Malware Analysis Report

2024-08-06 14:35

Sample ID 240528-whklwaea5w
Target virussign.com_f3fb433643992f5349291c65fa8b9940.vir
SHA256 8f93a1789a69a36ef8c45597bd0b7d15d535474355dbbcebc29cdeccc22d18a9
Tags
modiloader persistence trojan upx
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

8f93a1789a69a36ef8c45597bd0b7d15d535474355dbbcebc29cdeccc22d18a9

Threat Level: Known bad

The file virussign.com_f3fb433643992f5349291c65fa8b9940.vir was found to be: Known bad.

Malicious Activity Summary

modiloader persistence trojan upx

ModiLoader, DBatLoader

ModiLoader Second Stage

Executes dropped EXE

UPX packed file

Loads dropped DLL

Checks computer location settings

Adds Run key to start application

Suspicious use of SetThreadContext

Unsigned PE

Enumerates physical storage devices

Suspicious use of WriteProcessMemory

Suspicious use of SetWindowsHookEx

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-05-28 17:55

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-28 17:55

Reported

2024-05-28 17:57

Platform

win10v2004-20240426-en

Max time kernel

149s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\virussign.com_f3fb433643992f5349291c65fa8b9940.exe"

Signatures

ModiLoader, DBatLoader

trojan modiloader

ModiLoader Second Stage

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\virussign.com_f3fb433643992f5349291c65fa8b9940.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Win Pdf = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\csrsll.exe" C:\Windows\SysWOW64\reg.exe N/A

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 968 wrote to memory of 2104 N/A C:\Users\Admin\AppData\Local\Temp\virussign.com_f3fb433643992f5349291c65fa8b9940.exe C:\Users\Admin\AppData\Local\Temp\virussign.com_f3fb433643992f5349291c65fa8b9940.exe
PID 968 wrote to memory of 2104 N/A C:\Users\Admin\AppData\Local\Temp\virussign.com_f3fb433643992f5349291c65fa8b9940.exe C:\Users\Admin\AppData\Local\Temp\virussign.com_f3fb433643992f5349291c65fa8b9940.exe
PID 968 wrote to memory of 2104 N/A C:\Users\Admin\AppData\Local\Temp\virussign.com_f3fb433643992f5349291c65fa8b9940.exe C:\Users\Admin\AppData\Local\Temp\virussign.com_f3fb433643992f5349291c65fa8b9940.exe
PID 968 wrote to memory of 2104 N/A C:\Users\Admin\AppData\Local\Temp\virussign.com_f3fb433643992f5349291c65fa8b9940.exe C:\Users\Admin\AppData\Local\Temp\virussign.com_f3fb433643992f5349291c65fa8b9940.exe
PID 968 wrote to memory of 2104 N/A C:\Users\Admin\AppData\Local\Temp\virussign.com_f3fb433643992f5349291c65fa8b9940.exe C:\Users\Admin\AppData\Local\Temp\virussign.com_f3fb433643992f5349291c65fa8b9940.exe
PID 968 wrote to memory of 2104 N/A C:\Users\Admin\AppData\Local\Temp\virussign.com_f3fb433643992f5349291c65fa8b9940.exe C:\Users\Admin\AppData\Local\Temp\virussign.com_f3fb433643992f5349291c65fa8b9940.exe
PID 968 wrote to memory of 2104 N/A C:\Users\Admin\AppData\Local\Temp\virussign.com_f3fb433643992f5349291c65fa8b9940.exe C:\Users\Admin\AppData\Local\Temp\virussign.com_f3fb433643992f5349291c65fa8b9940.exe
PID 968 wrote to memory of 2104 N/A C:\Users\Admin\AppData\Local\Temp\virussign.com_f3fb433643992f5349291c65fa8b9940.exe C:\Users\Admin\AppData\Local\Temp\virussign.com_f3fb433643992f5349291c65fa8b9940.exe
PID 2104 wrote to memory of 2412 N/A C:\Users\Admin\AppData\Local\Temp\virussign.com_f3fb433643992f5349291c65fa8b9940.exe C:\Windows\SysWOW64\cmd.exe
PID 2104 wrote to memory of 2412 N/A C:\Users\Admin\AppData\Local\Temp\virussign.com_f3fb433643992f5349291c65fa8b9940.exe C:\Windows\SysWOW64\cmd.exe
PID 2104 wrote to memory of 2412 N/A C:\Users\Admin\AppData\Local\Temp\virussign.com_f3fb433643992f5349291c65fa8b9940.exe C:\Windows\SysWOW64\cmd.exe
PID 2412 wrote to memory of 680 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 2412 wrote to memory of 680 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 2412 wrote to memory of 680 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 2104 wrote to memory of 4628 N/A C:\Users\Admin\AppData\Local\Temp\virussign.com_f3fb433643992f5349291c65fa8b9940.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 2104 wrote to memory of 4628 N/A C:\Users\Admin\AppData\Local\Temp\virussign.com_f3fb433643992f5349291c65fa8b9940.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 2104 wrote to memory of 4628 N/A C:\Users\Admin\AppData\Local\Temp\virussign.com_f3fb433643992f5349291c65fa8b9940.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 4628 wrote to memory of 3876 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 4628 wrote to memory of 3876 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 4628 wrote to memory of 3876 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 4628 wrote to memory of 3876 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 4628 wrote to memory of 3876 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 4628 wrote to memory of 3876 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 4628 wrote to memory of 3876 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 4628 wrote to memory of 3876 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 4628 wrote to memory of 720 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 4628 wrote to memory of 720 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 4628 wrote to memory of 720 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 4628 wrote to memory of 720 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 4628 wrote to memory of 720 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 4628 wrote to memory of 720 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 4628 wrote to memory of 720 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 4628 wrote to memory of 720 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe

