Analysis

  • max time kernel
    117s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    18-09-2024 10:23

General

  • Target

    75836ecc3f94d6ba550f8c8c13301e3c59c52a468a79efae6edebe4f1308ae3cN.exe

  • Size

    265KB

  • MD5

    e3a2512f819f37dcad5b10fe43429450

  • SHA1

    93fb5debb25d0b75e4152380430bdcc0747b2474

  • SHA256

    75836ecc3f94d6ba550f8c8c13301e3c59c52a468a79efae6edebe4f1308ae3c

  • SHA512

    0c80b7249568297b552acc5b7eefe3adc904497dd066ee4ac01632e0ccd3d5ff9115a27a12439022d9dd8b2d94a25ef6e5f0f3f2e7b4c560a5180963f20cef73

  • SSDEEP

    6144:YyB01uCflxSB8Fvhqao9PpJwfk2sNI/YSzq3zM88s73m:S1JfFMjJazi3z12

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\75836ecc3f94d6ba550f8c8c13301e3c59c52a468a79efae6edebe4f1308ae3cN.exe
    "C:\Users\Admin\AppData\Local\Temp\75836ecc3f94d6ba550f8c8c13301e3c59c52a468a79efae6edebe4f1308ae3cN.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2116
    • C:\program files\internet explorer\IEXPLORE.EXE
      "C:\program files\internet explorer\IEXPLORE.EXE"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2712
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2712 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2724

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5244908aa71f7eca222b58cc56cfe14a

    SHA1

    c0f56b2e46ecd94cd62af5a0807d14decdd727b3

    SHA256

    999e4d2d9d5b430e220ad21da2cb2da4dde922a23c54f7ca506c440032f37cb9

    SHA512

    de43685401257dab535ce3013e1c5947d2bbdf36e15c57d6bea182140753b784b69394ecced525b31dfa5c3e51574b610349463205b9a6ea999c8db6d90a4c7d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cbd2d2354d5e4f1d72fc8af0ab24e0e6

    SHA1

    f412475f968193bbed8a8ad3558dc81f45feb71e

    SHA256

    7005787c73c2bad77f5f6a97b5b8f2437d2106a322f59825f584f5063085a9f8

    SHA512

    ba1303ea545aa94736a588175363bd1d1b96d23544ce26d6b3bccfb6b22cc61e3320fc3d76fa89b01d7f2a36e31b754262460e84726835b7018585b1ffbaf5ac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e539db9f1cb3a3b614ecea7878a48819

    SHA1

    7a8d450eb4c7326fbb51c75761f861a1e640ae62

    SHA256

    31ba4550176bdacb233b1cc01a0b58e31ec52544c738ee0879a1f8818aa7470d

    SHA512

    448497de91cbfac512a182f0ce7c0acd6b0d320b3d656f09bd7bc96dba30c12e4f5606d7558f99ade8a3584469102c2fd73a105c765c726d454fedd76b34a737

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4c9e95309d948db5fea7cf6c712903f4

    SHA1

    c8b952aedbc8af30ee05366a86b00b53315901df

    SHA256

    1d0ab6feb85517630ac0814a2ce756250a7d34ca321a8513c72ce1ea36d8371d

    SHA512

    8b21d4643cce6c19ee55c817df685c93d9275a8335e9f81cbc8fd37bbb0a06ebfc757539e18574636a7c02783afb872044079116b2c045318c8dfd35e19384ca

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3a7212f8cb002ef18a60c5cb6700d0ae

    SHA1

    2126b42d198cbda5f0bc34b6f5cd752836236c51

    SHA256

    19a536a02bf538897c328855cf486a867a9b69f27dc27dbfdfbb83df79ddc811

    SHA512

    f9508d7fba80c4cee9c819ee636863c22440089ca7a10aa51580da28215437ab77701a9cf67272bc16659ef3faaea178e302a275bc87c1c6f2db62d651569b2e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f1708c5a71b8e7537cc34733ec6e7612

    SHA1

    aad0c0df390d6fbd3ccc95aa65a5bd7ac9b14c22

    SHA256

    3223be2c63ef990df13f5b39df44429dbe65d589cb11b8230edf1f96ffa3aa35

    SHA512

    af06265da649f511ff77661352ed2be204eb47dd95757ceaa6d9feba7d42b5b240449982a8f1635d4ebb019af46473e4c3686409120076a533aae5eff986e20b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    205835446d031525bc686643fa177a1f

    SHA1

    4972f27d548139ba1060c1d67e55cb20a1178f4e

    SHA256

    8a76b2863316a4fd5249ac3a2a0dd04c266c2a5d92dd5d6c8812b21e80bf9657

    SHA512

    24ddde7db376f9b012996363fb2a700288caf9678e20fb9ca8b7b15893a597423a370c394272bdbf6e11f2771900e516f54390d32d66013b7163f403654b85a1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d93082e727e0538154bdf5816f9b526b

    SHA1

    cc3d4ed8dfed4caa8d1c0fd8ddb4e3e707abfed0

    SHA256

    5ecf58514a887da5e1d159cb37f9e60610238670030dcc2eb36a3e7516f3ac4a

    SHA512

    a44e15b07b149950302e19638895d48ee3aaa73ab54e4c94deb6e88f9c37b8f5b8365acaaaef437ac2a1165df1a829bdfe01f614d1933e7a465e5c67489a09bf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d8539795c3bbb684c9b7c3d4eb87dd3e

    SHA1

    b6136f7bb0e6a33fec99f65a62ffc9488d0cb55e

    SHA256

    8b4edbe6618ea4b4d4e72366faed4c47ea9ddf3251640461f772c10b2f5f4888

    SHA512

    c65ca1f1bba257564851fe528bbf2796221e60ab9df7ac93688e387f500014621f8e1204cc356d2558fb182d6bf287a6f11574381a153d622c4144807fef8c8a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    61d3019eb5efabc047c269b5b25b36a2

