Analysis
-
max time kernel
120s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
27-01-2024 03:57
Static task
static1
Behavioral task
behavioral1
Sample
79368dd9942c2e41a1fadf6d4d5734d8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
79368dd9942c2e41a1fadf6d4d5734d8.exe
Resource
win10v2004-20231222-en
General
-
Target
79368dd9942c2e41a1fadf6d4d5734d8.exe
-
Size
762KB
-
MD5
79368dd9942c2e41a1fadf6d4d5734d8
-
SHA1
31a93cba1bf16dc7588b7eeac77c59a73ebb181f
-
SHA256
935975a8149095a24c14996215c33b8166bb67202fdede41db1e1515d8c0559d
-
SHA512
2e98e654ce890cadcf7a0b11b032c72ec5779ac924a8dae172ae8cbc7c0da6ff9a90a22e6760b9d14033b3a0ec4d857c35209f920d11a8b51b076cea4759f1ce
-
SSDEEP
12288:AOc//////6XaLJepy+SPNo3Nc8A+s0vki9IVCuiM77CMEoNiEERNUDci1U45Ktqo:Rc//////6Kspp+o3NPHHA7OUQNFi1NKF
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral1/memory/1768-3-0x0000000000400000-0x00000000004C2000-memory.dmp modiloader_stage2 behavioral1/memory/1768-7-0x0000000000400000-0x00000000004C2000-memory.dmp modiloader_stage2 -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3068 set thread context of 1768 3068 79368dd9942c2e41a1fadf6d4d5734d8.exe 28 PID 1768 set thread context of 2672 1768 79368dd9942c2e41a1fadf6d4d5734d8.exe 29 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\web\2010.txt 79368dd9942c2e41a1fadf6d4d5734d8.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "412489703" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{27CE88C1-BCC8-11EE-9695-6A53A263E8F2} = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2672 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3068 wrote to memory of 1768 3068 79368dd9942c2e41a1fadf6d4d5734d8.exe 28 PID 3068 wrote to memory of 1768 3068 79368dd9942c2e41a1fadf6d4d5734d8.exe 28 PID 3068 wrote to memory of 1768 3068 79368dd9942c2e41a1fadf6d4d5734d8.exe 28 PID 3068 wrote to memory of 1768 3068 79368dd9942c2e41a1fadf6d4d5734d8.exe 28 PID 3068 wrote to memory of 1768 3068 79368dd9942c2e41a1fadf6d4d5734d8.exe 28 PID 3068 wrote to memory of 1768 3068 79368dd9942c2e41a1fadf6d4d5734d8.exe 28 PID 1768 wrote to memory of 2672 1768 79368dd9942c2e41a1fadf6d4d5734d8.exe 29 PID 1768 wrote to memory of 2672 1768 79368dd9942c2e41a1fadf6d4d5734d8.exe 29 PID 1768 wrote to memory of 2672 1768 79368dd9942c2e41a1fadf6d4d5734d8.exe 29 PID 1768 wrote to memory of 2672 1768 79368dd9942c2e41a1fadf6d4d5734d8.exe 29 PID 1768 wrote to memory of 2672 1768 79368dd9942c2e41a1fadf6d4d5734d8.exe 29 PID 2672 wrote to memory of 2716 2672 IEXPLORE.EXE 30 PID 2672 wrote to memory of 2716 2672 IEXPLORE.EXE 30 PID 2672 wrote to memory of 2716 2672 IEXPLORE.EXE 30 PID 2672 wrote to memory of 2716 2672 IEXPLORE.EXE 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\79368dd9942c2e41a1fadf6d4d5734d8.exe"C:\Users\Admin\AppData\Local\Temp\79368dd9942c2e41a1fadf6d4d5734d8.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\79368dd9942c2e41a1fadf6d4d5734d8.exeC:\Users\Admin\AppData\Local\Temp\79368dd9942c2e41a1fadf6d4d5734d8.exe2⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2672 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2716
