Analysis
-
max time kernel
122s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 07:29
Static task
static1
Behavioral task
behavioral1
Sample
2d6cc4f5bdec3d16a4087b82aa785d2f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2d6cc4f5bdec3d16a4087b82aa785d2f.exe
Resource
win10v2004-20231215-en
General
-
Target
2d6cc4f5bdec3d16a4087b82aa785d2f.exe
-
Size
206KB
-
MD5
2d6cc4f5bdec3d16a4087b82aa785d2f
-
SHA1
696bc0bde02d408c31bf3666ee18229b174c2e82
-
SHA256
e7eba8eea4beed8c13930545bb7b053102912301a547b7958d7d8fd730e79181
-
SHA512
175d66969277dc8a1abd3270820f0829430487586676eab0651df8823dcd11290d5440a4979df405923103842d0cae42da0567e50c5933f997792947cb9d9817
-
SSDEEP
6144:GdHYqqDGVAWSJJRqI610mg+zouKKdKWEE++Fi6zKV7/7k:GzqSO9Jnh60mg+ZaWEE++F5GDI
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 8 IoCs
resource yara_rule behavioral1/memory/2764-4-0x0000000000400000-0x0000000000432000-memory.dmp modiloader_stage2 behavioral1/memory/2764-8-0x0000000000400000-0x0000000000432000-memory.dmp modiloader_stage2 behavioral1/memory/2764-7-0x0000000000400000-0x0000000000432000-memory.dmp modiloader_stage2 behavioral1/memory/2360-29-0x0000000000400000-0x0000000000432000-memory.dmp modiloader_stage2 behavioral1/memory/2360-28-0x0000000000400000-0x0000000000432000-memory.dmp modiloader_stage2 behavioral1/memory/2360-37-0x0000000000400000-0x0000000000432000-memory.dmp modiloader_stage2 behavioral1/memory/2764-15-0x0000000000400000-0x0000000000432000-memory.dmp modiloader_stage2 behavioral1/memory/2764-6-0x0000000000400000-0x0000000000432000-memory.dmp modiloader_stage2 -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run msngr.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\msngr = "C:\\Windows\\msngr.exe" msngr.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{13E25KED-UA32-YLU7-6O10-SIG0G8HP63B3} msngr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{13E25KED-UA32-YLU7-6O10-SIG0G8HP63B3}\StubPath = "\"C:\\Windows\\msngr.exe\"" msngr.exe -
Executes dropped EXE 2 IoCs
pid Process 2844 msngr.exe 2360 msngr.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1968 set thread context of 2764 1968 2d6cc4f5bdec3d16a4087b82aa785d2f.exe 18 PID 2844 set thread context of 2360 2844 msngr.exe 16 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\msngr.exe 2d6cc4f5bdec3d16a4087b82aa785d2f.exe File opened for modification C:\Windows\msngr.exe 2d6cc4f5bdec3d16a4087b82aa785d2f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1968 wrote to memory of 2764 1968 2d6cc4f5bdec3d16a4087b82aa785d2f.exe 18 PID 1968 wrote to memory of 2764 1968 2d6cc4f5bdec3d16a4087b82aa785d2f.exe 18 PID 1968 wrote to memory of 2764 1968 2d6cc4f5bdec3d16a4087b82aa785d2f.exe 18 PID 1968 wrote to memory of 2764 1968 2d6cc4f5bdec3d16a4087b82aa785d2f.exe 18 PID 1968 wrote to memory of 2764 1968 2d6cc4f5bdec3d16a4087b82aa785d2f.exe 18 PID 1968 wrote to memory of 2764 1968 2d6cc4f5bdec3d16a4087b82aa785d2f.exe 18 PID 2764 wrote to memory of 2844 2764 2d6cc4f5bdec3d16a4087b82aa785d2f.exe 17 PID 2764 wrote to memory of 2844 2764 2d6cc4f5bdec3d16a4087b82aa785d2f.exe 17 PID 2764 wrote to memory of 2844 2764 2d6cc4f5bdec3d16a4087b82aa785d2f.exe 17 PID 2764 wrote to memory of 2844 2764 2d6cc4f5bdec3d16a4087b82aa785d2f.exe 17 PID 2844 wrote to memory of 2360 2844 msngr.exe 16 PID 2844 wrote to memory of 2360 2844 msngr.exe 16 PID 2844 wrote to memory of 2360 2844 msngr.exe 16 PID 2844 wrote to memory of 2360 2844 msngr.exe 16 PID 2844 wrote to memory of 2360 2844 