Analysis

  • max time kernel
    118s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2023, 13:08

General

  • Target

    3752d765fb64ea75ddff1184eb6a2832.exe

  • Size

    724KB

  • MD5

    3752d765fb64ea75ddff1184eb6a2832

  • SHA1

    2ac1135e5e1a830369656cef448e71ea89e90f8c

  • SHA256

    7debdaf48b804be5168d19fcc7d48d1ba13af97d6be02275bed5f5db2a586c97

  • SHA512

    a732248003e248884c239bdda087a0566586dfe0da78e799c631391fe2d8abc955081da765bae16ba9aac6f16b8b2d24176ca0b01c12ddd2d35b8b3a50d4c2ba

  • SSDEEP

    12288:7c//////pU00CxVotqzdUJvEoQu/0rUbsanfN9AV65WNtXahVI3O:7c//////pUViFQPd0rUbsafN9AV65WN6

Score
10/10

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 7 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 30 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3752d765fb64ea75ddff1184eb6a2832.exe
    "C:\Users\Admin\AppData\Local\Temp\3752d765fb64ea75ddff1184eb6a2832.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2212
    • C:\Users\Admin\AppData\Local\Temp\3752d765fb64ea75ddff1184eb6a2832.exe
      C:\Users\Admin\AppData\Local\Temp\3752d765fb64ea75ddff1184eb6a2832.exe
      2⤵
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:1188
      • C:\program files\internet explorer\IEXPLORE.EXE
        "C:\program files\internet explorer\IEXPLORE.EXE"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1696
  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
    "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1696 CREDAT:275457 /prefetch:2
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    PID:2164

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    c0c3827a66d8eed238b96ced974a4a84

    SHA1

    17197168c956ceb575002ada09f5cb55a2a3b80d

    SHA256

    2fabd4d362b29120aee31012751d815c9321076a46fcf6fa02bc91ba7fefa1d4

    SHA512

    a591de4bdf04091b470fa68eff2e08bc0297e9e9a90148b7cbf4324a6b6fccf5ae5ff111c1fb99d1f52c13341e856e4632699787402cbd4582a78f94c873f1fd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c3681e013c88ba69ea5add0d9c3fe333

    SHA1

    5e6197afb39ca9453e3394191adf0400e03d3e82

    SHA256

    72134507ed811a95af0ce0090463eabb726dc7133028a2f57919604ba74294da

    SHA512

    569929b714f80879bea338913d9dc274affc91036b5bc66a443a760a40421c78008902923275ecf226beca8499d3030633dbf4de2bad3e83d5efd37f729c08b3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fc26ba495676f5a35796bf8dbc661a75

    SHA1

    97e84fc1264af63f5ca40efb757eaa33652d19d1

    SHA256

    e7415900e215fe58f444c9ab8043c5cdf3439bfc9c72583ff266598fbec527d8

    SHA512

    a52e3ae5524db34d44fa63a10cef20fffe1a589d0fcdce34ea9f0a20070d3030eb241fbfc712b715895a797f6b91f3c62619fcfcae116d01f4e94a9914eafd6d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bd5c00b23102bd0ca57849ab6b4e6fd4

    SHA1

    f643732a5456d7762f8f591ab7614715dc531cba

    SHA256

    4ca1035cc1e31158849e3469208fd4728d43032c23acffb15003620b5a465d79

    SHA512

    0ca434bdafb9288cb06ca8ad563829703a6cab83266fbc4cf29aca36f83168fb81b257f6650dfbc2c6ceaa086239a6c79d97691d1d0865e57cbc8b37371fb7d2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    061029f57bc146b724ca22e6ae85a854

    SHA1

    505cbbd5732eee9f2e91543a04c3c88b7cb97e38

    SHA256

    1ee23d3ea2bdf252cef968729da82f529c7a715de8981122d9f5753cb68e9d0d

    SHA512

    f2863d1dac3856eab51c73e9c26d5b5c9f22ad4519f00b6c84228fdb84e7a64b7c46f433c962ec8dc63d517f7a61ed64b3153974f453f1a5dce7b77c6bc5e9b9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f5bb07d1862564df26ca4b34cfeaf299

