local\Temp\dff1be24e79ca88d0015556ca63e9531.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\svchost.exeC:\Windows\svchost.exe4⤵
- UAC bypass
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:1696
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2664
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
866KB
MD5dff1be24e79ca88d0015556ca63e9531
SHA181e7c9edea8a1c30932fc09f7a3b6079877a5961
SHA256d61866514e2dd4fe6bbd8c5483145b1f4ea54f49f52f5365c4c3c7c33c8ef6aa
SHA5127eabe1655dcf909cb6b572e3715b690c0fdd3c3034891cb258df414f75f274f0ec4ffb5c7aa2e43f09ef5e1145e1519d96bc707cb853c7b727c4b6535dfc5adb
-
Filesize
574KB
MD5402ca3771d0ff9c641b744d5ed3e9709
SHA16b7d2cdc2a83769d2866dc30f0c629633bf0bb62
SHA2565f7c9792d9971595c4022856a0d2f6299933cca3352896588c1d4b4561e6fccc
SHA51212d2fea0708cefb9db7d1c8cf9403653319c2d4e2051aef11d99e2ababeb59f4b76ab63775094ffb01a80711e96386ded422a9cc2370ed825c7808d4f219d313
-
Filesize
14B
MD562ad976fd63fd4fa5fc7a65aca92df8c
SHA1a5ffd74556582059fb7baef46415d75576bdc185
SHA256cd8a34f414da61da3eb95683d9132433534b0af5c700d2fa1a22157940f98e3c
SHA5128c5c965ebc1d583709cd0feb9174c479910b680147c0874c950b826b1dd852c34df16f8df8a42b659aed24c5162580d9653335157e40442bf43c794e83ccd0c6