msngr.exe 16 PID 2844 wrote to memory of 2360 2844 msngr.exe 16 PID 2360 wrote to memory of 2776 2360 msngr.exe 15 PID 2360 wrote to memory of 2776 2360 msngr.exe 15 PID 2360 wrote to memory of 2776 2360 msngr.exe 15 PID 2360 wrote to memory of 2776 2360 msngr.exe 15 PID 2360 wrote to memory of 2776 2360 msngr.exe 15 PID 2360 wrote to memory of 2776 2360 msngr.exe 15 PID 2360 wrote to memory of 2776 2360 msngr.exe 15 PID 2360 wrote to memory of 2776 2360 msngr.exe 15 PID 2360 wrote to memory of 2776 2360 msngr.exe 15 PID 2360 wrote to memory of 2776 2360 msngr.exe 15 PID 2360 wrote to memory of 2776 2360 msngr.exe 15 PID 2360 wrote to memory of 2776 2360 msngr.exe 15 PID 2360 wrote to memory of 2776 2360 msngr.exe 15 PID 2360 wrote to memory of 2776 2360 msngr.exe 15 PID 2360 wrote to memory of 2776 2360 msngr.exe 15 PID 2360 wrote to memory of 2776 2360 msngr.exe 15 PID 2360 wrote to memory of 2776 2360 msngr.exe 15 PID 2360 wrote to memory of 2776 2360 msngr.exe 15 PID 2360 wrote to memory of 2776 2360 msngr.exe 15 PID 2360 wrote to memory of 2776 2360 msngr.exe 15 PID 2360 wrote to memory of 2776 2360 msngr.exe 15 PID 2360 wrote to memory of 2776 2360 msngr.exe 15 PID 2360 wrote to memory of 2776 2360 msngr.exe 15 PID 2360 wrote to memory of 2776 2360 msngr.exe 15 PID 2360 wrote to memory of 2776 2360 msngr.exe 15 PID 2360 wrote to memory of 2776 2360 msngr.exe 15 PID 2360 wrote to memory of 2776 2360 msngr.exe 15 PID 2360 wrote to memory of 2776 2360 msngr.exe 15 PID 2360 wrote to memory of 2776 2360 msngr.exe 15 PID 2360 wrote to memory of 2776 2360 msngr.exe 15 PID 2360 wrote to memory of 2776 2360 msngr.exe 15 PID 2360 wrote to memory of 2776 2360 msngr.exe 15 PID 2360 wrote to memory of 2776 2360 msngr.exe 15 PID 2360 wrote to memory of 2776 2360 msngr.exe 15 PID 2360 wrote to memory of 2776 2360 msngr.exe 15 PID 2360 wrote to memory of 2776 2360 msngr.exe 15 PID 2360 wrote to memory of 2776 2360 msngr.exe 15 PID 2360 wrote to memory of 2776 2360 msngr.exe 15 PID 2360 wrote to memory of 2776 2360 msngr.exe 15 PID 2360 wrote to memory of 2776 2360 msngr.exe 15 PID 2360 wrote to memory of 2776 2360 msngr.exe 15 PID 2360 wrote to memory of 2776 2360 msngr.exe 15 PID 2360 wrote to memory of 2776 2360 msngr.exe 15 PID 2360 wrote to memory of 2776 2360 msngr.exe 15 PID 2360 wrote to memory of 2776 2360 msngr.exe 15 PID 2360 wrote to memory of 2776 2360 msngr.exe 15 PID 2360 wrote to memory of 2776 2360 msngr.exe 15 PID 2360 wrote to memory of 2776 2360 msngr.exe 15
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d6cc4f5bdec3d16a4087b82aa785d2f.exe"C:\Users\Admin\AppData\Local\Temp\2d6cc4f5bdec3d16a4087b82aa785d2f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\2d6cc4f5bdec3d16a4087b82aa785d2f.exe"C:\Users\Admin\AppData\Local\Temp\2d6cc4f5bdec3d16a4087b82aa785d2f.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2764
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"1⤵PID:2776
-
C:\Windows\msngr.exe"C:\Windows\msngr.exe"1⤵
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2360
-
C:\Windows\msngr.exe"C:\Windows\msngr.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2844
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD50b63c62f9ad2659ca9597572c4a60418
SHA1a5e9d15ad7449753bf61a705e76e7225e81cf56d
SHA256509190f8ed75be8bea32b5f7927b78b69fd46e084f7b15fa5ce4b60401e54e32
SHA5123fa18d328635efa98b0afab41ae5bdfc8d12f56ae3fbb1b9c90118dbd4c4594ceb151e20c63b2028c003247f9bca38a18c6b1162b7b5d7aaad5f672fbfb2d94a