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5312227ca42628a524bf1d9f9a0b0f136
SHA1c12d0b6569944e0e97f2b797451db7819f04d502
SHA25606cb3f9b1ae93312f28b6bf031a2d00ea9811ccdb38779b927dc564569521ddd
SHA512434d114b0ef8d8e8adbc13b6f52eb075bddde2a37144a23ad534cc050bae54cecdce0f5754e1224b3c3c8ded2ec374a78981900302283de7372bed2f2e519f2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da2d693862a5d626a1b0bd3fbe6a0166
SHA1d653afa58cf1e5624acaac972f1343894e0ce79d
SHA25693bda94886c9f5ee0ee30ec7ba310d93f81bd7666bb5f1389c6b2acd56a55ee0
SHA512f445dba7e4222b4e95c4cc2a7a3e3285e3572b2ec1eacb6494c3e962cabe7092294425b2f393bf022cb481a9fd0db4fd4718c04077c25bdeccd956f26f676ec3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e924d5e3f45c4a1ba18a5c163923519b
SHA1878fb01f0e0629aae27f417ee79ecb50247b605d
SHA25682df4465cabb603910a5f3f4da7ed6de6a46bfb8f2a80604669c76d15d4734a2
SHA512639426eb5e721aaa07ea6343e17b37ab6ab348787504ebb44b9274f7dd6ba7e344c74711040d05545f656ba24efaf61270bc55418908cc19915c3a0fb341d530
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4bdc6b16da05267883266fde1be9816
SHA1cebce4e789cb4180d4bf0042d5156ca768257b86
SHA256ccdf3d1db06a07a8f4faf9dff44659d6869ca11ed3b4f91882c8f9726e26c5db
SHA512738869275f1fcc49da3e3b6fc9c0cd2742549ea617d56980c87537201026dce458d4b58efe18539c93b4383923ec8cb3aa4fde56b6af5d5481c46277df5a97e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD583a73eb6c025c17bdcc5f458a76f6179
SHA135eb7227ab3d17e762c21dbfb56a30b9867222a0
SHA256a3b320bfe9c5eff5bac1ce64e50334a7a7836553e366645427d06661e2f43954
SHA5125e31cf5a36fb5d451fca02613acacf2b86dc71956e7d6283738c49af7503bc4d5a2164283447c016a95e082f1147a13614f44ec60534e8c46ed7535f5d6df7ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b533dadd13b67e2580aa73f3755dce44
SHA1c71ab1d5c8f0a195b33a9a828c9c63703acdd63e
SHA256dc492a5123d728c5b20a4db92cc6a574762ca8eb5ad4317c691003aafddb4414
SHA51221f16d27cdd773da1674bb88939dd305a57f9c4d5d31c1daf26437c510400981b0ea6495eeca1f767926fa0b33784bc92b11b84514cb5922a84d074f4718d971
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5548f526a35b0098b05f63802df1a5df1
SHA13c7b56509aa887a5c241eccbee8dbdee218e08e3
SHA2560aff70094d867bfcb642dc123be8a43cd69e53a0c3d2e91ba0b7b57ea4536f57
SHA51218f2065c57fc9f0ddd2f55fd57b3b02bbc5572e7c1182b24b506415e3cca04650ee323976bdbfdf9aeaa024476cba50dff5863455240d0f0033075305c9be2e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502ee81d2b66f3f5c368f0afa2fd3f88e
SHA1cdb1839074f58f4722e7d23d15d8394bcb7741cf
SHA25659d7c39be4850a4f9261d6758273080d3470f2d7ca6a5f3b9439290bd6c03375
SHA51229263782bcb1b38e01ec88f93d9d399d985da29811a766fb77b828b0843b7fd8097a6fec12ce85eb3f79bd54b8ee9eddf0c3c8038503262eddc95dcbc709b640
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a2258d6a6e5a3375b8edebf100f9b55
SHA1e22dc164327c39ed2c9176451b2e51d3aa35a542
SHA256afe066250f7e34670b435f44fced85301839785efaa6b58835cef2b515ac1668
SHA512ff55a48dea70a55014f089a3851a8d3c12ed57b62f22c4687407c1c397cbaa5900207733fb3d651ae45d8dae0fb0678deaf0781ca70525c3b22563d20288e5d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf70d23cf65c13efa4aff7712946e64a
