Analysis
-
max time kernel
147s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 04:36
Static task
static1
Behavioral task
behavioral1
Sample
2868fe36199e26330909610ecb3fb757.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2868fe36199e26330909610ecb3fb757.exe
Resource
win10v2004-20231215-en
General
-
Target
2868fe36199e26330909610ecb3fb757.exe
-
Size
132KB
-
MD5
2868fe36199e26330909610ecb3fb757
-
SHA1
42f44ae47eba0dd9d4aa567b7a8d7b2c2b7e0e22
-
SHA256
a2d74f24e2d3ccb765f3451a2363b0d64261678d12a47f3bfe7fb52daadccf5d
-
SHA512
faff15cf73ff5fe138ee3f898edb75f5bee0c470fbd04369948edee8eb4a49128b2f913ddfec1de230bf6bdb6f4985d278f68e68181b59972f0a4622f6f5b03c
-
SSDEEP
3072:UMU0d4EOivoZruByJtXOa2gaR1+aJe1mgawzxsBub861jIHxowPq:zZOivauQOdgaRUTV5n3
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 7 IoCs
resource yara_rule behavioral2/memory/4312-33-0x00000000004C0000-0x00000000004D3000-memory.dmp modiloader_stage2 behavioral2/files/0x0009000000023129-32.dat modiloader_stage2 behavioral2/memory/2236-43-0x0000000003C90000-0x0000000003CA3000-memory.dmp modiloader_stage2 behavioral2/memory/2236-44-0x0000000003C90000-0x0000000003CA3000-memory.dmp modiloader_stage2 behavioral2/memory/4312-45-0x00000000004C0000-0x00000000004D3000-memory.dmp modiloader_stage2 behavioral2/memory/4312-48-0x0000000000400000-0x000000000042A000-memory.dmp modiloader_stage2 behavioral2/memory/4312-70-0x00000000004C0000-0x00000000004D3000-memory.dmp modiloader_stage2 -
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\Beep.sys WindowsUpdate.exe File opened for modification C:\Windows\SysWOW64\drivers\Beep.sys WindowsUpdate.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\Control Panel\International\Geo\Nation WindowsUpdate.exe -
Executes dropped EXE 4 IoCs
pid Process 556 e57850e.exe 2940 WindowsUpdate.exe 4312 ÅÜÅÜ¿¨¶¡³µ¼¯ÆøС¹¤¾ß.exe 2756 csol.exe -
Loads dropped DLL 4 IoCs
pid Process 4312 ÅÜÅÜ¿¨¶¡³µ¼¯ÆøС¹¤¾ß.exe 4312 ÅÜÅÜ¿¨¶¡³µ¼¯ÆøС¹¤¾ß.exe 2236 notepad.exe 2236 notepad.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\SysInfo.dll ÅÜÅÜ¿¨¶¡³µ¼¯ÆøС¹¤¾ß.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5008 2756 WerFault.exe 95 -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2236 notepad.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 656 Process not Found 656 Process not Found -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 4228 2868fe36199e26330909610ecb3fb757.exe 4228 2868fe36199e26330909610ecb3fb757.exe 556 e57850e.exe 556 e57850e.exe 4312 ÅÜÅÜ¿¨¶¡³µ¼¯ÆøС¹¤¾ß.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4228 wrote to memory of 556 4228 2868fe36199e26330909610ecb3fb757.exe 89 PID 4228 wrote to memory of 556 4228 2868fe36199e26330909610ecb3fb757.exe 89 PID 4228 wrote to memory of 556 4228 2868fe36199e26330909610ecb3fb757.exe 89 PID 556 wrote to memory of 2236 556 e57850e.exe 91 PID 556 wrote to memory of 2236 556 e57850e.exe 91 PID 556 wrote to memory of 2236 556 e57850e.exe 91 PID 556 wrote to memory of 2940 556 e57850e.exe 93 PID 556 wrote to memory of 2940 556 e57850e.exe 93 PID 556 wrote to memory of 2940 556 e57850e.exe 93 PID 2940 wrote to memory of 4312 2940 WindowsUpdate.exe 94 PID 2940 wrote to memory of 4312 2940 WindowsUpdate.exe 94 PID 2940 wrote to memory of 4312 2940 WindowsUpdate.exe 94 PID 2940 wrote to memory of 2756 2940 WindowsUpdate.exe 95 PID 2940 wrote to memory of 2756 2940 WindowsUpdate.exe 95 PID 2940 wrote to memory of 2756 2940 WindowsUpdate.