    SHA1

    ff05d78ed0e7db9126cc4634210e2ba223fe6a74

    SHA256

    30e95e65e0e871083b220fc484e2994c8545b7c462e62f7564dece8791fe93ab

    SHA512

    44dc4336ebc46ef1d70167c86767410821b47dd0f8ba676ba92f6dd5b76cbf1f869c54664fadb2b1eafc97b1c22e4ccf79d0a86f3f793d1bf07aa1e13704cf7e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    11143ffc9a499429183ce45bd0458afb

    SHA1

    0129a9b25e7fb876b2a967570bdfaae0cb547773

    SHA256

    68c512be7acedfb92ed1a6af9cebf186a0e128618c76883dc89aac28091a2fc1

    SHA512

    a38c33db4c1059748b9bc474e71b705f578beeb6ad7d12cf1a4553065030e326e0995e1438e27a528e1ce67cb643ea745a8e1c7b803d4d7337fa1905378462a3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    44b48a9a870e03d4de477c3a9782d3ff

    SHA1

    28f70b271b31e30795672b08453aca0a77455266

    SHA256

    27c34ef90595d1023550b02d483ed42a695c318678599615c2d98fde86113090

    SHA512

    78996cd081a7126109096b6567747e0babcc64413cd25f068b2797cb4f62b09291395c2f1918ecd2fde62834f937d51837d8881a55e6a7067f3f5a7d3ca39702

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c2adb860012d018504c98591f7bedfd8

    SHA1

    0a83dd5330c38aa069f24cf8b61ea1c16d66e782

    SHA256

    58f788d63c04121c76676f9a4a4d7245024567994107b6fb756a462f038b04c1

    SHA512

    8a95886664caf3828b99acd3a5f1e7bc60322dceb3f8cf56669ff77ea3e16d095378f7c7b54286981eb8b011fb05ba38b79816c81329e9a0796016c6e68807c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c1eadbdbdfc613df23ab72b9cf3ffba4

    SHA1

    91b9d80990c8055665788e80d1462aabf9f3d959

    SHA256

    2dfa0b6d6e107385d1267ce6453b1bc86babf72921c08a3e5c4eacb9cd93a571

    SHA512

    c165006c9cbfc05d9770678557ff4298c5e738c030efb13be3a1915093268af607f3af109c5abb35e24bfaae686bcd0f705b29c54c536f2b72386e8d64725723

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    71dd84628faabb07b33c4f21c891b942

    SHA1

    55019c58e1ea8b386663bd257db814c07c9d464a

    SHA256

    f6ea6c0bd8a179750b1d7a480b575161f8dcc090009306542e1b2a4d3bb0bafc

    SHA512

    690fa273fd0c1d4c6c9f0bfb70a1c673001ee51395dfa8e806c0527c50511a2509213e69b91fefc6c8ec94148f16996c6f2e7dabae50acaeb26d0468b293207a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    483e1bbbc5fb5390b7cefcd32ecb77c6

    SHA1

    4a014d0c21c13d61f0629bead53ab4ba1888f12c

    SHA256

    9dcc10fe414a43bd6277389e0e5586ab04f2964b68f0e73a0127bbe3f409e48b

    SHA512

    94f9c5ba9ceb221cf944f111462676fd2e84ddcab06cea6c16f54bd5930d4024a7d0e96f0ee59fdeb828954942260f1f9085920eb3e9314cfd93cb1bf1f6e6f1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ba7aa28c8ba44ce40ab86a2d2ca539f4

