Analysis
-
max time kernel
150s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 07:29
Static task
static1
Behavioral task
behavioral1
Sample
2d6cc4f5bdec3d16a4087b82aa785d2f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2d6cc4f5bdec3d16a4087b82aa785d2f.exe
Resource
win10v2004-20231215-en
General
-
Target
2d6cc4f5bdec3d16a4087b82aa785d2f.exe
-
Size
206KB
-
MD5
2d6cc4f5bdec3d16a4087b82aa785d2f
-
SHA1
696bc0bde02d408c31bf3666ee18229b174c2e82
-
SHA256
e7eba8eea4beed8c13930545bb7b053102912301a547b7958d7d8fd730e79181
-
SHA512
175d66969277dc8a1abd3270820f0829430487586676eab0651df8823dcd11290d5440a4979df405923103842d0cae42da0567e50c5933f997792947cb9d9817
-
SSDEEP
6144:GdHYqqDGVAWSJJRqI610mg+zouKKdKWEE++Fi6zKV7/7k:GzqSO9Jnh60mg+ZaWEE++F5GDI
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 8 IoCs
resource yara_rule behavioral2/memory/4124-0-0x0000000000400000-0x0000000000432000-memory.dmp modiloader_stage2 behavioral2/memory/4124-1-0x0000000000400000-0x0000000000432000-memory.dmp modiloader_stage2 behavioral2/memory/4124-3-0x0000000000400000-0x0000000000432000-memory.dmp modiloader_stage2 behavioral2/memory/4124-5-0x0000000000400000-0x0000000000432000-memory.dmp modiloader_stage2 behavioral2/memory/4124-13-0x0000000000400000-0x0000000000432000-memory.dmp modiloader_stage2 behavioral2/memory/4164-20-0x0000000000400000-0x0000000000432000-memory.dmp modiloader_stage2 behavioral2/memory/4164-21-0x0000000000400000-0x0000000000432000-memory.dmp modiloader_stage2 behavioral2/memory/4164-29-0x0000000000400000-0x0000000000432000-memory.dmp modiloader_stage2 -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run msngr.exe Set value (str) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\msngr = "C:\\Windows\\msngr.exe" msngr.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{13E25KED-UA32-YLU7-6O10-SIG0G8HP63B3} msngr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{13E25KED-UA32-YLU7-6O10-SIG0G8HP63B3}\StubPath = "\"C:\\Windows\\msngr.exe\"" msngr.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\Control Panel\International\Geo\Nation 2d6cc4f5bdec3d16a4087b82aa785d2f.exe -
Executes dropped EXE 2 IoCs
pid Process 4044 msngr.exe 4164 msngr.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3596 set thread context of 4124 3596 2d6cc4f5bdec3d16a4087b82aa785d2f.exe 88 PID 4044 set thread context of 4164 4044 msngr.exe 92 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\msngr.exe 2d6cc4f5bdec3d16a4087b82aa785d2f.exe File opened for modification C:\Windows\msngr.exe 2d6cc4f5bdec3d16a4087b82aa785d2f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3596 wrote to memory of 4124 3596 2d6cc4f5bdec3d16a4087b82aa785d2f.exe 88 PID 3596 wrote to memory of 4124 3596 2d6cc4f5bdec3d16a4087b82aa785d2f.exe 88 PID 3596 wrote to memory of 4124 3596 2d6cc4f5bdec3d16a4087b82aa785d2f.exe 88 PID 3596 wrote to memory of 4124 3596 2d6cc4f5bdec3d16a4087b82aa785d2f.exe 88 PID 3596 wrote to memory of 4124 3596 2d6cc4f5bdec3d16a4087b82aa785d2f.exe 88 PID 4124 wrote to memory of 4044 4124 2d6cc4f5bdec3d16a4087b82aa785d2f.exe 91 PID 4124 wrote to memory of 4044 4124 2d6cc4f5bdec3d16a4087b82aa785d2f.exe 91 PID 4124 wrote to memory of 4044 4124 2d6cc4f5bdec3d16a4087b82aa785d2f.exe 91 PID 4044 wrote to memory of 4164 4044 msngr.exe 92 PID 4044 wrote to memory of 4164 4044 msngr.exe 92 PID 4044 wrote to memory of 4164 4044 msngr.exe 92 PID 4044 wrote to memory of 4164 4044 msngr.exe 92 PID 4044 wrote to memory of 4164 4044 msngr.exe 92 PID 4164 wrote to memory of 3956 4164 msngr.exe 