Analysis
-
max time kernel
143s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 15:16
Behavioral task
behavioral1
Sample
785aecab373ad646314552a723cae01b.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
785aecab373ad646314552a723cae01b.exe
Resource
win10v2004-20231215-en
General
-
Target
785aecab373ad646314552a723cae01b.exe
-
Size
65KB
-
MD5
785aecab373ad646314552a723cae01b
-
SHA1
367ac902679704a50741832bf6c2b3115ee1b33b
-
SHA256
24c2454a0200d1e194c33d19e82d8742b16d051083cb9c3e1d5e9c864043c3aa
-
SHA512
ab91a7fda673b68376cf906db94529670a120a593604b6778d0a357b13b0a0d2c5604c87474a5ccb12823857cbf60dc9e27d5f7e7d83804b2cb9471e6672df13
-
SSDEEP
384:8jeLOnMIwQZOG0tsCQCd89cPDDCm7wLHUQzp3C05NJ8RekSTOn1nzHRiFb1Y1PnC:8H7R0am7q/555NJ9kSTOnVaKWxNSipF
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 4 IoCs
resource yara_rule behavioral2/memory/2132-0-0x0000000000400000-0x0000000000412000-memory.dmp modiloader_stage2 behavioral2/files/0x000b000000023123-5.dat modiloader_stage2 behavioral2/memory/2132-9-0x0000000000400000-0x0000000000412000-memory.dmp modiloader_stage2 behavioral2/memory/2764-10-0x0000000000400000-0x0000000000412000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Control Panel\International\Geo\Nation 785aecab373ad646314552a723cae01b.exe -
Executes dropped EXE 1 IoCs
pid Process 2764 Config.exe -
resource yara_rule behavioral2/memory/2132-0-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/files/0x000b000000023123-5.dat upx behavioral2/memory/2132-9-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/2764-10-0x0000000000400000-0x0000000000412000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Black Keylogger = "C:\\Users\\Admin\\AppData\\Local\\Config.exe" Config.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2764 Config.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2132 wrote to memory of 2764 2132 785aecab373ad646314552a723cae01b.exe 91 PID 2132 wrote to memory of 2764 2132 785aecab373ad646314552a723cae01b.exe 91 PID 2132 wrote to memory of 2764 2132 785aecab373ad646314552a723cae01b.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\785aecab373ad646314552a723cae01b.exe"C:\Users\Admin\AppData\Local\Temp\785aecab373ad646314552a723cae01b.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Local\Config.exe"C:\Users\Admin\AppData\Local\Config.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
PID:2764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5785aecab373ad646314552a723cae01b
SHA1367ac902679704a50741832bf6c2b3115ee1b33b
SHA25624c2454a0200d1e194c33d19e82d8742b16d051083cb9c3e1d5e9c864043c3aa
SHA512ab91a7fda673b68376cf906db94529670a120a593604b6778d0a357b13b0a0d2c5604c87474a5ccb12823857cbf60dc9e27d5f7e7d83804b2cb9471e6672df13