    SHA1

    bde9409698da7759c8498306b6731c5e81467076

    SHA256

    4745a6a20ffac59b3c70137de22223ccdface517d68194a8821269f232ba7dec

    SHA512

    28dadeabdd3a2938abff7b07322b1c3bfedd1786a26cb6fd1aaca7b58c7b71be86503d39425de6d19799e417614cf96bf3cf0a37867650a4967dea2b46f98700

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    90dc00736a1af60ac7764b3b86e6a1b8

    SHA1

    d7291963b936175b5fb4229b469edca2eb060e47

    SHA256

    2e5fc39a9fee33f5882539d3506f57edb4c883f530d42c5c6b3ba54fb43accec

    SHA512

    f6721cf7883184e3437ffbd17508214bd98d4d7964e22d939ce6d3037fe033174efb12f23fe6ca8e9bba37cc1c7b1246179789c1e6909693859660e87aa6ce2f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fa8450734f748ba8a6aae9896589a00c

    SHA1

    6e382ea3913c15d6f3d8d6f4ced7489f08f7ccc5

    SHA256

    192fe62d1b1412dbd9a953dd5c24b2f6ef1041c8e6cdb5c7c50199588bb90ab4

    SHA512

    c25e44ffa758ddc5fceda928d51f586fda5a5ee4b004b94d26ac047a345eb5c6225e342eee89649b7b164952aa67f37b3ba0a122147e006a1cbe1e5ea2bcebd0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    98653682b7f48e36b1642f7e6695c356

    SHA1

    1db29f1912558c0f9c3837eb01696d49d74c4a47

    SHA256

    a3eb18865a107d9b831c0d6ed530c2921ee21ddf4e1698d269e5c6a852224bab

    SHA512

    ccd4357bcc328f1db1d26f6a0fcdebc259b29b7a3618a7f7d73fc75f82dc5eb85cefb1069c5fef0446522c289e9d498d60dfff2973575fe09381a20a616b8155

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    d25b5676fc24242cb9d082cd93bdb5a7

    SHA1

    31018346e93c830a429f38dfb3c2bb17da048f1c

    SHA256

    912a326a0381a0892c3527cc38aae027fc58fec66dae3dbf89cc0af8fc375735

    SHA512

    dc7edff82cec71d91942cfb59d2d0dadcbc012e3d450e342d52d383f44d8519ce312367490b96139849aad8afa96a4b7b88863da359d5286d9893cbaa7081986

  • C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico

    Filesize

    4KB

    MD5

    da597791be3b6e732f0bc8b20e38ee62

    SHA1

    1125c45d285c360542027d7554a5c442288974de

    SHA256

    5b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07

    SHA512

    d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e

  • C:\Users\Admin\AppData\Local\Temp\Tar4060.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • memory/1188-13-0x0000000000400000-0x00000000004C0000-memory.dmp

    Filesize

    768KB

  • memory/1188-4-0x0000000000400000-0x00000000004C0000-memory.dmp

    Filesize

    768KB

  • memory/1188-0-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/1188-2-0x0000000000400000-0x00000000004C0000-memory.dmp

    Filesize

    768KB

  • memory/1188-6-0x0000000000400000-0x00000000004C0000-memory.dmp

    Filesize

    768KB

  • memory/1188-7-0x0000000000400000-0x00000000004C0000-memory.dmp

    Filesize

    768KB

  • memory/1188-14-0x0000000000400000-0x00000000004C0000-memory.dmp

    Filesize

    768KB

  • memory/1188-8-0x0000000000400000-0x00000000004C0000-memory.dmp

    Filesize

    768KB

  • memory/1188-12-0x00000000003F0000-0x00000000003F1000-memory.dmp

    Filesize

    4KB

  • memory/1188-10-0x0000000000400000-0x00000000004C0000-memory.dmp

    Filesize

    768KB

  • memory/1696-11-0x0000000000160000-0x000000000021D000-memory.dmp

    Filesize

    756KB

  • memory/2212-5-0x0000000000400000-0x00000000004BD000-memory.dmp

    Filesize

    756KB