Analysis

  • max time kernel
    139s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/02/2024, 03:25

General

  • Target

    8e181beb277e9c40d3028f2c8efaf55f.exe

  • Size

    436KB

  • MD5

    8e181beb277e9c40d3028f2c8efaf55f

  • SHA1

    a5b27d262a2fb59d941cb1a6ca6c6fbf15210a83

  • SHA256

    cb67844c1988b0738263573ebf7a2a2bf477ecfb9c2a51f3c65d586d17be9d18

  • SHA512

    768a6e39dbe49b1f537680f8aa241fc4b434dbcdf5569b4df8eef4ac5a02ec95caaf66e52d2abebcd0472bb515c22e450a92d1999990d2c0ad1991165889b50d

  • SSDEEP

    6144:N1GWAE41wXoMpK8tFCQqztvtrEKlYuhRdUnTWEpFVoo2Uq1JXEKqRg6z/mGxUhIF:NYEj5tFi5Fr9lYI8LjUH5S1xUyH

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 4 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8e181beb277e9c40d3028f2c8efaf55f.exe
    "C:\Users\Admin\AppData\Local\Temp\8e181beb277e9c40d3028f2c8efaf55f.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4968
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:416
      • C:\program files\internet explorer\IEXPLORE.EXE
        "C:\program files\internet explorer\IEXPLORE.EXE"
        3⤵
          PID:2296
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exe
        2⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:1148
        • C:\program files\internet explorer\IEXPLORE.EXE
          "C:\program files\internet explorer\IEXPLORE.EXE"
          3⤵
            PID:2752

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files\Common Files\Microsoft Shared\MSINFO\SetupWay.txt

              Filesize

              52B

              MD5

              f2d7b9cfb1d27a46856f55570efba5ee

              SHA1

              b6878495dc20296df54fce2ef62e73b09995067d

              SHA256

              82cae14a554a9bca7ae814e8e0e303a90f9feaf1f00d54c9b791163484e61464

              SHA512

              ee4e6d9ddfb221d7ac4180524648365080cf0526b31ac3ce0fc3d1dd2e1efea55778e43c25783fd838c0c3c4ea2ab539844ae12c93e645e50682881053b1df8e

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exe

              Filesize

              360KB

              MD5

              ef1e35296954203bd8f944ba5b14bd83

              SHA1

              bd37210fb05a8449b0ad460f4470942d588d159c

              SHA256

              a1b107d428e1a1c8a935d45d3b9ac1e37521d5f131afcd66940d17c02614530f

              SHA512

              cf4b136b30e5a5d20bdf4600c55320bd720bf738e8364f7af7fd4a25977b4455b7619460ed8a2ff9aae8511adea2e4023f506a1b1ff8b409859f09a5e31c2316

            • memory/416-12-0x0000000000400000-0x0000000000522040-memory.dmp

              Filesize

              1.1MB

            • memory/416-8-0x0000000000400000-0x0000000000522040-memory.dmp

              Filesize

              1.1MB

            • memory/416-10-0x0000000000400000-0x0000000000522040-memory.dmp

              Filesize

              1.1MB

            • memory/416-11-0x0000000000400000-0x0000000000522040-memory.dmp

              Filesize

              1.1MB

            • memory/416-6-0x0000000000400000-0x0000000000522040-memory.dmp

              Filesize

              1.1MB

            • memory/416-13-0x0000000000620000-0x0000000000621000-memory.dmp

              Filesize

              4KB

            • memory/416-14-0x0000000000400000-0x0000000000522040-memory.dmp

              Filesize

              1.1MB

            • memory/416-16-0x0000000000740000-0x0000000000741000-memory.dmp

              Filesize

              4KB

            • memory/416-17-0x0000000000400000-0x0000000000522040-memory.dmp

              Filesize

              1.1MB

            • memory/416-5-0x0000000000400000-0x0000000000522040-memory.dmp

              Filesize

              1.1MB

            • memory/1148-27-0x0000000000400000-0x0000000000522040-memory.dmp

              Filesize

              1.1MB

            • memory/1148-24-0x0000000000400000-0x0000000000522040-memory.dmp

              Filesize

              1.1MB

            • memory/1148-29-0x0000000002490000-0x0000000002491000-memory.dmp

              Filesize

              4KB