Analysis
-
max time kernel
143s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-01-2025 21:47
Behavioral task
behavioral1
Sample
19561b33793dcb865eae56575a899ce8_kovter_from_Sakura82_taskmanger.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
19561b33793dcb865eae56575a899ce8_kovter_from_Sakura82_taskmanger.exe
Resource
win10v2004-20241007-en
General
-
Target
19561b33793dcb865eae56575a899ce8_kovter_from_Sakura82_taskmanger.exe
-
Size
119KB
-
MD5
19561b33793dcb865eae56575a899ce8
-
SHA1
aeff444147fb35adbdf4faed6b5c4bd385b1d98c
-
SHA256
d625fcec98e282032f550ba80f60de2603adc9f18dd6ae597defda9df5200bd2
-
SHA512
c1ddaafcd3b8623f446acec01afe763e765e3abf930fe258e6cb728f6c2f68c1cf3c966f12473267628c4d8613b74c68c5369e03a5bbbc3c9db4c0584da0fad1
-
SSDEEP
3072:TphxjSC0KVR9sr6NuO4pTMq5tWkLgQ3+jOJgg3gv/5f6XKk6+/F:Tp7jYKV8+Nhud5dLgDyggE5sKo
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SHELL = "explorer.exe, \"C:\\Users\\Admin\\AppData\\Local\\KB4836621\\KB4836621.exe\"" svchost.exe -
Modiloader family
-
ModiLoader Second Stage 18 IoCs
resource yara_rule behavioral2/memory/2168-5-0x0000000000400000-0x0000000000521000-memory.dmp modiloader_stage2 behavioral2/memory/2168-10-0x0000000000400000-0x0000000000521000-memory.dmp modiloader_stage2 behavioral2/memory/3512-19-0x0000000000290000-0x00000000003B1000-memory.dmp modiloader_stage2 behavioral2/memory/3512-20-0x0000000000290000-0x00000000003B1000-memory.dmp modiloader_stage2 behavioral2/memory/3512-18-0x0000000000290000-0x00000000003B1000-memory.dmp modiloader_stage2 behavioral2/memory/3512-22-0x0000000000290000-0x00000000003B1000-memory.dmp modiloader_stage2 behavioral2/memory/3512-23-0x0000000000290000-0x00000000003B1000-memory.dmp modiloader_stage2 behavioral2/memory/3512-28-0x0000000000290000-0x00000000003B1000-memory.dmp modiloader_stage2 behavioral2/memory/3512-32-0x0000000000290000-0x00000000003B1000-memory.dmp modiloader_stage2 behavioral2/memory/3512-37-0x0000000000290000-0x00000000003B1000-memory.dmp modiloader_stage2 behavioral2/memory/3512-41-0x0000000000290000-0x00000000003B1000-memory.dmp modiloader_stage2 behavioral2/memory/3512-45-0x0000000000290000-0x00000000003B1000-memory.dmp modiloader_stage2 behavioral2/memory/3512-49-0x0000000000290000-0x00000000003B1000-memory.dmp modiloader_stage2 behavioral2/memory/3512-54-0x0000000000290000-0x00000000003B1000-memory.dmp modiloader_stage2 behavioral2/memory/3512-58-0x0000000000290000-0x00000000003B1000-memory.dmp modiloader_stage2 behavioral2/memory/3512-62-0x0000000000290000-0x00000000003B1000-memory.dmp modiloader_stage2 behavioral2/memory/3512-66-0x0000000000290000-0x00000000003B1000-memory.dmp modiloader_stage2 behavioral2/memory/3512-70-0x0000000000290000-0x00000000003B1000-memory.dmp modiloader_stage2 -
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\KB4836621 = "\"C:\\Users\\Admin\\AppData\\Local\\KB4836621\\KB4836621.exe\"" svchost.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\KB4836621 = "\"C:\\Users\\Admin\\AppData\\Local\\KB4836621\\KB4836621.exe\"" svchost.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" svchost.exe -
