Analysis
-
max time kernel
119s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2024, 07:35
Static task
static1
Behavioral task
behavioral1
Sample
e22a8a2029c9ab86f313d80ea81d6f80N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e22a8a2029c9ab86f313d80ea81d6f80N.exe
Resource
win10v2004-20240802-en
General
-
Target
e22a8a2029c9ab86f313d80ea81d6f80N.exe
-
Size
308KB
-
MD5
e22a8a2029c9ab86f313d80ea81d6f80
-
SHA1
2e19e9616a5a9b7982c92b1a29e3dd725b1b22eb
-
SHA256
35310cefbb1c15e66a69a05a5377de434a960150db38aac7b38f63b1fc75f9cf
-
SHA512
177f2503b77d4c72d5c2c7f04dde7f5f64174e8ccd3971a97b0c2e3271cca60afb71eb1522dc7107fba147af492a98fa3ca78400a1774372f1880cfd90089282
-
SSDEEP
3072:/c3sBG7mXh7m/zZM3jAbNOM6CNtDCZFL:E3sBz0Z4Mj72F
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 4 IoCs
resource yara_rule behavioral2/memory/4372-54-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 behavioral2/memory/4372-52-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 behavioral2/memory/4372-59-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 behavioral2/memory/4372-61-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation e22a8a2029c9ab86f313d80ea81d6f80N.exe -
Executes dropped EXE 3 IoCs
pid Process 4664 csrsll.exe 3320 csrsll.exe 4372 csrsll.exe -
resource yara_rule behavioral2/memory/824-8-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/824-10-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/824-6-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4372-43-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/824-58-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4372-54-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/824-53-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4372-52-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/3320-51-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4372-48-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/4372-59-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/3320-60-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4372-61-0x0000000000400000-0x0000000000414000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Win Pdf = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\csrsll.exe" reg.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4864 set thread context of 824 4864 e22a8a2029c9ab86f313d80ea81d6f80N.exe 86 PID 4664 set thread context of 3320 4664 csrsll.exe 92 PID 4664 set thread context of 4372 4664 csrsll.exe 93 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csrsll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csrsll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csrsll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e22a8a2029c9ab86f313d80ea81d6f80N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e22a8a2029c9ab86f313d80ea81d6f80N.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3320 csrsll.exe Token: SeDebugPrivilege 3320 csrsll.exe Token: SeDebugPrivilege 3320 csrsll.exe Token: SeDebugPrivilege 3320 csrsll.exe Token: SeDebugPrivilege 3320 csrsll.exe Token: SeDebugPrivilege 3320 csrsll.exe Token: SeDebugPrivilege 3320 csrsll.exe Token: SeDebugPrivilege 3320 csrsll.exe Token: SeDebugPrivilege 3320 csrsll.exe Token: SeDebugPrivilege 3320 csrsll.exe Token: SeDebugPrivilege 3320 csrsll.exe Token: SeDebugPrivilege 3320 csrsll.exe Token: SeDebugPrivilege 3320 csrsll.exe Token: SeDebugPrivilege 3320 csrsll.exe Token: SeDebugPrivilege 3320 csrsll.exe Token: SeDebugPrivilege 3320 csrsll.exe Token: SeDebugPrivilege 3320 csrsll.exe Token: SeDebugPrivilege 3320 csrsll.exe Token: SeDebugPrivilege 3320 csrsll.exe Token: SeDebugPrivilege 3320 csrsll.exe Token: SeDebugPrivilege 3320 csrsll.exe Token: SeDebugPrivilege 3320 csrsll.exe Token: SeDebugPrivilege 3320 csrsll.exe Token: SeDebugPrivilege 3320 csrsll.exe Token: SeDebugPrivilege 3320 csrsll.exe Token: SeDebugPrivilege 3320 csrsll.exe Token: SeDebugPrivilege 3320 csrsll.exe Token: SeDebugPrivilege 3320 csrsll.exe Token: SeDebugPrivilege 3320 csrsll.exe Token: SeDebugPrivilege 3320 csrsll.exe Token: SeDebugPrivilege 3320 csrsll.exe Token: SeDebugPrivilege 3320 csrsll.exe Token: SeDebugPrivilege 3320 csrsll.exe Token: SeDebugPrivilege 3320 csrsll.exe Token: SeDebugPrivilege 3320 csrsll.exe Token: SeDebugPrivilege 3320 csrsll.exe Token: SeDebugPrivilege 3320 csrsll.exe Token: SeDebugPrivilege 3320 csrsll.exe Token: SeDebugPrivilege 3320 csrsll.exe Token: SeDebugPrivilege 3320 csrsll.exe Token: SeDebugPrivilege 3320 csrsll.exe