Analysis

  • max time kernel
    147s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-12-2023 04:36

General

  • Target

    2868fe36199e26330909610ecb3fb757.exe

  • Size

    132KB

  • MD5

    2868fe36199e26330909610ecb3fb757

  • SHA1

    42f44ae47eba0dd9d4aa567b7a8d7b2c2b7e0e22

  • SHA256

    a2d74f24e2d3ccb765f3451a2363b0d64261678d12a47f3bfe7fb52daadccf5d

  • SHA512

    faff15cf73ff5fe138ee3f898edb75f5bee0c470fbd04369948edee8eb4a49128b2f913ddfec1de230bf6bdb6f4985d278f68e68181b59972f0a4622f6f5b03c

  • SSDEEP

    3072:UMU0d4EOivoZruByJtXOa2gaR1+aJe1mgawzxsBub861jIHxowPq:zZOivauQOdgaRUTV5n3

Score
10/10

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 7 IoCs
  • Drops file in Drivers directory 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2868fe36199e26330909610ecb3fb757.exe
    "C:\Users\Admin\AppData\Local\Temp\2868fe36199e26330909610ecb3fb757.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4228
    • C:\Users\Admin\AppData\Roaming\Microsoft\e57850e.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\e57850e.exe" dmedmedme "C:\Users\Admin\AppData\Local\Temp\2868fe36199e26330909610ecb3fb757.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:556
      • \??\c:\windows\SysWOW64\notepad.exe
        c:\windows\system32\notepad.exe "C:\Users\Admin\AppData\Local\Temp\2868fe36199e26330909610ecb3fb757.txt"
        3⤵
        • Loads dropped DLL
        • Opens file in notepad (likely ransom note)
        PID:2236
      • C:\Users\Admin\AppData\Roaming\Microsoft\WindowsUpdate.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\WindowsUpdate.exe
        3⤵
        • Drops file in Drivers directory
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2940
        • C:\Users\Admin\AppData\Local\Temp\ÅÜÅÜ¿¨¶¡³µ¼¯ÆøС¹¤¾ß.exe
          "C:\Users\Admin\AppData\Local\Temp\ÅÜÅÜ¿¨¶¡³µ¼¯ÆøС¹¤¾ß.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in Program Files directory
          • Suspicious use of SetWindowsHookEx
          PID:4312
        • C:\Users\Admin\AppData\Local\Temp\csol.exe
          "C:\Users\Admin\AppData\Local\Temp\csol.exe"
          4⤵
          • Executes dropped EXE
          PID:2756
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2756 -s 228
            5⤵
            • Program crash
            PID:5008
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2756 -ip 2756
    1⤵
      PID:2144

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\Common Files\microsoft shared\MSInfo\SysInfo.dll

      Filesize

      57KB

      MD5

      9de9a9c8f0d23036322a52ae48f7dd9a

      SHA1

      68e09169b60ef65b2742900f716f5d2941d827ce

      SHA256

      9ddf0e209197699fe001cad217d0da14fa629b2c196d30bdb91cbf808ceabd1d

      SHA512

      7735dc24003cff4102c182063ef4e4c7ab8afffa9eebb06af55b1503e533cf7b1a01e63e19963ae6f9084d6927a4d0ed84f0bb5d6d71a1b43010d37ba18fadd2

    • C:\Users\Admin\AppData\Local\Temp\2868fe36199e26330909610ecb3fb757.txt

      Filesize

      139B

      MD5

      772baa062def0967e483c9323fed2097

      SHA1

      c7d7c99f04eea2ffeb3ab1ee072b1734d7b6ec9d

      SHA256

      44b655807a6af97ac1c476f484112a2b7ca023c1c841952f6f91547d480e860e

      SHA512

      c5783f37fd94589c4e82e767a14d01cc9dc1fdef6e1ae3072aeafee298337048d71c76369467795bd3c5720a20d26a918dca8776bcfd3cc99d557b0c5ac1d779

    • C:\Users\Admin\AppData\Local\Temp\csol.exe

      Filesize

      20KB

      MD5

      30f4acd300eabc29d24bef6b532216a6

      SHA1

      93f42f54949eb2dc6870f4edea86144d45e9ad78

      SHA256

      d230e71da3e6231ee2f050d501f466353790882a6c4338e93b839ac0e4a4cfa0

      SHA512

      d5456bae3911a5d9dbc8c56f196d72284c340fe41013c480fe24ba6eb06ffc0745367499bb1d2aa18eb880176ce411b0e39c2b5f35928d48176a830bbf18e140

    • C:\Users\Admin\AppData\Local\Temp\ÅÜÅÜ¿¨¶¡³µ¼¯ÆøС¹¤¾ß.exe

      Filesize

      29KB

      MD5

      a5014d677eebb5511fe416ceaee1cf91

      SHA1

      62344e63ec8a147920537152bf2c180e0001ccf6

      SHA256

      2e71096b2518792c626c8e3771b9e0d642064901dc170a6b5ece717c2ac92892

      SHA512

      d6b04e5fe95250e5286f5f5b5cc6a90aaa1ec46a26d5a92fdf9b1b505b14293b815ad1e24295a315afff063d2ed0d9e6c17e3808eca90f6d363e295ad1e0170a

    • C:\Users\Admin\AppData\Roaming\Microsoft\WindowsUpdate.exe

      Filesize

      85KB

      MD5

      e49c6000102b0ac46d175ffa026cc790

      SHA1

      38a6ee53afa2744b78ad8d3331bbb6e597954547

      SHA256

      fd8c7023c782ef9543a59a9562d2c5c0afc88e02421a9f5a758fd6449a4c28dd

      SHA512

      a0110ff2d4d1adecc7353e2d0c22446399762c3f76468f80958c78acbab0f2e31047a8156f7c0d03748a0b41897a3338b915d21ca782891d4d088d2cb8f9f2c9

    • C:\Users\Admin\AppData\Roaming\Microsoft\e57850e.exe

      Filesize

      132KB

      MD5

      2868fe36199e26330909610ecb3fb757

      SHA1

      42f44ae47eba0dd9d4aa567b7a8d7b2c2b7e0e22

      SHA256

      a2d74f24e2d3ccb765f3451a2363b0d64261678d12a47f3bfe7fb52daadccf5d

      SHA512

      faff15cf73ff5fe138ee3f898edb75f5bee0c470fbd04369948edee8eb4a49128b2f913ddfec1de230bf6bdb6f4985d278f68e68181b59972f0a4622f6f5b03c

    • memory/2236-43-0x0000000003C90000-0x0000000003CA3000-memory.dmp

      Filesize

      76KB

    • memory/2236-44-0x0000000003C90000-0x0000000003CA3000-memory.dmp

      Filesize

      76KB

    • memory/2756-38-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/2940-34-0x0000000000400000-0x000000000040E000-memory.dmp

      Filesize

      56KB

    • memory/4312-25-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/4312-33-0x00000000004C0000-0x00000000004D3000-memory.dmp

      Filesize

      76KB

    • memory/4312-45-0x00000000004C0000-0x00000000004D3000-memory.dmp

      Filesize

      76KB

    • memory/4312-48-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/4312-70-0x00000000004C0000-0x00000000004D3000-memory.dmp

      Filesize

      76KB