93 PID 4164 wrote to memory of 3956 4164 msngr.exe 93 PID 4164 wrote to memory of 3956 4164 msngr.exe 93 PID 4164 wrote to memory of 3956 4164 msngr.exe 93 PID 4164 wrote to memory of 3956 4164 msngr.exe 93 PID 4164 wrote to memory of 3956 4164 msngr.exe 93 PID 4164 wrote to memory of 3956 4164 msngr.exe 93 PID 4164 wrote to memory of 3956 4164 msngr.exe 93 PID 4164 wrote to memory of 3956 4164 msngr.exe 93 PID 4164 wrote to memory of 3956 4164 msngr.exe 93 PID 4164 wrote to memory of 3956 4164 msngr.exe 93 PID 4164 wrote to memory of 3956 4164 msngr.exe 93 PID 4164 wrote to memory of 3956 4164 msngr.exe 93 PID 4164 wrote to memory of 3956 4164 msngr.exe 93 PID 4164 wrote to memory of 3956 4164 msngr.exe 93 PID 4164 wrote to memory of 3956 4164 msngr.exe 93 PID 4164 wrote to memory of 3956 4164 msngr.exe 93 PID 4164 wrote to memory of 3956 4164 msngr.exe 93 PID 4164 wrote to memory of 3956 4164 msngr.exe 93 PID 4164 wrote to memory of 3956 4164 msngr.exe 93 PID 4164 wrote to memory of 3956 4164 msngr.exe 93 PID 4164 wrote to memory of 3956 4164 msngr.exe 93 PID 4164 wrote to memory of 3956 4164 msngr.exe 93 PID 4164 wrote to memory of 3956 4164 msngr.exe 93 PID 4164 wrote to memory of 3956 4164 msngr.exe 93 PID 4164 wrote to memory of 3956 4164 msngr.exe 93 PID 4164 wrote to memory of 3956 4164 msngr.exe 93 PID 4164 wrote to memory of 3956 4164 msngr.exe 93 PID 4164 wrote to memory of 3956 4164 msngr.exe 93 PID 4164 wrote to memory of 3956 4164 msngr.exe 93 PID 4164 wrote to memory of 3956 4164 msngr.exe 93 PID 4164 wrote to memory of 3956 4164 msngr.exe 93 PID 4164 wrote to memory of 3956 4164 msngr.exe 93 PID 4164 wrote to memory of 3956 4164 msngr.exe 93 PID 4164 wrote to memory of 3956 4164 msngr.exe 93 PID 4164 wrote to memory of 3956 4164 msngr.exe 93 PID 4164 wrote to memory of 3956 4164 msngr.exe 93 PID 4164 wrote to memory of 3956 4164 msngr.exe 93 PID 4164 wrote to memory of 3956 4164 msngr.exe 93 PID 4164 wrote to memory of 3956 4164 msngr.exe 93 PID 4164 wrote to memory of 3956 4164 msngr.exe 93 PID 4164 wrote to memory of 3956 4164 msngr.exe 93 PID 4164 wrote to memory of 3956 4164 msngr.exe 93 PID 4164 wrote to memory of 3956 4164 msngr.exe 93 PID 4164 wrote to memory of 3956 4164 msngr.exe 93 PID 4164 wrote to memory of 3956 4164 msngr.exe 93 PID 4164 wrote to memory of 3956 4164 msngr.exe 93 PID 4164 wrote to memory of 3956 4164 msngr.exe 93 PID 4164 wrote to memory of 3956 4164 msngr.exe 93 PID 4164 wrote to memory of 3956 4164 msngr.exe 93 PID 4164 wrote to memory of 3956 4164 msngr.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d6cc4f5bdec3d16a4087b82aa785d2f.exe"C:\Users\Admin\AppData\Local\Temp\2d6cc4f5bdec3d16a4087b82aa785d2f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Users\Admin\AppData\Local\Temp\2d6cc4f5bdec3d16a4087b82aa785d2f.exe"C:\Users\Admin\AppData\Local\Temp\2d6cc4f5bdec3d16a4087b82aa785d2f.exe"2⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Windows\msngr.exe"C:\Windows\msngr.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Windows\msngr.exe"C:\Windows\msngr.exe"4⤵
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4164 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:3956
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD52d6cc4f5bdec3d16a4087b82aa785d2f
SHA1696bc0bde02d408c31bf3666ee18229b174c2e82
SHA256e7eba8eea4beed8c13930545bb7b053102912301a547b7958d7d8fd730e79181
SHA512175d66969277dc8a1abd3270820f0829430487586676eab0651df8823dcd11290d5440a4979df405923103842d0cae42da0567e50c5933f997792947cb9d9817