SHA1d188b8432fa4a8f59830da7eb56d4b283b48d5a6
SHA2560a1e8d28db931d7e2a32cb85e6b49711ad3395319a9ceda1272d93cf4369a1b1
SHA512387352f861fa18799ffdd533ba7bf8456624a3edcefa6e4f9725f45ff433fe8bbbdffb26bc34f977a572b87940279cb8db592731ac80cbb92c02b8a2c1606bd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59bb969c30aa2eae3769b3f1648342b5b
SHA1368333bda97fcbae96538c7e727eaddb3d4261b5
SHA256ea6d5694353a01a8f8228d313e6ab2cc70ee1d7fc95f4a7d184ea425629cadb2
SHA512d80e7a26a1b37ce4d9d125557781d9cb36183d4cb3c433eccf461cae81f5ab967967049e073f8e3d3ad3edb09f0c0a2eedbdb201fccc63aa1e0e367a912943cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5c96fc071250c22fa57fd21d087707c
SHA1d1cf47b6bb8314f2f17243a2806c4455ec746c2a
SHA25615c1b6358005b3a5f75aea59f9daca4b344f94a88d38b82d835fc481e51c77f2
SHA5125fdba10781656398a60160e1b064e60be93d5dc5bfb1601de0d62bb569ea19970d3ccf093414ee2b058ced8ff4b1dff7988ac7ad5fc9c6a7f01119e3d3626ad6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b9a500d0aade53b38f2767402edd9859
SHA155ddcf9f9b3b565cffac212ed78e265508fc5338
SHA256d1eb6db24d5d403346ccd95de8dff2702a0a9481c7113db4df5777cc4fc2cb6f
SHA51242eccbdd91c0c73f2804638be27de53d356532ee520903e18c6860810611ab8e83498f293a3ca8af884e5bb9d0f94d6969a036c020680000fad21e9a32289a76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0060ded1739a3d4d6e568433f91756f
SHA1f90b0636c826b47d2786405fe93a9f2ed565aa9e
SHA256972659a0d93c9fe0eb720348b1fa04d49334b1d3dda1d058b32a3e238bdb106d
SHA51278e163478ab98dda6d253962e4972e60e116bb7bdf6d7d4768df0f888974e3778a2b649d2603045a2ed0fdba87c3baf1ca4acb8d228a54c0a6e1be6b5f22e1f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5435943424623c405aad11b9f9475707b
SHA1eb179c4fbd32795213cf98d8006e1b5bc091a47e
SHA256067a465858121c241161c0985cf272a8f5145bdc250b67a0b1a7c9b180f00b3f
SHA512628f8b13f1a1e1bc0e37292151d25ef669395f9cacbb01c1066eee10328c8271c621cc7940ac8d6a86e65ba900b14c07163259107aa6766d3f67e6d87f8da605
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5912c24c255947c48f91ba693d63472f0
SHA101b70a5b299fc5cd7fe7eecc39f5f6ec3596987a
SHA256b70b623a48bc217d7526c4f78b32a1e67d64e300bc27416a4fa15f2fbe5197a6
SHA512a723349bc333ddc3f4eaccb380f4ce0c3693207ec4873afd8d6f2083421261fe92108be6521acc57f4dc9f104e9aad53a44203fffa93969fdfdd25ae5146dbfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53fd8732d7ad91b956ea9ea7b1be97553
SHA1addc2090a73d4ea6d81a26f2f0ab4a006b35635a
SHA256ca652abf5da4144fe3fab758e1cb36340231472424caa68bed8f05e84779e74e
SHA512dcfc4f177f6e01fa0a4c045f14f58ed29484490c78167007b86fc00454b260233b76bd7bfc9cf17b6032b7e36fcc70d54201c4143aeaeb9583b94de3df396855
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e4b01dcffcf40b428c1fee16f1ae745
SHA1e457c74e62e3fb88f0cde6bdfa9dd5be23f6e270
SHA2562c0260b051952d386a376150633006b022cbdbcf0b0f16fa872d24bdeb5791d0
SHA5127e26c366036ee9b6da14307bf0dd55fad6b5b66f638ca4685e7e8134f1d2e0ca891079ec2e6db8e6c14ba46bfa8702c19c89373f1fb545c0d30c2f4cb3e8df7b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06