Analysis

  • max time kernel
    120s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    27-01-2024 03:57

General

  • Target

    79368dd9942c2e41a1fadf6d4d5734d8.exe

  • Size

    762KB

  • MD5

    79368dd9942c2e41a1fadf6d4d5734d8

  • SHA1

    31a93cba1bf16dc7588b7eeac77c59a73ebb181f

  • SHA256

    935975a8149095a24c14996215c33b8166bb67202fdede41db1e1515d8c0559d

  • SHA512

    2e98e654ce890cadcf7a0b11b032c72ec5779ac924a8dae172ae8cbc7c0da6ff9a90a22e6760b9d14033b3a0ec4d857c35209f920d11a8b51b076cea4759f1ce

  • SSDEEP

    12288:AOc//////6XaLJepy+SPNo3Nc8A+s0vki9IVCuiM77CMEoNiEERNUDci1U45Ktqo:Rc//////6Kspp+o3NPHHA7OUQNFi1NKF

Score
10/10

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\79368dd9942c2e41a1fadf6d4d5734d8.exe
    "C:\Users\Admin\AppData\Local\Temp\79368dd9942c2e41a1fadf6d4d5734d8.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3068
    • C:\Users\Admin\AppData\Local\Temp\79368dd9942c2e41a1fadf6d4d5734d8.exe
      C:\Users\Admin\AppData\Local\Temp\79368dd9942c2e41a1fadf6d4d5734d8.exe
      2⤵
      • Suspicious use of SetThreadContext
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:1768
      • C:\program files\internet explorer\IEXPLORE.EXE
        "C:\program files\internet explorer\IEXPLORE.EXE"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2672
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2672 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2716

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    312227ca42628a524bf1d9f9a0b0f136

    SHA1

    c12d0b6569944e0e97f2b797451db7819f04d502

    SHA256

    06cb3f9b1ae93312f28b6bf031a2d00ea9811ccdb38779b927dc564569521ddd

    SHA512

    434d114b0ef8d8e8adbc13b6f52eb075bddde2a37144a23ad534cc050bae54cecdce0f5754e1224b3c3c8ded2ec374a78981900302283de7372bed2f2e519f2d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    da2d693862a5d626a1b0bd3fbe6a0166

    SHA1

    d653afa58cf1e5624acaac972f1343894e0ce79d

    SHA256

    93bda94886c9f5ee0ee30ec7ba310d93f81bd7666bb5f1389c6b2acd56a55ee0

    SHA512

    f445dba7e4222b4e95c4cc2a7a3e3285e3572b2ec1eacb6494c3e962cabe7092294425b2f393bf022cb481a9fd0db4fd4718c04077c25bdeccd956f26f676ec3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e924d5e3f45c4a1ba18a5c163923519b

    SHA1

    878fb01f0e0629aae27f417ee79ecb50247b605d

    SHA256

    82df4465cabb603910a5f3f4da7ed6de6a46bfb8f2a80604669c76d15d4734a2

    SHA512

    639426eb5e721aaa07ea6343e17b37ab6ab348787504ebb44b9274f7dd6ba7e344c74711040d05545f656ba24efaf61270bc55418908cc19915c3a0fb341d530

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a4bdc6b16da05267883266fde1be9816

    SHA1

    cebce4e789cb4180d4bf0042d5156ca768257b86

    SHA256

    ccdf3d1db06a07a8f4faf9dff44659d6869ca11ed3b4f91882c8f9726e26c5db

    SHA512

    738869275f1fcc49da3e3b6fc9c0cd2742549ea617d56980c87537201026dce458d4b58efe18539c93b4383923ec8cb3aa4fde56b6af5d5481c46277df5a97e7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    83a73eb6c025c17bdcc5f458a76f6179

    SHA1

    35eb7227ab3d17e762c21dbfb56a30b9867222a0

    SHA256

    a3b320bfe9c5eff5bac1ce64e50334a7a7836553e366645427d06661e2f43954

    SHA512

    5e31cf5a36fb5d451fca02613acacf2b86dc71956e7d6283738c49af7503bc4d5a2164283447c016a95e082f1147a13614f44ec60534e8c46ed7535f5d6df7ce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b533dadd13b67e2580aa73f3755dce44

    SHA1

    c71ab1d5c8f0a195b33a9a828c9c63703acdd63e

    SHA256

    dc492a5123d728c5b20a4db92cc6a574762ca8eb5ad4317c691003aafddb4414

    SHA512

    21f16d27cdd773da1674bb88939dd305a57f9c4d5d31c1daf26437c510400981b0ea6495eeca1f767926fa0b33784bc92b11b84514cb5922a84d074f4718d971

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    548f526a35b0098b05f63802df1a5df1

    SHA1

    3c7b56509aa887a5c241eccbee8dbdee218e08e3

    SHA256

    0aff70094d867bfcb642dc123be8a43cd69e53a0c3d2e91ba0b7b57ea4536f57

    SHA512

    18f2065c57fc9f0ddd2f55fd57b3b02bbc5572e7c1182b24b506415e3cca04650ee323976bdbfdf9aeaa024476cba50dff5863455240d0f0033075305c9be2e4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    02ee81d2b66f3f5c368f0afa2fd3f88e

    SHA1

    cdb1839074f58f4722e7d23d15d8394bcb7741cf

    SHA256

    59d7c39be4850a4f9261d6758273080d3470f2d7ca6a5f3b9439290bd6c03375

    SHA512

    29263782bcb1b38e01ec88f93d9d399d985da29811a766fb77b828b0843b7fd8097a6fec12ce85eb3f79bd54b8ee9eddf0c3c8038503262eddc95dcbc709b640

