Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2024, 09:38
Static task
static1
Behavioral task
behavioral1
Sample
cadadcb6719598366e960f31a319a480N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cadadcb6719598366e960f31a319a480N.exe
Resource
win10v2004-20240802-en
General
-
Target
cadadcb6719598366e960f31a319a480N.exe
-
Size
840KB
-
MD5
cadadcb6719598366e960f31a319a480
-
SHA1
1d375b97d4d49443e71d68b9d65da8f465c36d3f
-
SHA256
2afbf92c4db6bbac81cbb782580a4c654d365ce4b8615aadb1bd17adebdcd5bc
-
SHA512
3c0379fd23d2ea32f1021f36e08517184515ed105c44540c038fd728f125ed7e35d8223fbff020fcb13cb08504874975c631e0fa9cd54bb77eb28ddf8f6edbd9
-
SSDEEP
24576:v1X3HJwXxPGxIR1ac5Irybw0UoBHgyzMZ97QNbHeR:vJ3HGXx+xIR1ac5I2w017MDyDeR
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 4 IoCs
resource yara_rule behavioral2/memory/3024-1-0x0000000000400000-0x00000000005E6000-memory.dmp modiloader_stage2 behavioral2/memory/2648-10-0x0000000000400000-0x00000000005E6000-memory.dmp modiloader_stage2 behavioral2/memory/3024-13-0x0000000000400000-0x00000000005E6000-memory.dmp modiloader_stage2 behavioral2/memory/2648-14-0x0000000000400000-0x00000000005E6000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 2648 360se.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3024 cadadcb6719598366e960f31a319a480N.exe 2648 360se.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~1\360se.exe cadadcb6719598366e960f31a319a480N.exe File opened for modification C:\PROGRA~1\360se.exe cadadcb6719598366e960f31a319a480N.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 360se.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cadadcb6719598366e960f31a319a480N.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3024 wrote to memory of 2648 3024 cadadcb6719598366e960f31a319a480N.exe 83 PID 3024 wrote to memory of 2648 3024 cadadcb6719598366e960f31a319a480N.exe 83 PID 3024 wrote to memory of 2648 3024 cadadcb6719598366e960f31a319a480N.exe 83 PID 3024 wrote to memory of 804 3024 cadadcb6719598366e960f31a319a480N.exe 85 PID 3024 wrote to memory of 804 3024 cadadcb6719598366e960f31a319a480N.exe 85 PID 3024 wrote to memory of 804 3024 cadadcb6719598366e960f31a319a480N.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\cadadcb6719598366e960f31a319a480N.exe"C:\Users\Admin\AppData\Local\Temp\cadadcb6719598366e960f31a319a480N.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\PROGRA~1\360se.exeC:\PROGRA~1\360se.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2648
-
-
C:\Windows\SysWOW64\cmd.execmd /c erase /F "C:\Users\Admin\AppData\Local\Temp\cadadcb6719598366e960f31a319a480N.exe"2⤵
- System Location Discovery: System Language Discovery
PID:804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
840KB
MD5cadadcb6719598366e960f31a319a480
SHA11d375b97d4d49443e71d68b9d65da8f465c36d3f
SHA2562afbf92c4db6bbac81cbb782580a4c654d365ce4b8615aadb1bd17adebdcd5bc
SHA5123c0379fd23d2ea32f1021f36e08517184515ed105c44540c038fd728f125ed7e35d8223fbff020fcb13cb08504874975c631e0fa9cd54bb77eb28ddf8f6edbd9