Analysis
-
max time kernel
75s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 22:28
Static task
static1
Behavioral task
behavioral1
Sample
d0c17c3c241e09ec0743375107261b0c6d485f083cdd57241e6041ba15fced9a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d0c17c3c241e09ec0743375107261b0c6d485f083cdd57241e6041ba15fced9a.exe
Resource
win10v2004-20220812-en
General
-
Target
d0c17c3c241e09ec0743375107261b0c6d485f083cdd57241e6041ba15fced9a.exe
-
Size
286KB
-
MD5
07efbae6984c16f7f273d61c6fba3fcf
-
SHA1
090ba23abf7c8986b281383129a7e1e8bd2bb4f4
-
SHA256
d0c17c3c241e09ec0743375107261b0c6d485f083cdd57241e6041ba15fced9a
-
SHA512
bd066852cb8e8f7ec666885b7838c0c9828dea2fd5890b45cefcb90ebb5576d84c3d6fab4b6f160ee67bf9023cdfb23a55e3f645af4467face2385b233b8601c
-
SSDEEP
6144:psCgExLvSE2OsEHgVh+TM6t0nT+1Od1EinVpiVnxkR0nHOOVJfk31U6+Yn12OFb:paWLK2Wh+tKT+1O9VMVHOOVJf8+012OB
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral1/memory/560-55-0x0000000000400000-0x000000000053B000-memory.dmp modiloader_stage2 -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\Fiele Ps.txt d0c17c3c241e09ec0743375107261b0c6d485f083cdd57241e6041ba15fced9a.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 560 set thread context of 1224 560 d0c17c3c241e09ec0743375107261b0c6d485f083cdd57241e6041ba15fced9a.exe 28 -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{24C4F791-75FC-11ED-8413-C22E595EE768} = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "377161115" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1224 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1224 IEXPLORE.EXE 1224 IEXPLORE.EXE 1612 IEXPLORE.EXE 1612 IEXPLORE.EXE 1612 IEXPLORE.EXE 1612 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 560 wrote to memory of 1224 560 d0c17c3c241e09ec0743375107261b0c6d485f083cdd57241e6041ba15fced9a.exe 28 PID 560 wrote to memory of 1224 560 d0c17c3c241e09ec0743375107261b0c6d485f083cdd57241e6041ba15fced9a.exe 28 PID 560 wrote to memory of 1224 560 d0c17c3c241e09ec0743375107261b0c6d485f083cdd57241e6041ba15fced9a.exe 28 PID 560 wrote to memory of 1224 560 d0c17c3c241e09ec0743375107261b0c6d485f083cdd57241e6041ba15fced9a.exe 28 PID 560 wrote to memory of 1224 560 d0c17c3c241e09ec0743375107261b0c6d485f083cdd57241e6041ba15fced9a.exe 28 PID 1224 wrote to memory of 1612 1224 IEXPLORE.EXE 30 PID 1224 wrote to memory of 1612 1224 IEXPLORE.EXE 30 PID 1224 wrote to memory of 1612 1224 IEXPLORE.EXE 30 PID 1224 wrote to memory of 1612 1224 IEXPLORE.EXE 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\d0c17c3c241e09ec0743375107261b0c6d485f083cdd57241e6041ba15fced9a.exe"C:\Users\Admin\AppData\Local\Temp\d0c17c3c241e09ec0743375107261b0c6d485f083cdd57241e6041ba15fced9a.exe"1⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:560 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1224 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1612
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
603B
MD5087f2c8a63cf676f9b5d722d48ee0e6a
SHA174e78b834c3b1f0a341c5eae24aaf7fbc6181c92
SHA256cceaf36b3a146cba4becb72a5643c3dd492b0f2861dcec713e496a388022a7c9
SHA51266f8e95a29fe0d5872993e1d89e0db230f330f6dc5a14f5cdafc40a09326afc24d7920cf632f9967eb426f53002c1a4bda697a5b1366bc66eede482f9935c56b