Analysis

  • max time kernel
    72s
  • max time network
    79s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06/09/2024, 20:48

General

  • Target

    47197a222c8269da3e25248c0eb85020N.exe

  • Size

    183KB

  • MD5

    47197a222c8269da3e25248c0eb85020

  • SHA1

    2203c2aacdd4bb9e53a40cb11ea9c229395c850c

  • SHA256

    b5f9285e8d731f1be4c6587394cbc3d7e750ed11d2523b967e07dc6f7eee687c

  • SHA512

    7c299805338bfa5711d0c46602f7dc319880732f14b2a58f91436e83036e6753801b2cacfe0b3e7151510408ba38753895ae86357e21e9b5aea902b74d7af008

  • SSDEEP

    3072:la5bDM8UfVhLuQIReRCoT4o3SfLRrQY+jRSOnhRVE6B2mQ6Z:0M8UE8pqLuYoSahRV72YZ

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\47197a222c8269da3e25248c0eb85020N.exe
    "C:\Users\Admin\AppData\Local\Temp\47197a222c8269da3e25248c0eb85020N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3040
    • C:\Users\Admin\AppData\Local\Temp\u1WyilcvBplaViJZ6JGb.exe
      "C:\Users\Admin\AppData\Local\Temp\u1WyilcvBplaViJZ6JGb.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1396
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ZQMBoIU15scVxq9Qxo6H.gif
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2396
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2396 CREDAT:275457 /prefetch:2
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1956

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d7f35fbc70050a17552b839cb215e72d

    SHA1

    925e7a77fb8e57b66f72a64f0c7335b88a395353

    SHA256

    d5219ba16630fd8662b75f7c740b71c26b522ae14daa83fe43f460281d429143

    SHA512

    172fda8314ae5c9244e648f883f5a24835b5f37df49e043870d7f048384b50e73e1d5497f4be52c6997928b31e22cae87bd7632e10fd5e0bc5f9bb7143e84848

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    54ae5c382c6c2774c477b1c8d8f7e7fc

    SHA1

    fe0cb0b00b2514984a1bf0f16db4592528053627

    SHA256

    87a2746d598d4ac748c159509c7cc79d72fe915ddb7f6cab44b4273afccc01ff

    SHA512

    455f7cf8da9101f3b324acdeb7f64adddf76759575f6d3f4fc9c1b7e91cb376c06f97fc5e87d907927a82c3058688827ac94642879694c5e6205c49fc225d422

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cd533f4ceb704d8e9fb2e5bda94b5464

    SHA1

    010173ea9102cb2fc017b401df87db02d79fe61a

    SHA256

    386928019f0eeb4d2b76b2aba639589144e36823bf8fe1f65f61f6bdf8055cfb

    SHA512

    cff6e97d49ebd211f5670d16c277ee42add75ab5b7514e23b800c5db31647705306aa292779c413ac574ec929f73babd6f6d8ad0c736a0498b6713139f209a13

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7f60e1046b3f605eef10a91a071fb779

    SHA1

    60246ce01cd13334706ed601162b1ce8cfa9d7a2

    SHA256

    c9f1535cfb3141c902a298ec737829c65f669562914595210553ce3dffddfd84

    SHA512

    3b7b536aadf11bce75d7e4ada302f815e96610414449c0a567df8d84e49ad7a9b3fbe12f5a7ad2dcf2a1bb2b2d14bd9cd4f7a284c0d4ce31e912414616b07ef9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c7c5242cac83e3144420461aef95b437

    SHA1

    1d9dd0e5e7f5c9b20db300b7c7824bae53a48e97

    SHA256

    2b469a3cba6b3b3e448bfa7dda41a52c4832631a59dd57c3724bc3854d605ac6

    SHA512

    4bb08fc21f7300896ae480a74b9b4c3c9e1d246428d4ac7d4ee27ab08bf85bd9577705fe4a04f4f34bb275f06c7e582b711ce65f6558b3f6f16cebf6ae42ef5f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b184932a6549841930efd7084dd63f25