Processes

C:\Users\Admin\AppData\Local\Temp\virussign.com_f3fb433643992f5349291c65fa8b9940.exe

"C:\Users\Admin\AppData\Local\Temp\virussign.com_f3fb433643992f5349291c65fa8b9940.exe"

C:\Users\Admin\AppData\Local\Temp\virussign.com_f3fb433643992f5349291c65fa8b9940.exe

"C:\Users\Admin\AppData\Local\Temp\virussign.com_f3fb433643992f5349291c65fa8b9940.exe"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RQDLC.bat" "

C:\Windows\SysWOW64\reg.exe

REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Win Pdf" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe" /f

C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe

"C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"

C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe

"C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"

C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe

"C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
US 8.8.8.8:53 240.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 98.58.20.217.in-addr.arpa udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 21.236.111.52.in-addr.arpa udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 214.143.182.52.in-addr.arpa udp

Files

memory/968-0-0x0000000000400000-0x0000000000453000-memory.dmp

memory/968-3-0x00000000021C0000-0x00000000021C2000-memory.dmp

memory/2104-4-0x0000000000400000-0x000000000040B000-memory.dmp

memory/2104-6-0x0000000000400000-0x000000000040B000-memory.dmp

memory/968-9-0x00000000021F0000-0x00000000021F2000-memory.dmp

memory/968-8-0x00000000021E0000-0x00000000021E2000-memory.dmp

memory/968-7-0x00000000021D0000-0x00000000021D2000-memory.dmp

memory/968-12-0x0000000000400000-0x0000000000453000-memory.dmp

memory/2104-11-0x0000000000400000-0x000000000040B000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\RQDLC.txt

MD5 4eb61ec7816c34ec8c125acadc57ec1b
SHA1 b0015cc865c0bb1a027be663027d3829401a31cc
SHA256 08375cdb2e9819391f67f71e9718c15b48d3eaa452c54bd8fdd1f6a42e899aff
SHA512 f289f01d996dd643560370be8cdf8894e9a676ca3813f706c01ef5d705b9b18246c6cadf10d96edd433a616637b8a78fbd23c5738e76f1c4e671977b6d0cb6c1