Disables Task Manager via registry modification
-
Deletes itself 1 IoCs
pid Process 3512 svchost.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KB4836621 = "\"C:\\Users\\Admin\\AppData\\Local\\KB4836621\\KB4836621.exe\"" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\KB4836621 = "\"C:\\Users\\Admin\\AppData\\Local\\KB4836621\\KB4836621.exe\"" svchost.exe -
resource yara_rule behavioral2/memory/2168-0-0x0000000000400000-0x0000000000521000-memory.dmp upx behavioral2/memory/2168-2-0x0000000000400000-0x0000000000521000-memory.dmp upx behavioral2/memory/2168-5-0x0000000000400000-0x0000000000521000-memory.dmp upx behavioral2/memory/3512-7-0x0000000000290000-0x00000000003B1000-memory.dmp upx behavioral2/memory/3512-14-0x0000000000290000-0x00000000003B1000-memory.dmp upx behavioral2/memory/3512-12-0x0000000000290000-0x00000000003B1000-memory.dmp upx behavioral2/memory/2168-10-0x0000000000400000-0x0000000000521000-memory.dmp upx behavioral2/memory/3512-8-0x0000000000290000-0x00000000003B1000-memory.dmp upx behavioral2/memory/3512-15-0x0000000000290000-0x00000000003B1000-memory.dmp upx behavioral2/memory/3512-19-0x0000000000290000-0x00000000003B1000-memory.dmp upx behavioral2/memory/3512-20-0x0000000000290000-0x00000000003B1000-memory.dmp upx behavioral2/memory/3512-18-0x0000000000290000-0x00000000003B1000-memory.dmp upx behavioral2/memory/3512-22-0x0000000000290000-0x00000000003B1000-memory.dmp upx behavioral2/memory/3512-23-0x0000000000290000-0x00000000003B1000-memory.dmp upx behavioral2/files/0x0007000000023cb0-27.dat upx behavioral2/memory/3512-28-0x0000000000290000-0x00000000003B1000-memory.dmp upx behavioral2/memory/3512-32-0x0000000000290000-0x00000000003B1000-memory.dmp upx behavioral2/memory/3512-37-0x0000000000290000-0x00000000003B1000-memory.dmp upx behavioral2/memory/3512-41-0x0000000000290000-0x00000000003B1000-memory.dmp upx behavioral2/memory/3512-45-0x0000000000290000-0x00000000003B1000-memory.dmp upx behavioral2/memory/3512-49-0x0000000000290000-0x00000000003B1000-memory.dmp upx behavioral2/memory/3512-54-0x0000000000290000-0x00000000003B1000-memory.dmp upx behavioral2/memory/3512-58-0x0000000000290000-0x00000000003B1000-memory.dmp upx behavioral2/memory/3512-62-0x0000000000290000-0x00000000003B1000-memory.dmp upx behavioral2/memory/3512-66-0x0000000000290000-0x00000000003B1000-memory.dmp upx behavioral2/memory/3512-70-0x0000000000290000-0x00000000003B1000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 19561b33793dcb865eae56575a899ce8_kovter_from_Sakura82_taskmanger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 2168 19561b33793dcb865eae56575a899ce8_kovter_from_Sakura82_taskmanger.exe 2168 19561b33793dcb865eae56575a899ce8_kovter_from_Sakura82_taskmanger.exe 2168 19561b33793dcb865eae56575a899ce8_kovter_from_Sakura82_taskmanger.exe 2168 19561b33793dcb865eae56575a899ce8_kovter_from_Sakura82_taskmanger.exe 2168 19561b33793dcb865eae56575a899ce8_kovter_from_Sakura82_taskmanger.exe 2168 19561b33793dcb865eae56575a899ce8_kovter_from_Sakura82_taskmanger.exe 