    SHA1

    f55befe71742ea0274a66e17ed5b865bf87c5e4c

    SHA256

    a19ddfcbf2017950dba7e5df351875ff194ee90fbd2249e859eb7c854e1c9e38

    SHA512

    462309912fd2bad6c2efa0786abbe48efff19194ec87c187fc4aa517046646c7f81d2a02a6b72b7560253d5e22142531fe190b0f1328644ee1ba7fc2b70963cd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    35fc64054fa9fc4d5c1cb69e363f00a7

    SHA1

    125e9fa0850a5b6aadd57fda2c0596120ccae770

    SHA256

    68585ab99dc1501ddf9e6c48270878ef4f0694333abaca73ca61d81b02e0b59a

    SHA512

    57fdcd7a680fcc915550528d458d19f400d074a20487b1e0e0d43888649e22f1d8d5beb6b7a0443e4013c24dbf3a2d4bd49625c3b4300f69d00210fd46eda010

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c08c5ed270831d223f4cbf988d2c4bc6

    SHA1

    a21bebb7925b1795e7b513c86445e08c33a625f6

    SHA256

    2dfc8f17f8fcdaded1ec4b5d9b11c8e90597494095b91ae5210ad5bb4819df69

    SHA512

    657953b2083c192b211250c923bf3b040fcc0242df1f775aa0ac8aa84c988e5f74472d4a9232fa438f441e7e0a3c91b44ce5ce5b57e5e80d92dacf6d3bee0a7a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    982bddc539dafe5e3c6f8ad797f01460

    SHA1

    9c283122f5d42e1c549a7fc1e92173d7512d781d

    SHA256

    304c9c1123406f9d9e5db5a3328105d8e6bcc5f9e2804a6be872f8cc7e39ac12

    SHA512

    776594a50d8e31aa5638431523f50636c85055dab976f200ece2ccdb76510ac5c9306d1d12680afe97394cf258c665f64ed19ca769bbf35c90db8dcb86cf2445

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8488fed0ae4c368282bfd9562d1ee49c

    SHA1

    f6e4a5b86a0a33a57714fc82a46f8c39cec6e9c2

    SHA256

    5045da32be6318c10db89c42677acc6e8fd7e591df76a64e1f1481ed58f6da02

    SHA512

    9df0814f68c7d35e59b6912768abf952abf6581f1b29089b1fc4a7c9758f5e0c8cbe0ced082b44bdd3df9f29f44b9880abeb9f3038da57a630e569f219802ede

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    537c00edf17765440f78bb1c19be019c

    SHA1

    87cd599718fb7ca653aaf2c59ff0b564afd15218

    SHA256

    1d18a8cc6344d4246bdd7d5b0703a92e67eddb0408a5deaca01779ce5c401cc0

    SHA512

    a2c251cd27c0be4eabd59eba658accd3eae20dda4e0774b28c0147812bd334f7cd523b66a0adf11e309d20d575063ef4f71d8b3fe0a54c4f0d8e9db30caf61b6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b799835b1758eb86c765024ab8b10f19

    SHA1

    89b678c7cbde838b064fc04a5055df1943d4d79a

    SHA256

    12ad7635a6b8c399b357a9c27f61db7aa5dca5cac7b5a666085efdd6551541aa

    SHA512

    497299b067a0456c2efde0149d6cfed53238ed25adcc83fbc80c07ba581c5fe82481898356a3c78fce40d85fc6f7e9bc0e0b9d5b6dcc9d76950b1f0fcef3c833

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d4efe2c7e7d955a8c89a60f410b1795b

    SHA1

    582525bd52f741ee03cca06cea42e861490c9b68

    SHA256

    1ba8cbc684df207e4c92f980ee87a57561c3d016736e3306d27bb78360d36b49

    SHA512

    70446dc2bd8e9ea6e406825a8691c1fac7c1d54f6b767c2694c27fda3e5b18ba885552ed8bc390c11792748ba69d40ab4aa2ea7515c0ef62092eb6125b50057a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f17ee80e7e1e48d8312c8ec5d68ca500