C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe

MD5 c9037dee7bd2defec66c3e4c9cbc6748
SHA1 e4f30f81bebb15d6fa57c0d04f68b07374e1a5c1
SHA256 e52f5a01b0322dc8459e1ffa8654fa0c3e88fd9f51de27f99c3b7e9a27f7a64c
SHA512 7c663bf3cb5be6e53568cf9295ad6ec4678495819d08517d2b22856d9186560125829d53edd72fa870e69da35a27fccdd9ac1e84bfcfd9c916403f4bb419405d

memory/4628-35-0x0000000000400000-0x0000000000453000-memory.dmp

memory/4628-41-0x0000000000400000-0x0000000000453000-memory.dmp

memory/720-45-0x0000000000400000-0x0000000000414000-memory.dmp

memory/4628-51-0x0000000000400000-0x0000000000453000-memory.dmp

memory/720-52-0x0000000000400000-0x0000000000414000-memory.dmp

memory/720-53-0x0000000000400000-0x0000000000414000-memory.dmp

memory/720-57-0x0000000000400000-0x0000000000414000-memory.dmp

memory/2104-56-0x0000000000400000-0x000000000040B000-memory.dmp

memory/720-58-0x0000000000400000-0x0000000000414000-memory.dmp

memory/3876-59-0x0000000000400000-0x000000000040B000-memory.dmp

memory/720-60-0x0000000000400000-0x0000000000414000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-28 17:55

Reported

2024-05-28 17:57

Platform

win7-20240221-en

Max time kernel

149s

Max time network

118s

Command Line

"C:\Users\Admin\AppData\Local\Temp\virussign.com_f3fb433643992f5349291c65fa8b9940.exe"

Signatures

ModiLoader, DBatLoader

trojan modiloader

ModiLoader Second Stage

Description Indicator Process Target
N/A N/A N/A N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\Win Pdf = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\csrsll.exe" C:\Windows\SysWOW64\reg.exe N/A