2168 19561b33793dcb865eae56575a899ce8_kovter_from_Sakura82_taskmanger.exe 2168 19561b33793dcb865eae56575a899ce8_kovter_from_Sakura82_taskmanger.exe 2168 19561b33793dcb865eae56575a899ce8_kovter_from_Sakura82_taskmanger.exe 2168 19561b33793dcb865eae56575a899ce8_kovter_from_Sakura82_taskmanger.exe 2168 19561b33793dcb865eae56575a899ce8_kovter_from_Sakura82_taskmanger.exe 2168 19561b33793dcb865eae56575a899ce8_kovter_from_Sakura82_taskmanger.exe 2168 19561b33793dcb865eae56575a899ce8_kovter_from_Sakura82_taskmanger.exe 2168 19561b33793dcb865eae56575a899ce8_kovter_from_Sakura82_taskmanger.exe 2168 19561b33793dcb865eae56575a899ce8_kovter_from_Sakura82_taskmanger.exe 2168 19561b33793dcb865eae56575a899ce8_kovter_from_Sakura82_taskmanger.exe 2168 19561b33793dcb865eae56575a899ce8_kovter_from_Sakura82_taskmanger.exe 2168 19561b33793dcb865eae56575a899ce8_kovter_from_Sakura82_taskmanger.exe 2168 19561b33793dcb865eae56575a899ce8_kovter_from_Sakura82_taskmanger.exe 2168 19561b33793dcb865eae56575a899ce8_kovter_from_Sakura82_taskmanger.exe 2168 19561b33793dcb865eae56575a899ce8_kovter_from_Sakura82_taskmanger.exe 2168 19561b33793dcb865eae56575a899ce8_kovter_from_Sakura82_taskmanger.exe 2168 19561b33793dcb865eae56575a899ce8_kovter_from_Sakura82_taskmanger.exe 2168 19561b33793dcb865eae56575a899ce8_kovter_from_Sakura82_taskmanger.exe 3512 svchost.exe 3512 svchost.exe 3512 svchost.exe 3512 svchost.exe 3512 svchost.exe 3512 svchost.exe 3512 svchost.exe 3512 svchost.exe 3512 svchost.exe 3512 svchost.exe 3512 svchost.exe 3512 svchost.exe 3512 svchost.exe 3512 svchost.exe 3512 svchost.exe 3512 svchost.exe 3512 svchost.exe 3512 svchost.exe 3512 svchost.exe 3512 svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2168 19561b33793dcb865eae56575a899ce8_kovter_from_Sakura82_taskmanger.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2168 wrote to memory of 3512 2168 19561b33793dcb865eae56575a899ce8_kovter_from_Sakura82_taskmanger.exe 82 PID 2168 wrote to memory of 3512 2168 19561b33793dcb865eae56575a899ce8_kovter_from_Sakura82_taskmanger.exe 82 PID 2168 wrote to memory of 3512 2168 19561b33793dcb865eae56575a899ce8_kovter_from_Sakura82_taskmanger.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\19561b33793dcb865eae56575a899ce8_kovter_from_Sakura82_taskmanger.exe"C:\Users\Admin\AppData\Local\Temp\19561b33793dcb865eae56575a899ce8_kovter_from_Sakura82_taskmanger.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\SysWOW64\svchost.exepath<<C:\Users\Admin\AppData\Local\Temp\19561b33793dcb865eae56575a899ce8_kovter_from_Sakura82_taskmanger.exe>>path2⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Deletes itself
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3512
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
119KB
MD519561b33793dcb865eae56575a899ce8
SHA1aeff444147fb35adbdf4faed6b5c4bd385b1d98c
SHA256d625fcec98e282032f550ba80f60de2603adc9f18dd6ae597defda9df5200bd2
SHA512c1ddaafcd3b8623f446acec01afe763e765e3abf930fe258e6cb728f6c2f68c1cf3c966f12473267628c4d8613b74c68c5369e03a5bbbc3c9db4c0584da0fad1