Overview
overview
10Static
static
10�...��.exe
windows7-x64
3�...��.exe
windows10-2004-x64
3$PLUGINSDI...on.exe
windows7-x64
7$PLUGINSDI...on.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3AutoPower.exe
windows7-x64
10AutoPower.exe
windows10-2004-x64
10Help.chm
windows7-x64
1Help.chm
windows10-2004-x64
1RunDLL.dll
windows7-x64
1RunDLL.dll
windows10-2004-x64
3SASHOOK.dll
windows7-x64
3SASHOOK.dll
windows10-2004-x64
3autoss.exe
windows7-x64
10autoss.exe
windows10-2004-x64
10disktop.exe
windows7-x64
1disktop.exe
windows10-2004-x64
1uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7Analysis
-
max time kernel
153s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11-05-2024 13:55
Behavioral task
behavioral1
Sample
ܿػ(Auto Power On)v3.2ƽ.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
ܿػ(Auto Power On)v3.2ƽ.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/autopoweron.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/autopoweron.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
AutoPower.exe
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
AutoPower.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
Help.chm
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
Help.chm
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
RunDLL.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
RunDLL.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
SASHOOK.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
SASHOOK.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
autoss.exe
Resource
win7-20240215-en
Behavioral task
behavioral16
Sample
autoss.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
disktop.exe
Resource
win7-20240220-en
Behavioral task
behavioral18
Sample
disktop.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
uninst.exe
Resource
win7-20240508-en
Behavioral task
behavioral20
Sample
uninst.exe
Resource
win10v2004-20240508-en
General
-
Target
autoss.exe
-
Size
2.1MB
-
MD5
da4e0703a34085c2fa77d86492273381
-
SHA1
6905a25afa412c21528fa601c121c957d0436248
-
SHA256
41064f46efbd85824697f4675ff6d70e9b47107891fcc5a966361deb370a70cf
-
SHA512
98d339c8e915f8d967641eafc22ee14216a9d5dd61e660d0aba557af622667b52eeacb9d54a043b04bae6079937986d4b7ad219077ceea348de328b6520d6327
-
SSDEEP
24576:IbYUSrlwjSVB9y81hXlEM2Iu9VYRj/1rRiVzC2:Is3zy4u9WD1twzC
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 3 IoCs
Processes:
resource yara_rule behavioral16/memory/2384-3-0x0000000000400000-0x0000000000615000-memory.dmp modiloader_stage2 behavioral16/memory/2384-15-0x0000000000400000-0x0000000000615000-memory.dmp modiloader_stage2 behavioral16/memory/2384-24-0x0000000000400000-0x0000000000615000-memory.dmp modiloader_stage2 -
Modifies registry class 6 IoCs
Processes:
autoss.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B2178DF1-BDA4-421D-B03E-EA1B3A25F281} autoss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B2178DF1-BDA4-421D-B03E-EA1B3A25F281}\Info autoss.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B2178DF1-BDA4-421D-B03E-EA1B3A25F281}\Info\Data = 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 autoss.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{B2178DF1-BDA4-421D-B03E-EA1B3A25F281}\Info autoss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node autoss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID autoss.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
autoss.exedescription pid process Token: 33 2384 autoss.exe Token: SeIncBasePriorityPrivilege 2384 autoss.exe Token: 33 2384 autoss.exe Token: SeIncBasePriorityPrivilege 2384 autoss.exe Token: 33 2384 autoss.exe Token: SeIncBasePriorityPrivilege 2384 autoss.exe Token: 33 2384 autoss.exe Token: SeIncBasePriorityPrivilege 2384 autoss.exe -
Suspicious use of FindShellTrayWindow 9 IoCs
Processes:
autoss.exepid process 2384 autoss.exe 2384 autoss.exe 2384 autoss.exe 2384 autoss.exe 2384 autoss.exe 2384 autoss.exe 2384 autoss.exe 2384 autoss.exe 2384 autoss.exe -
Suspicious use of SendNotifyMessage 9 IoCs
Processes:
autoss.exepid process 2384 autoss.exe 2384 autoss.exe 2384 autoss.exe 2384 autoss.exe 2384 autoss.exe 2384 autoss.exe 2384 autoss.exe 2384 autoss.exe 2384 autoss.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
autoss.exedescription pid process target process PID 2384 wrote to memory of 1896 2384 autoss.exe cmd.exe PID 2384 wrote to memory of 1896 2384 autoss.exe cmd.exe PID 2384 wrote to memory of 1896 2384 autoss.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\autoss.exe"C:\Users\Admin\AppData\Local\Temp\autoss.exe"1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C C:\Users\Admin\AppData\Local\Temp\~RomDmp1\RomDump.com > C:\Users\Admin\AppData\Local\Temp\~RomDmp1\Rom.dmp2⤵PID:1896
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=5424 --field-trial-handle=2236,i,5367110156796017614,12594004256180761011,262144 --variations-seed-version /prefetch:81⤵PID:1504
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\wake.iniFilesize
67B
MD597bb424f9b87f82837c052ac0492854a
SHA15cbda78e812bdae84eb528489e63127e04ae9c59
SHA2568b844e87344f777a6c6d555484c958c81256fea9f8c4dccb8b7323935eda502c
SHA5129553cee58331de204feb5b29514952033f582dc433d779b890c70aaf856f50153964da7cc8c3ffef855b0237a50271ef7d14b47db98f1a64a3fa6187f48d33a6
-
C:\Users\Admin\AppData\Local\Temp\wake.iniFilesize
53B
MD5e4f2b39c347c092bb1af852cec8a19af
SHA1e2e0873d600e7eeacbad5467d66ec0cdd57ec673
SHA2568ab7a67931e8ab579c5b826ee9fd0a818b52b8330b9766782f8c3deba3b97c5c
SHA512543dcb794956f848cb0a871b6d10e75042c42d69e8b34e41d7fb2c4c5a425fd66d0524f09b3cae5e10f8703ca76e54cf383114c5ba747fc4c3cf40082248d26f
-
C:\Users\Admin\AppData\Local\Temp\~RomDmp1\RomDump.comFilesize
46B
MD574ea83a987cf7e29fe79b16b15b4bbed
SHA1452a79ee1211fad2efdfaf203e4b092f937208fc
SHA2569b327617c8c6fc6c70b7ada3ea40edcb143f0925d0c33fbb8a0a366020deed9d
SHA51235334ba33584b60b2774a4404706d88382b4ab647a3e9afe231e7910246c6fb851a2ae860652771fe2809e40abdc922d75f08616b8dc1ea16e2eefa572000355
-
memory/2384-0-0x0000000002390000-0x0000000002391000-memory.dmpFilesize
4KB
-
memory/2384-3-0x0000000000400000-0x0000000000615000-memory.dmpFilesize
2.1MB
-
memory/2384-15-0x0000000000400000-0x0000000000615000-memory.dmpFilesize
2.1MB
-
memory/2384-17-0x0000000002390000-0x0000000002391000-memory.dmpFilesize
4KB
-
memory/2384-24-0x0000000000400000-0x0000000000615000-memory.dmpFilesize
2.1MB