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1460 wrote to memory of 2348 N/A C:\Users\Admin\AppData\Local\Temp\virussign.com_f3fb433643992f5349291c65fa8b9940.exe C:\Users\Admin\AppData\Local\Temp\virussign.com_f3fb433643992f5349291c65fa8b9940.exe
PID 1460 wrote to memory of 2348 N/A C:\Users\Admin\AppData\Local\Temp\virussign.com_f3fb433643992f5349291c65fa8b9940.exe C:\Users\Admin\AppData\Local\Temp\virussign.com_f3fb433643992f5349291c65fa8b9940.exe
PID 1460 wrote to memory of 2348 N/A C:\Users\Admin\AppData\Local\Temp\virussign.com_f3fb433643992f5349291c65fa8b9940.exe C:\Users\Admin\AppData\Local\Temp\virussign.com_f3fb433643992f5349291c65fa8b9940.exe
PID 1460 wrote to memory of 2348 N/A C:\Users\Admin\AppData\Local\Temp\virussign.com_f3fb433643992f5349291c65fa8b9940.exe C:\Users\Admin\AppData\Local\Temp\virussign.com_f3fb433643992f5349291c65fa8b9940.exe
PID 1460 wrote to memory of 2348 N/A C:\Users\Admin\AppData\Local\Temp\virussign.com_f3fb433643992f5349291c65fa8b9940.exe C:\Users\Admin\AppData\Local\Temp\virussign.com_f3fb433643992f5349291c65fa8b9940.exe
PID 1460 wrote to memory of 2348 N/A C:\Users\Admin\AppData\Local\Temp\virussign.com_f3fb433643992f5349291c65fa8b9940.exe C:\Users\Admin\AppData\Local\Temp\virussign.com_f3fb433643992f5349291c65fa8b9940.exe
PID 1460 wrote to memory of 2348 N/A C:\Users\Admin\AppData\Local\Temp\virussign.com_f3fb433643992f5349291c65fa8b9940.exe C:\Users\Admin\AppData\Local\Temp\virussign.com_f3fb433643992f5349291c65fa8b9940.exe
PID 1460 wrote to memory of 2348 N/A C:\Users\Admin\AppData\Local\Temp\virussign.com_f3fb433643992f5349291c65fa8b9940.exe C:\Users\Admin\AppData\Local\Temp\virussign.com_f3fb433643992f5349291c65fa8b9940.exe
PID 2348 wrote to memory of 2856 N/A C:\Users\Admin\AppData\Local\Temp\virussign.com_f3fb433643992f5349291c65fa8b9940.exe C:\Windows\SysWOW64\cmd.exe
PID 2348 wrote to memory of 2856 N/A C:\Users\Admin\AppData\Local\Temp\virussign.com_f3fb433643992f5349291c65fa8b9940.exe C:\Windows\SysWOW64\cmd.exe
PID 2348 wrote to memory of 2856 N/A C:\Users\Admin\AppData\Local\Temp\virussign.com_f3fb433643992f5349291c65fa8b9940.exe C:\Windows\SysWOW64\cmd.exe
PID 2348 wrote to memory of 2856 N/A C:\Users\Admin\AppData\Local\Temp\virussign.com_f3fb433643992f5349291c65fa8b9940.exe C:\Windows\SysWOW64\cmd.exe
PID 2856 wrote to memory of 2220 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 2856 wrote to memory of 2220 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 2856 wrote to memory of 2220 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 2856 wrote to memory of 2220 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 2348 wrote to memory of 1076 N/A C:\Users\Admin\AppData\Local\Temp\virussign.com_f3fb433643992f5349291c65fa8b9940.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 2348 wrote to memory of 1076 N/A C:\Users\Admin\AppData\Local\Temp\virussign.com_f3fb433643992f5349291c65fa8b9940.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 2348 wrote to memory of 1076 N/A C:\Users\Admin\AppData\Local\Temp\virussign.com_f3fb433643992f5349291c65fa8b9940.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 2348 wrote to memory of 1076 N/A C:\Users\Admin\AppData\Local\Temp\virussign.com_f3fb433643992f5349291c65fa8b9940.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1076 wrote to memory of 2276 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1076 wrote to memory of 2276 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1076 wrote to memory of 2276 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1076 wrote to memory of 2276 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1076 wrote to memory of 2276 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1076 wrote to memory of 2276 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1076 wrote to memory of 2276 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1076 wrote to memory of 2276 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1076 wrote to memory of 2044 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1076 wrote to memory of 2044 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1076 wrote to memory of 2044 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1076 wrote to memory of 2044 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1076 wrote to memory of 2044 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1076 wrote to memory of 2044 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1076 wrote to memory of 2044 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1076 wrote to memory of 2044 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe

Processes

C:\Users\Admin\AppData\Local\Temp\virussign.com_f3fb433643992f5349291c65fa8b9940.exe

"C:\Users\Admin\AppData\Local\Temp\virussign.com_f3fb433643992f5349291c65fa8b9940.exe"

C:\Users\Admin\AppData\Local\Temp\virussign.com_f3fb433643992f5349291c65fa8b9940.exe

"C:\Users\Admin\AppData\Local\Temp\virussign.com_f3fb433643992f5349291c65fa8b9940.exe"

C:\Windows\SysWOW64\cmd.exe

cmd /c ""C:\Users\Admin\AppData\Local\Temp\BEPQM.bat" "

C:\Windows\SysWOW64\reg.exe

REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Win Pdf" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe" /f

C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe

"C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"

C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe

"C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"

C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe

"C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 billabong4102.no-ip.biz udp