    SHA1

    e6c95421cd9ff7356e32814eb56573197d4155ea

    SHA256

    319732b827efb1fd61479260edf4e9a48b233ff25c402e64150f78f04a4c12a7

    SHA512

    2fe99a3bc592754038f5f6c16df7a1f15e26c7187c9088f4a2682fd6e2bf76c341eb42602cc06dc9878a6e0db3fd8e66dcd82b20589a5ac79fa88084389e144f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7a56c9787f3b3e84106f80822ff40f41

    SHA1

    e44abfd81606ee0cff75a795927d9858fccb11ac

    SHA256

    dba292ff0e8ea34b478a197b785785bfdd7694dbde7f0743b2d3d6c0a1b099ed

    SHA512

    20ab838ff4d799fd57e5088617bb45381f31992e2bc066bd75bb0674e6d41a9131755cadb983cb40fbfdcfa8d37ae1ce268c1925144c86f025ac49b9feef431a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ae27e75995dbcf4c8a71358a95daef50

    SHA1

    de983e809c3197092774ebabee8a6ee4698f80c0

    SHA256

    4412224e75787434fce05af075b08edc4f78a129a374256fa7b575f34836f7a2

    SHA512

    f769bb188feb0d7ab4f1165cbce4abceb2de996a40f5466265eaf1ed41c1ec3707fe23ca6213518899cd08c04cb46469bbfbc9f16c0d090e903906a01d6ae9c0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c1646718148fe70789af8a83c05b5e38

    SHA1

    1030105713c5354bacd08094de36db906a6bacb9

    SHA256

    8d411d7d2202d50dd8740ee50e87d82eea1a544487bd5aa946a14437a6727402

    SHA512

    628a06a473cc5e9301f86b6e492f34bc53093dbecdfcd75c0cb5659a252dc5b8ea263677085a72ac84c9f6fd23250f29a33abf7644493e2730059b51212d3afb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    776440814a0a7e1cb53ec67c6244e683

    SHA1

    9a3aac349b57e48de9b797816d3878dd819af7f5

    SHA256

    6bb596d4bce72057a09f72a38f55e874a0c35d3a8dda46896267048998302a02

    SHA512

    7c520eb000e668761aa6916d57c7ee06f1e14dbec1be5006ce807468418bf9e183bbed3abbd655f8a7180008f54928e43f5e36efc3f69b4cf3019a9d03866426

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    849f349a35eafdfea4e8f8b9a58d3e6f

    SHA1

    7b27bbb3ec5d7c46a85e41c82e32465ada091887

    SHA256

    55964ba13628b0c9045bff0020696823c76f45c7729e89d14a58faca8e53a498

    SHA512

    375d2d7e645c6fd37a9235643faa1ef29d8ab847fc117a72ecb0b9849ea992f138580c1cf4d3d022d3bb088a773ba9f667f3e45af7c2da743d8d83837d938946

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bb33e0ac3410c041971679b60e47f904

    SHA1

    8474d6523402c44973469ec99e861f305e0f606d

    SHA256

    b4ca40462bb90dea30692db938a2b1d7a104ac55b9624e053da7ae135b1d3686

    SHA512

    5575550bc83103ecde1039baf4bc9931e58c063456805809fede5b98cb8fc342ce69136ef071ed9c0293b19b9b28505e4fd6be26858ffe11faa928d5bef6d068

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7c56d3d7353fc0e79b9b017fdb264062

    SHA1

    a13fec8822055c6fbb4a0fc3ae51aef3fe1868cb

    SHA256

    e7ee5e82b14aa0cb2babd17f70c741eb2140aa5d2d90a5423a498eefa92f1780

    SHA512

    d91f20e0eb361357d78cddd4f7439c83c475b4157f549b14e9c33465952dc727d7cb96f44bc399d5a9430459f95c0b4c4ba27096da7bcf82a1d4c1f470b8803f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e8f127550101bd967be3a3d4db8f69fb

    SHA1

    eab53f69f45cec4a8e5f9052cecb07c7ba9122a8

    SHA256

    a7242c2f2080a3e132dab9efed9ef46ac31d83c7ff2445da45c99c0b08a64eca

    SHA512

    f38b8b8a34cb46888044812121beac8d5b9cc76b3a9ef8ace24cb80e9af924aa0d7bd8f73027263afda68f10bce8c26a468c218cb513d304ce895888b3d9c65f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5971086cea6c60b8e8fcb3c53e97e16d

    SHA1

    48fc6e4aaf84e1ff8c2dd758e1e1d6932ff87083

    SHA256

    ff5aaaacb7c067ea03b2494f77cbd924b00f3fd95a0408b6e8efbc6ad3ccda38

    SHA512

    9b871554c5943d549678141efe73490e67cf022b602bc92341c232f89dd090c886c55d1fa0e385c0bbc7bf8468bc0b11e188ef7c15e9d8e991712dfb6d9c58ff

  • C:\Users\Admin\AppData\Local\Temp\Cab2A3F.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar2A9F.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2116-5-0x0000000000400000-0x0000000000504000-memory.dmp

    Filesize

    1.0MB

  • memory/2116-0-0x0000000000400000-0x0000000000504000-memory.dmp

    Filesize

    1.0MB

  • memory/2116-1-0x0000000000260000-0x0000000000261000-memory.dmp

    Filesize

    4KB

  • memory/2116-2-0x0000000000260000-0x0000000000261000-memory.dmp

    Filesize

    4KB

  • memory/2712-4-0x0000000000170000-0x0000000000274000-memory.dmp

    Filesize

    1.0MB