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2a2258d6a6e5a3375b8edebf100f9b55

    SHA1

    e22dc164327c39ed2c9176451b2e51d3aa35a542

    SHA256

    afe066250f7e34670b435f44fced85301839785efaa6b58835cef2b515ac1668

    SHA512

    ff55a48dea70a55014f089a3851a8d3c12ed57b62f22c4687407c1c397cbaa5900207733fb3d651ae45d8dae0fb0678deaf0781ca70525c3b22563d20288e5d4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bf70d23cf65c13efa4aff7712946e64a

    SHA1

    d188b8432fa4a8f59830da7eb56d4b283b48d5a6

    SHA256

    0a1e8d28db931d7e2a32cb85e6b49711ad3395319a9ceda1272d93cf4369a1b1

    SHA512

    387352f861fa18799ffdd533ba7bf8456624a3edcefa6e4f9725f45ff433fe8bbbdffb26bc34f977a572b87940279cb8db592731ac80cbb92c02b8a2c1606bd7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9bb969c30aa2eae3769b3f1648342b5b

    SHA1

    368333bda97fcbae96538c7e727eaddb3d4261b5

    SHA256

    ea6d5694353a01a8f8228d313e6ab2cc70ee1d7fc95f4a7d184ea425629cadb2

    SHA512

    d80e7a26a1b37ce4d9d125557781d9cb36183d4cb3c433eccf461cae81f5ab967967049e073f8e3d3ad3edb09f0c0a2eedbdb201fccc63aa1e0e367a912943cc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a5c96fc071250c22fa57fd21d087707c

    SHA1

    d1cf47b6bb8314f2f17243a2806c4455ec746c2a

    SHA256

    15c1b6358005b3a5f75aea59f9daca4b344f94a88d38b82d835fc481e51c77f2

    SHA512

    5fdba10781656398a60160e1b064e60be93d5dc5bfb1601de0d62bb569ea19970d3ccf093414ee2b058ced8ff4b1dff7988ac7ad5fc9c6a7f01119e3d3626ad6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b9a500d0aade53b38f2767402edd9859

    SHA1

    55ddcf9f9b3b565cffac212ed78e265508fc5338

    SHA256

    d1eb6db24d5d403346ccd95de8dff2702a0a9481c7113db4df5777cc4fc2cb6f

    SHA512

    42eccbdd91c0c73f2804638be27de53d356532ee520903e18c6860810611ab8e83498f293a3ca8af884e5bb9d0f94d6969a036c020680000fad21e9a32289a76

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a0060ded1739a3d4d6e568433f91756f

    SHA1

    f90b0636c826b47d2786405fe93a9f2ed565aa9e

    SHA256

    972659a0d93c9fe0eb720348b1fa04d49334b1d3dda1d058b32a3e238bdb106d

    SHA512

    78e163478ab98dda6d253962e4972e60e116bb7bdf6d7d4768df0f888974e3778a2b649d2603045a2ed0fdba87c3baf1ca4acb8d228a54c0a6e1be6b5f22e1f7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    435943424623c405aad11b9f9475707b

    SHA1

    eb179c4fbd32795213cf98d8006e1b5bc091a47e

    SHA256

    067a465858121c241161c0985cf272a8f5145bdc250b67a0b1a7c9b180f00b3f

    SHA512

    628f8b13f1a1e1bc0e37292151d25ef669395f9cacbb01c1066eee10328c8271c621cc7940ac8d6a86e65ba900b14c07163259107aa6766d3f67e6d87f8da605

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    912c24c255947c48f91ba693d63472f0

    SHA1

    01b70a5b299fc5cd7fe7eecc39f5f6ec3596987a

    SHA256

    b70b623a48bc217d7526c4f78b32a1e67d64e300bc27416a4fa15f2fbe5197a6

    SHA512

    a723349bc333ddc3f4eaccb380f4ce0c3693207ec4873afd8d6f2083421261fe92108be6521acc57f4dc9f104e9aad53a44203fffa93969fdfdd25ae5146dbfc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3fd8732d7ad91b956ea9ea7b1be97553

    SHA1

    addc2090a73d4ea6d81a26f2f0ab4a006b35635a

    SHA256

    ca652abf5da4144fe3fab758e1cb36340231472424caa68bed8f05e84779e74e

    SHA512

    dcfc4f177f6e01fa0a4c045f14f58ed29484490c78167007b86fc00454b260233b76bd7bfc9cf17b6032b7e36fcc70d54201c4143aeaeb9583b94de3df396855

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2e4b01dcffcf40b428c1fee16f1ae745

    SHA1

    e457c74e62e3fb88f0cde6bdfa9dd5be23f6e270

    SHA256

    2c0260b051952d386a376150633006b022cbdbcf0b0f16fa872d24bdeb5791d0

    SHA512

    7e26c366036ee9b6da14307bf0dd55fad6b5b66f638ca4685e7e8134f1d2e0ca891079ec2e6db8e6c14ba46bfa8702c19c89373f1fb545c0d30c2f4cb3e8df7b

  • C:\Users\Admin\AppData\Local\Temp\Cab5776.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar5834.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • memory/1768-7-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/1768-0-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/1768-436-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/1768-3-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/1768-4-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/2672-6-0x0000000000060000-0x0000000000125000-memory.dmp

    Filesize

    788KB

  • memory/3068-2-0x0000000000400000-0x00000000004C5000-memory.dmp

    Filesize

    788KB