Analysis

  • max time kernel
    103s
  • max time network
    164s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    03-12-2022 09:10

General

  • Target

    9df1dda509bc600784990066f2bd188b2bd956fc79d1fce1a70e56de1135f275.exe

  • Size

    640KB

  • MD5

    9705ee27fa98efa1ea8abb42de8d5946

  • SHA1

    1ad51958475571fb6b8401f67c89d572104c8292

  • SHA256

    9df1dda509bc600784990066f2bd188b2bd956fc79d1fce1a70e56de1135f275

  • SHA512

    e4ffdbb5545bc8fb9786d91b714b7e91144ad03ab96143280abad3298b4408bfa1a8ffe3c44a3ca91dbea76a07263d9420504aea74b393cde2c6e1624c743539

  • SSDEEP

    12288:W7NDgoQihyEg+ecqyS7+cZ++NVFmFqgTIsnbm+bTwdsh9U2L5RE:WpDeOye1S7+0hVEFqsIsnbrnG2L5W

Score
10/10

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 30 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9df1dda509bc600784990066f2bd188b2bd956fc79d1fce1a70e56de1135f275.exe
    "C:\Users\Admin\AppData\Local\Temp\9df1dda509bc600784990066f2bd188b2bd956fc79d1fce1a70e56de1135f275.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:1776
    • C:\program files\internet explorer\IEXPLORE.EXE
      "C:\program files\internet explorer\IEXPLORE.EXE"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1360
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1360 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1404

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\NGRHRJ9T.txt
    Filesize

    601B

    MD5

    02114b2a357d8a270ee15b7ae5c1bf83

    SHA1

    a02ce970648a9e264249b5de162e93a88d16ffa3

    SHA256

    6c2c6c8562af5bda00488171337ef211722e9d08459c32b7e29311b608e64312

    SHA512

    83a1f38ffb71352178eb667759d23e712bcb2c3f972d6aa0c69f3c2ca2e8c1d1dba4950036ed595cafa2f3fb45ce1674c69e7e4640e211b2d68472942f4d227b

  • memory/1776-54-0x0000000075F01000-0x0000000075F03000-memory.dmp
    Filesize

    8KB

  • memory/1776-55-0x0000000000400000-0x00000000005B5000-memory.dmp
    Filesize

    1.7MB

  • memory/1776-56-0x0000000000350000-0x00000000003A4000-memory.dmp
    Filesize

    336KB