Files

memory/1460-0-0x0000000000400000-0x0000000000453000-memory.dmp

memory/1460-5-0x0000000000230000-0x0000000000231000-memory.dmp

memory/1460-3-0x0000000000230000-0x0000000000231000-memory.dmp

memory/1460-15-0x0000000000260000-0x0000000000261000-memory.dmp

memory/1460-27-0x0000000000300000-0x0000000000301000-memory.dmp

memory/1460-39-0x0000000000320000-0x0000000000321000-memory.dmp

memory/1460-70-0x0000000000380000-0x0000000000381000-memory.dmp

memory/1460-60-0x0000000000360000-0x0000000000361000-memory.dmp

memory/1460-56-0x0000000000404000-0x0000000000405000-memory.dmp

memory/1460-82-0x0000000000400000-0x0000000000453000-memory.dmp

memory/1460-80-0x00000000003E0000-0x00000000003E2000-memory.dmp

memory/1460-92-0x0000000000400000-0x0000000000453000-memory.dmp

memory/1460-88-0x0000000000400000-0x0000000000453000-memory.dmp

memory/1460-79-0x0000000000400000-0x0000000000453000-memory.dmp

memory/1460-78-0x0000000000400000-0x0000000000453000-memory.dmp

memory/1460-93-0x0000000002540000-0x0000000002593000-memory.dmp

memory/2348-94-0x0000000000400000-0x000000000040B000-memory.dmp

memory/2348-98-0x0000000000400000-0x000000000040B000-memory.dmp

memory/2348-108-0x0000000000400000-0x000000000040B000-memory.dmp

memory/2348-107-0x0000000000400000-0x000000000040B000-memory.dmp

memory/1460-106-0x0000000000400000-0x0000000000453000-memory.dmp

memory/2348-105-0x0000000000400000-0x000000000040B000-memory.dmp

memory/2348-102-0x0000000000400000-0x000000000040B000-memory.dmp

memory/2348-100-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

memory/2348-96-0x0000000000400000-0x000000000040B000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\BEPQM.bat

MD5 4eb61ec7816c34ec8c125acadc57ec1b
SHA1 b0015cc865c0bb1a027be663027d3829401a31cc
SHA256 08375cdb2e9819391f67f71e9718c15b48d3eaa452c54bd8fdd1f6a42e899aff
SHA512 f289f01d996dd643560370be8cdf8894e9a676ca3813f706c01ef5d705b9b18246c6cadf10d96edd433a616637b8a78fbd23c5738e76f1c4e671977b6d0cb6c1

\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe

MD5 125ca1b38be8dc7634c91b99ad31aee4
SHA1 777aaf28a42e45f34eee03ffd80c7971f626e216
SHA256 3bd1347fdb47582a4374c5d6727d86b31025ce60e3dc8f5b147c7a055666834e
SHA512 798d1205f9dcbf40cd804672d3d55c02baed295775d7466faf388cf88e520b4aa17c2b1580b0caf68bff6c74bf930bb75d70fa514bfce593fb7db49f4351a4ec

memory/2348-149-0x0000000003470000-0x00000000034C3000-memory.dmp

memory/2348-148-0x0000000003470000-0x00000000034C3000-memory.dmp

memory/1076-151-0x0000000000400000-0x0000000000453000-memory.dmp

memory/2348-147-0x0000000003470000-0x00000000034C3000-memory.dmp

memory/1076-156-0x0000000000240000-0x0000000000241000-memory.dmp

memory/1076-166-0x0000000000260000-0x0000000000261000-memory.dmp

memory/1076-211-0x0000000000400000-0x0000000000453000-memory.dmp

memory/1076-177-0x00000000002C0000-0x00000000002C1000-memory.dmp

memory/2044-245-0x0000000000400000-0x0000000000414000-memory.dmp

memory/1076-250-0x0000000000400000-0x0000000000453000-memory.dmp

memory/2348-255-0x0000000000400000-0x000000000040B000-memory.dmp

memory/2276-260-0x0000000000400000-0x000000000040B000-memory.dmp

memory/2044-261-0x0000000000400000-0x0000000000414000-memory.dmp