Analysis
-
max time kernel
139s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04/02/2024, 03:25
Static task
static1
Behavioral task
behavioral1
Sample
8e181beb277e9c40d3028f2c8efaf55f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8e181beb277e9c40d3028f2c8efaf55f.exe
Resource
win10v2004-20231215-en
General
-
Target
8e181beb277e9c40d3028f2c8efaf55f.exe
-
Size
436KB
-
MD5
8e181beb277e9c40d3028f2c8efaf55f
-
SHA1
a5b27d262a2fb59d941cb1a6ca6c6fbf15210a83
-
SHA256
cb67844c1988b0738263573ebf7a2a2bf477ecfb9c2a51f3c65d586d17be9d18
-
SHA512
768a6e39dbe49b1f537680f8aa241fc4b434dbcdf5569b4df8eef4ac5a02ec95caaf66e52d2abebcd0472bb515c22e450a92d1999990d2c0ad1991165889b50d
-
SSDEEP
6144:N1GWAE41wXoMpK8tFCQqztvtrEKlYuhRdUnTWEpFVoo2Uq1JXEKqRg6z/mGxUhIF:NYEj5tFi5Fr9lYI8LjUH5S1xUyH
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 4 IoCs
resource yara_rule behavioral2/memory/416-14-0x0000000000400000-0x0000000000522040-memory.dmp modiloader_stage2 behavioral2/memory/416-17-0x0000000000400000-0x0000000000522040-memory.dmp modiloader_stage2 behavioral2/memory/1148-27-0x0000000000400000-0x0000000000522040-memory.dmp modiloader_stage2 behavioral2/memory/1148-24-0x0000000000400000-0x0000000000522040-memory.dmp modiloader_stage2 -
Executes dropped EXE 2 IoCs
pid Process 416 4.exe 1148 4.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8e181beb277e9c40d3028f2c8efaf55f.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\SetupWay.txt 4.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSINFO\SetupWay.txt 4.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4968 wrote to memory of 416 4968 8e181beb277e9c40d3028f2c8efaf55f.exe 84 PID 4968 wrote to memory of 416 4968 8e181beb277e9c40d3028f2c8efaf55f.exe 84 PID 4968 wrote to memory of 416 4968 8e181beb277e9c40d3028f2c8efaf55f.exe 84 PID 416 wrote to memory of 2296 416 4.exe 85 PID 416 wrote to memory of 2296 416 4.exe 85 PID 4968 wrote to memory of 1148 4968 8e181beb277e9c40d3028f2c8efaf55f.exe 86 PID 4968 wrote to memory of 1148 4968 8e181beb277e9c40d3028f2c8efaf55f.exe 86 PID 4968 wrote to memory of 1148 4968 8e181beb277e9c40d3028f2c8efaf55f.exe 86 PID 1148 wrote to memory of 2752 1148 4.exe 87 PID 1148 wrote to memory of 2752 1148 4.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e181beb277e9c40d3028f2c8efaf55f.exe"C:\Users\Admin\AppData\Local\Temp\8e181beb277e9c40d3028f2c8efaf55f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:416 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"3⤵PID:2296
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"3⤵PID:2752
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52B
MD5f2d7b9cfb1d27a46856f55570efba5ee
SHA1b6878495dc20296df54fce2ef62e73b09995067d
SHA25682cae14a554a9bca7ae814e8e0e303a90f9feaf1f00d54c9b791163484e61464
SHA512ee4e6d9ddfb221d7ac4180524648365080cf0526b31ac3ce0fc3d1dd2e1efea55778e43c25783fd838c0c3c4ea2ab539844ae12c93e645e50682881053b1df8e
-
Filesize
360KB
MD5ef1e35296954203bd8f944ba5b14bd83
SHA1bd37210fb05a8449b0ad460f4470942d588d159c
SHA256a1b107d428e1a1c8a935d45d3b9ac1e37521d5f131afcd66940d17c02614530f
SHA512cf4b136b30e5a5d20bdf4600c55320bd720bf738e8364f7af7fd4a25977b4455b7619460ed8a2ff9aae8511adea2e4023f506a1b1ff8b409859f09a5e31c2316