Token: SeDebugPrivilege 3320 csrsll.exe Token: SeDebugPrivilege 3320 csrsll.exe Token: SeDebugPrivilege 3320 csrsll.exe Token: SeDebugPrivilege 3320 csrsll.exe Token: SeDebugPrivilege 3320 csrsll.exe Token: SeDebugPrivilege 3320 csrsll.exe Token: SeDebugPrivilege 3320 csrsll.exe Token: SeDebugPrivilege 3320 csrsll.exe Token: SeDebugPrivilege 3320 csrsll.exe Token: SeDebugPrivilege 3320 csrsll.exe Token: SeDebugPrivilege 3320 csrsll.exe Token: SeDebugPrivilege 3320 csrsll.exe Token: SeDebugPrivilege 3320 csrsll.exe Token: SeDebugPrivilege 3320 csrsll.exe Token: SeDebugPrivilege 3320 csrsll.exe Token: SeDebugPrivilege 3320 csrsll.exe Token: SeDebugPrivilege 3320 csrsll.exe Token: SeDebugPrivilege 3320 csrsll.exe Token: SeDebugPrivilege 3320 csrsll.exe Token: SeDebugPrivilege 3320 csrsll.exe Token: SeDebugPrivilege 3320 csrsll.exe Token: SeDebugPrivilege 3320 csrsll.exe Token: SeDebugPrivilege 3320 csrsll.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4864 e22a8a2029c9ab86f313d80ea81d6f80N.exe 824 e22a8a2029c9ab86f313d80ea81d6f80N.exe 4664 csrsll.exe 3320 csrsll.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 4864 wrote to memory of 824 4864 e22a8a2029c9ab86f313d80ea81d6f80N.exe 86 PID 4864 wrote to memory of 824 4864 e22a8a2029c9ab86f313d80ea81d6f80N.exe 86 PID 4864 wrote to memory of 824 4864 e22a8a2029c9ab86f313d80ea81d6f80N.exe 86 PID 4864 wrote to memory of 824 4864 e22a8a2029c9ab86f313d80ea81d6f80N.exe 86 PID 4864 wrote to memory of 824 4864 e22a8a2029c9ab86f313d80ea81d6f80N.exe 86 PID 4864 wrote to memory of 824 4864 e22a8a2029c9ab86f313d80ea81d6f80N.exe 86 PID 4864 wrote to memory of 824 4864 e22a8a2029c9ab86f313d80ea81d6f80N.exe 86 PID 4864 wrote to memory of 824 4864 e22a8a2029c9ab86f313d80ea81d6f80N.exe 86 PID 824 wrote to memory of 2784 824 e22a8a2029c9ab86f313d80ea81d6f80N.exe 87 PID 824 wrote to memory of 2784 824 e22a8a2029c9ab86f313d80ea81d6f80N.exe 87 PID 824 wrote to memory of 2784 824 e22a8a2029c9ab86f313d80ea81d6f80N.exe 87 PID 2784 wrote to memory of 1572 2784 cmd.exe 90 PID 2784 wrote to memory of 1572 2784 cmd.exe 90 PID 2784 wrote to memory of 1572 2784 cmd.exe 90 PID 824 wrote to memory of 4664 824 e22a8a2029c9ab86f313d80ea81d6f80N.exe 91 PID 824 wrote to memory of 4664 824 e22a8a2029c9ab86f313d80ea81d6f80N.exe 91 PID 824 wrote to memory of 4664 824 e22a8a2029c9ab86f313d80ea81d6f80N.exe 91 PID 4664 wrote to memory of 3320 4664 csrsll.exe 92 PID 4664 wrote to memory of 3320 4664 csrsll.exe 92 PID 4664 wrote to memory of 3320 4664 csrsll.exe 92 PID 4664 wrote to memory of 3320 4664 csrsll.exe 92 PID 4664 wrote to memory of 3320 4664 csrsll.exe 92 PID 4664 wrote to memory of 3320 4664 csrsll.exe 92 PID 4664 wrote to memory of 3320 4664 csrsll.exe 92 PID 4664 wrote to memory of 3320 4664 csrsll.exe 92 PID 4664 wrote to memory of 4372 4664 csrsll.exe 93 PID 4664 wrote to memory of 4372 4664 csrsll.exe 93 PID 4664 wrote to memory of 4372 4664 csrsll.exe 93 PID 4664 wrote to memory of 4372 4664 csrsll.exe 93 PID 4664 wrote to memory of 4372 4664 csrsll.exe 93 PID 4664 wrote to memory of 4372 4664 csrsll.exe 93 PID 4664 wrote to memory of 4372 4664 csrsll.exe 93 PID 4664 wrote to memory of 4372 4664 csrsll.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\e22a8a2029c9ab86f313d80ea81d6f80N.exe"C:\Users\Admin\AppData\Local\Temp\e22a8a2029c9ab86f313d80ea81d6f80N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Users\Admin\AppData\Local\Temp\e22a8a2029c9ab86f313d80ea81d6f80N.exe"C:\Users\Admin\AppData\Local\Temp\e22a8a2029c9ab86f313d80ea81d6f80N.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ACSPP.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Win Pdf" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1572
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3320
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4372
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
145B
MD54eb61ec7816c34ec8c125acadc57ec1b
SHA1b0015cc865c0bb1a027be663027d3829401a31cc
SHA25608375cdb2e9819391f67f71e9718c15b48d3eaa452c54bd8fdd1f6a42e899aff
SHA512f289f01d996dd643560370be8cdf8894e9a676ca3813f706c01ef5d705b9b18246c6cadf10d96edd433a616637b8a78fbd23c5738e76f1c4e671977b6d0cb6c1
-
Filesize
308KB
MD59c66e0ac31e3f1f3f61d17d118dd93af
SHA1ef1c2757b3be2562a2852168a82d9263630cf376
SHA2564ade8e4795df0749a48d293aeb3f6d650e5ad33f143890b32845202651c3ec52
SHA512adea514355761f9167c5417f37404cca5842f27e211875bab588e90ffdbd3590d2d379ec3dbe0af5bde05e9169310bba0d70a8113007188ce0f9bd74bdbdea38