    SHA1

    a6077b1381adc28dbb94492a5a91376f441310d4

    SHA256

    4f19fe1c4cd74bf0b95920974eec2858e913eb5d90c176a04629ecfcbac3307d

    SHA512

    77a6c06f9094abdcb46698531c63caaee18b1adc4be15eacc16de5ce0b1aabd0e972af622375e4b05e6e93640e570f800171fc3eb47502763e19d5c34fc44297

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fccff5729fd088c9e5c2f1aeb73470ae

    SHA1

    e44dc6dcea7431b8105cc7bcddcea6bc6189a0cc

    SHA256

    8a3e8d180601f36c7dd4aaf30af04549e49228c4bbb14512b631e59666cd90ef

    SHA512

    c4d48a6ef93fb25e990c561b7e44bb3f1ddea86cd2141cfe4b92480c531d965abeb23243cfad619e24380d6e41f744ae8419ffbaa32229e5925d56ea386d405d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    98b1beeb9041b66d540a017e1ae183be

    SHA1

    099f7fe9700e30462f5c570d0cdfda853bdbbc86

    SHA256

    f4ea74987c4132dc6d7f702a6e392bdafea872d70aec5ee2f0a77d35233d0361

    SHA512

    f98f2b36cc59ff13c3a8c002593d03c7b52a20ed14ca7dcd57626478d07a30616f3675dced096b4f751c79a7de48ffb813fd7c501128d9d55e401ccc4e5e97c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f297db33de128d0a31fb249ff9ee6100

    SHA1

    9c56b73fb7aacb82d36ed2435f1e03f51d93168a

    SHA256

    53bdb59a80b39fd2577e1dbc16955e1c61d7ff7b0cf0a504fb9af8fc5ed4da14

    SHA512

    e41f724509bbb626304a15a8720d3107972ffbd82eb7c317f94d655d54834503e6a34e3e8832426ec36977e79757a38dc3abd9319fa8de307651ab8ef2a798c2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    96385e5eb3b22b277125dafe8094db25

    SHA1

    623630a53173321447b921977da5222831de90b6

    SHA256

    2f4f527e606d28d0241f033266689147305673cb71ae299fb17775efdb537344

    SHA512

    3cfcb6b3d33c67e1bd5d70cb3bb1d8e669fd22939ca0d9d4f1fff5b4dc03eb20fe55d3319f933532ce81f55d9d0fa2ab8fd396667e292dc4162fc1dfc41d8a06

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    de2f28b34a8aa5bd46092a16b83ada17

    SHA1

    703391273346aa14aacf12e447267d7f8ad5f63d

    SHA256

    7a98f4244d58816e3e0bad7cb5271b469bbbf29c4b5fa9d21d9cbb178651630e

    SHA512

    97574b9e018f95d4f90798985cdd469db2d5e1cb4c664dd9e545241bbb62da19cca5f3c4432a18cd1771c90099a02efceb548550a176ae998f318505c526252e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e340882d7f5a9ca712bb0bce34a64fbd

    SHA1

    b3b7e7af22715208fa0532c241736d0186e21473

    SHA256

    c0043a49d97976ab89e30d4de624bafd554b39db33fb690df7af3068ccf90b92

    SHA512

    d5edea6188dc3d249b7f68c1d399826519e2410f3e74fd1c298bacf3c683ff0423e3453a0e93130861cc633d0ccfd7d70347dd283ad25f01fdbbca782bdf5ede

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2b94ff7d7d466255f924deb32cfa5452

    SHA1

    f732d913022feedcc46da6236041f9efb300c663

    SHA256

    f9568db9ab4d394beb23dba48470b518674f1b3a38a0a5be3822f44411b8d72a

    SHA512

    2d0039e987d2365deb88d9e3781e3b46bfc5365e7772bb7c6112217f553a6380d05829371a3edf4e51c527a01bfb22d85df691cfafa78a9b53ed2c0c612ea5d0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    207221086f8ef60d1b201bde30c0bea0

    SHA1

    0629230edc4dc825542b38641480c6a75ced0513

    SHA256

    23fac8d03df65fca6e69478d0429814fd62f3b1f924a5497d207d1790ce94a62

    SHA512

    d3fb2216acdd9a74363d20c557952eae76b4f733606198602dfe310c58d76222c43ab43e8c6db0a65f97899d5021557edbe8afb62aadf747121c2bccdda80b2d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d7c95300bc37e8f321a90900c9a83fbd

    SHA1

    8750309f05d89819be09d589a238e4e638abc3e0

    SHA256

    cb7c17e6088afa05d0d77533bdf346aa1c85782eb630ec16d33d8679fe979ee4

    SHA512

    587bad11af9dced33533d250b2dc7f4378baed842f395e1615678b57a089a9110258ea14569aed21f4cdf186bd7a3bc0e10c4f60ee77c687b85ee1f1000eee8d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fc84b5bf210b04c8a3f8179525cca5a4

    SHA1

    0cf4cdaf948a606850ac707fd75abd37029ecdd1

    SHA256

    67d195e9de71253106f006d19813c7167ca411db8be2c0333af7f3186c39c59b

    SHA512

    aad063c547e7d6522033314423c2c463b3136d4a52b42bbe9ca2c497f1d8365df7bdc6ea3ceb76926e846994217517f9bf502230528aad2a861dbbe99672973a

  • C:\Users\Admin\AppData\Local\Temp\CabEA41.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarED42.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\ZQMBoIU15scVxq9Qxo6H.gif

    Filesize

    38KB

    MD5

    48148c5809f32d3fbf12cfc915db5960

    SHA1

    3ee2b8f75bf1e0b0aa82a1e9b3cec98b90e47088

    SHA256

    1dcb074c90fb70d2c759318d58488016d896e9849579b07254c34480c5ae781c

    SHA512

    e18270085f4e530422231ad205495d2d9df6e902746ab4716a109d6eabfe3823a244ab816fe932ab395279b4753531f77d001943fc4d8a55ad6434742cc48ffd

  • \Program Files\Common Files\Microsoft Shared\MSInfo\atmQQ2.dll

    Filesize

    20KB

    MD5

    3bd58f86298b8fda0fdd00c78eb7050c

    SHA1

    d2951529c7517882979c459803710a8e98b4826b

    SHA256

    35d970dbeba260c12a6a787aa481da7d4628550d02728d08bc6a0805164b53ea

    SHA512

    72a6c4fb5cfb32800f131c3ad917549372e582f536550d485dd6b73121aebae63381dc9b7b68fbf8367b8c66de8b9af05270b3200ac3060ea5bffd47ecba1d9d

  • \Users\Admin\AppData\Local\Temp\u1WyilcvBplaViJZ6JGb.exe

    Filesize

    37KB

    MD5

    3e41b107bd3d043d2a26f2192a7b9331

    SHA1

    d55babe838b43e7d28808cec16667b271175e5c4

    SHA256

    1297d577f5043365da90a5a623b4ffa7a3ea66ad217b7df1493206a04726e874

    SHA512

    f852b2d4acb61d282601ead153631aeb5bd440867ee1a0be15514f778f4e57eca4a4eaaab8fba0e663c3ffa36990825f18035b31e99564de2ff4d0b0d2f9f718

  • memory/1396-12-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/1396-615-0x0000000000220000-0x0000000000243000-memory.dmp

    Filesize

    140KB

  • memory/1396-612-0x0000000000220000-0x0000000000243000-memory.dmp

    Filesize

    140KB

  • memory/1396-30-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/1396-31-0x0000000000020000-0x0000000000021000-memory.dmp

    Filesize

    4KB

  • memory/1396-13-0x0000000000020000-0x0000000000021000-memory.dmp

    Filesize

    4KB

  • memory/3040-11-0x0000000002AC0000-0x0000000002AE9000-memory.dmp

    Filesize

    164KB

  • memory/3040-10-0x0000000002AC0000-0x0000000002AE9000-memory.dmp

    Filesize

    164KB