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\2868fe36199e26330909610ecb3fb757.exe"C:\Users\Admin\AppData\Local\Temp\2868fe36199e26330909610ecb3fb757.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Users\Admin\AppData\Roaming\Microsoft\e57850e.exe"C:\Users\Admin\AppData\Roaming\Microsoft\e57850e.exe" dmedmedme "C:\Users\Admin\AppData\Local\Temp\2868fe36199e26330909610ecb3fb757.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:556 -
\??\c:\windows\SysWOW64\notepad.exec:\windows\system32\notepad.exe "C:\Users\Admin\AppData\Local\Temp\2868fe36199e26330909610ecb3fb757.txt"3⤵
- Loads dropped DLL
- Opens file in notepad (likely ransom note)
PID:2236
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\WindowsUpdate.exeC:\Users\Admin\AppData\Roaming\Microsoft\WindowsUpdate.exe3⤵
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\ÅÜÅÜ¿¨¶¡³µ¼¯ÆøС¹¤¾ß.exe"C:\Users\Admin\AppData\Local\Temp\ÅÜÅÜ¿¨¶¡³µ¼¯ÆøС¹¤¾ß.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:4312
-
-
C:\Users\Admin\AppData\Local\Temp\csol.exe"C:\Users\Admin\AppData\Local\Temp\csol.exe"4⤵
- Executes dropped EXE
PID:2756 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2756 -s 2285⤵
- Program crash
PID:5008
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2756 -ip 27561⤵PID:2144
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
57KB
MD59de9a9c8f0d23036322a52ae48f7dd9a
SHA168e09169b60ef65b2742900f716f5d2941d827ce
SHA2569ddf0e209197699fe001cad217d0da14fa629b2c196d30bdb91cbf808ceabd1d
SHA5127735dc24003cff4102c182063ef4e4c7ab8afffa9eebb06af55b1503e533cf7b1a01e63e19963ae6f9084d6927a4d0ed84f0bb5d6d71a1b43010d37ba18fadd2
-
Filesize
139B
MD5772baa062def0967e483c9323fed2097
SHA1c7d7c99f04eea2ffeb3ab1ee072b1734d7b6ec9d
SHA25644b655807a6af97ac1c476f484112a2b7ca023c1c841952f6f91547d480e860e
SHA512c5783f37fd94589c4e82e767a14d01cc9dc1fdef6e1ae3072aeafee298337048d71c76369467795bd3c5720a20d26a918dca8776bcfd3cc99d557b0c5ac1d779
-
Filesize
20KB
MD530f4acd300eabc29d24bef6b532216a6
SHA193f42f54949eb2dc6870f4edea86144d45e9ad78
SHA256d230e71da3e6231ee2f050d501f466353790882a6c4338e93b839ac0e4a4cfa0
SHA512d5456bae3911a5d9dbc8c56f196d72284c340fe41013c480fe24ba6eb06ffc0745367499bb1d2aa18eb880176ce411b0e39c2b5f35928d48176a830bbf18e140
-
Filesize
29KB
MD5a5014d677eebb5511fe416ceaee1cf91
SHA162344e63ec8a147920537152bf2c180e0001ccf6
SHA2562e71096b2518792c626c8e3771b9e0d642064901dc170a6b5ece717c2ac92892
SHA512d6b04e5fe95250e5286f5f5b5cc6a90aaa1ec46a26d5a92fdf9b1b505b14293b815ad1e24295a315afff063d2ed0d9e6c17e3808eca90f6d363e295ad1e0170a
-
Filesize
85KB
MD5e49c6000102b0ac46d175ffa026cc790
SHA138a6ee53afa2744b78ad8d3331bbb6e597954547
SHA256fd8c7023c782ef9543a59a9562d2c5c0afc88e02421a9f5a758fd6449a4c28dd
SHA512a0110ff2d4d1adecc7353e2d0c22446399762c3f76468f80958c78acbab0f2e31047a8156f7c0d03748a0b41897a3338b915d21ca782891d4d088d2cb8f9f2c9
-
Filesize
132KB
MD52868fe36199e26330909610ecb3fb757
SHA142f44ae47eba0dd9d4aa567b7a8d7b2c2b7e0e22
SHA256a2d74f24e2d3ccb765f3451a2363b0d64261678d12a47f3bfe7fb52daadccf5d
SHA512faff15cf73ff5fe138ee3f898edb75f5bee0c470fbd04369948edee8eb4a49128b2f913ddfec1de230bf6bdb6f4985d278f68e68181b59972f0a4622f6f5b03c