Analysis

  • max time kernel
    6s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-12-2023 08:02

General

  • Target

    10b798dec86c9741d311c88dad14e344.exe

  • Size

    186KB

  • MD5

    10b798dec86c9741d311c88dad14e344

  • SHA1

    b6994e3db4d17a5c1dc87fef89009924d5abc552

  • SHA256

    f8d71f555d508646d1bd67fe8d6af42f2d049e5be16f2324666504c539a36de9

  • SHA512

    d7b09c323e9369a454a24fd8975362a9ca770d73a95f6cd21931a8529fb3b86e4d5cef3844e828f75d7f6c6a7debb7c26d31910b6abea7017fda2b99d4c334ac

  • SSDEEP

    3072:rDIpv6Kx9o1hgW5/slL3DKEIF2F5LwCU+Yqp7jIpgY3ro2+TTvB3ZQeCB9T:rDIpNx21hgaU8MLbDpq73r4vBiT7T

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\10b798dec86c9741d311c88dad14e344.exe
    "C:\Users\Admin\AppData\Local\Temp\10b798dec86c9741d311c88dad14e344.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4080
    • C:\Users\Admin\AppData\Local\Temp\10b798dec86c9741d311c88dad14e344.exe
      10b798dec86c9741d311c88dad14e344.exe
      2⤵
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1652
  • C:\Users\Admin\AppData\Roaming\netprotocol.exe
    C:\Users\Admin\AppData\Roaming\netprotocol.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2100
    • C:\Users\Admin\AppData\Roaming\netprotocol.exe
      netprotocol.exe
      2⤵
      • Executes dropped EXE
      PID:3128

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\netprotocol.exe

    Filesize

    186KB

    MD5

    16ff65c4376761d0fa01c3398cc1a303

    SHA1

    504ed5e8badc10b534835cca298cd7a5121d0b4c

    SHA256

    7b848fd0ecca3c3bfa44c21b5c38bfc8f4cacdac19261218f960e02e37af83ac

    SHA512

    06f64287fe6153acaf56e6988fa885386a41d69405af41a9597be43d5aaa4e0b1cd077256f1e95b969166de472ddcfe25e12ae6d2d2d5390752b3cc4d5eb0693

  • C:\Users\Admin\AppData\Roaming\netprotocol.exe

    Filesize

    92KB

    MD5

    3e68f7375b91a2a451ffa8f4e43b7daa

    SHA1

    bf6c7c839bbacfaf87d5ba79cd2be5de2326e96e

    SHA256

    f82909cf049e1b93c6b1e51c0e9b50748a60f7398cf6b0a6f026b1e769a675c9

    SHA512

    31d6cee86856aa38ece1a6fd989b396470c5146461c143ab7ea124e28170f0811eef406c3e59fde94702fb7919e43ecc971c690856a57d9eb6baf9505134bfb7

  • memory/1652-5-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/1652-2-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/1652-1-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/1652-0-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/1652-17-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2100-15-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/3128-16-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/3128-18-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/4080-4-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB