Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-09-2024 10:23
Static task
static1
Behavioral task
behavioral1
Sample
75836ecc3f94d6ba550f8c8c13301e3c59c52a468a79efae6edebe4f1308ae3cN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
75836ecc3f94d6ba550f8c8c13301e3c59c52a468a79efae6edebe4f1308ae3cN.exe
Resource
win10v2004-20240802-en
General
-
Target
75836ecc3f94d6ba550f8c8c13301e3c59c52a468a79efae6edebe4f1308ae3cN.exe
-
Size
265KB
-
MD5
e3a2512f819f37dcad5b10fe43429450
-
SHA1
93fb5debb25d0b75e4152380430bdcc0747b2474
-
SHA256
75836ecc3f94d6ba550f8c8c13301e3c59c52a468a79efae6edebe4f1308ae3c
-
SHA512
0c80b7249568297b552acc5b7eefe3adc904497dd066ee4ac01632e0ccd3d5ff9115a27a12439022d9dd8b2d94a25ef6e5f0f3f2e7b4c560a5180963f20cef73
-
SSDEEP
6144:YyB01uCflxSB8Fvhqao9PpJwfk2sNI/YSzq3zM88s73m:S1JfFMjJazi3z12
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral1/memory/2116-5-0x0000000000400000-0x0000000000504000-memory.dmp modiloader_stage2 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2116 set thread context of 2712 2116 75836ecc3f94d6ba550f8c8c13301e3c59c52a468a79efae6edebe4f1308ae3cN.exe 30 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\paramstr.txt 75836ecc3f94d6ba550f8c8c13301e3c59c52a468a79efae6edebe4f1308ae3cN.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 75836ecc3f94d6ba550f8c8c13301e3c59c52a468a79efae6edebe4f1308ae3cN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432816903" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1BE3B4B1-75A8-11EF-98BD-527E38F5B48B} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2712 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2116 wrote to memory of 2712 2116 75836ecc3f94d6ba550f8c8c13301e3c59c52a468a79efae6edebe4f1308ae3cN.exe 30 PID 2116 wrote to memory of 2712 2116 75836ecc3f94d6ba550f8c8c13301e3c59c52a468a79efae6edebe4f1308ae3cN.exe 30 PID 2116 wrote to memory of 2712 2116 75836ecc3f94d6ba550f8c8c13301e3c59c52a468a79efae6edebe4f1308ae3cN.exe 30 PID 2116 wrote to memory of 2712 2116 75836ecc3f94d6ba550f8c8c13301e3c59c52a468a79efae6edebe4f1308ae3cN.exe 30 PID 2116 wrote to memory of 2712 2116 75836ecc3f94d6ba550f8c8c13301e3c59c52a468a79efae6edebe4f1308ae3cN.exe 30 PID 2712 wrote to memory of 2724 2712 IEXPLORE.EXE 31 PID 2712 wrote to memory of 2724 2712 IEXPLORE.EXE 31 PID 2712 wrote to memory of 2724 2712 IEXPLORE.EXE 31 PID 2712 wrote to memory of 2724 2712 IEXPLORE.EXE 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\75836ecc3f94d6ba550f8c8c13301e3c59c52a468a79efae6edebe4f1308ae3cN.exe"C:\Users\Admin\AppData\Local\Temp\75836ecc3f94d6ba550f8c8c13301e3c59c52a468a79efae6edebe4f1308ae3cN.exe"1⤵
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2712 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2724
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55244908aa71f7eca222b58cc56cfe14a
SHA1c0f56b2e46ecd94cd62af5a0807d14decdd727b3
SHA256999e4d2d9d5b430e220ad21da2cb2da4dde922a23c54f7ca506c440032f37cb9
SHA512de43685401257dab535ce3013e1c5947d2bbdf36e15c57d6bea182140753b784b69394ecced525b31dfa5c3e51574b610349463205b9a6ea999c8db6d90a4c7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbd2d2354d5e4f1d72fc8af0ab24e0e6
SHA1f412475f968193bbed8a8ad3558dc81f45feb71e
SHA2567005787c73c2bad77f5f6a97b5b8f2437d2106a322f59825f584f5063085a9f8
SHA512ba1303ea545aa94736a588175363bd1d1b96d23544ce26d6b3bccfb6b22cc61e3320fc3d76fa89b01d7f2a36e31b754262460e84726835b7018585b1ffbaf5ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e539db9f1cb3a3b614ecea7878a48819
SHA17a8d450eb4c7326fbb51c75761f861a1e640ae62
SHA25631ba4550176bdacb233b1cc01a0b58e31ec52544c738ee0879a1f8818aa7470d
SHA512448497de91cbfac512a182f0ce7c0acd6b0d320b3d656f09bd7bc96dba30c12e4f5606d7558f99ade8a3584469102c2fd73a105c765c726d454fedd76b34a737
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c9e95309d948db5fea7cf6c712903f4
SHA1c8b952aedbc8af30ee05366a86b00b53315901df
SHA2561d0ab6feb85517630ac0814a2ce756250a7d34ca321a8513c72ce1ea36d8371d
SHA5128b21d4643cce6c19ee55c817df685c93d9275a8335e9f81cbc8fd37bbb0a06ebfc757539e18574636a7c02783afb872044079116b2c045318c8dfd35e19384ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a7212f8cb002ef18a60c5cb6700d0ae
SHA12126b42d198cbda5f0bc34b6f5cd752836236c51
SHA25619a536a02bf538897c328855cf486a867a9b69f27dc27dbfdfbb83df79ddc811
SHA512f9508d7fba80c4cee9c819ee636863c22440089ca7a10aa51580da28215437ab77701a9cf67272bc16659ef3faaea178e302a275bc87c1c6f2db62d651569b2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1708c5a71b8e7537cc34733ec6e7612
SHA1aad0c0df390d6fbd3ccc95aa65a5bd7ac9b14c22
SHA2563223be2c63ef990df13f5b39df44429dbe65d589cb11b8230edf1f96ffa3aa35
SHA512af06265da649f511ff77661352ed2be204eb47dd95757ceaa6d9feba7d42b5b240449982a8f1635d4ebb019af46473e4c3686409120076a533aae5eff986e20b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5205835446d031525bc686643fa177a1f
SHA14972f27d548139ba1060c1d67e55cb20a1178f4e
SHA2568a76b2863316a4fd5249ac3a2a0dd04c266c2a5d92dd5d6c8812b21e80bf9657
SHA51224ddde7db376f9b012996363fb2a700288caf9678e20fb9ca8b7b15893a597423a370c394272bdbf6e11f2771900e516f54390d32d66013b7163f403654b85a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d93082e727e0538154bdf5816f9b526b
SHA1cc3d4ed8dfed4caa8d1c0fd8ddb4e3e707abfed0
SHA2565ecf58514a887da5e1d159cb37f9e60610238670030dcc2eb36a3e7516f3ac4a
SHA512a44e15b07b149950302e19638895d48ee3aaa73ab54e4c94deb6e88f9c37b8f5b8365acaaaef437ac2a1165df1a829bdfe01f614d1933e7a465e5c67489a09bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8539795c3bbb684c9b7c3d4eb87dd3e
SHA1b6136f7bb0e6a33fec99f65a62ffc9488d0cb55e
SHA2568b4edbe6618ea4b4d4e72366faed4c47ea9ddf3251640461f772c10b2f5f4888
SHA512c65ca1f1bba257564851fe528bbf2796221e60ab9df7ac93688e387f500014621f8e1204cc356d2558fb182d6bf287a6f11574381a153d622c4144807fef8c8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561d3019eb5efabc047c269b5b25b36a2
SHA1e6c95421cd9ff7356e32814eb56573197d4155ea
SHA256319732b827efb1fd61479260edf4e9a48b233ff25c402e64150f78f04a4c12a7
SHA5122fe99a3bc592754038f5f6c16df7a1f15e26c7187c9088f4a2682fd6e2bf76c341eb42602cc06dc9878a6e0db3fd8e66dcd82b20589a5ac79fa88084389e144f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a56c9787f3b3e84106f80822ff40f41
SHA1e44abfd81606ee0cff75a795927d9858fccb11ac
SHA256dba292ff0e8ea34b478a197b785785bfdd7694dbde7f0743b2d3d6c0a1b099ed
SHA51220ab838ff4d799fd57e5088617bb45381f31992e2bc066bd75bb0674e6d41a9131755cadb983cb40fbfdcfa8d37ae1ce268c1925144c86f025ac49b9feef431a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae27e75995dbcf4c8a71358a95daef50
SHA1de983e809c3197092774ebabee8a6ee4698f80c0
SHA2564412224e75787434fce05af075b08edc4f78a129a374256fa7b575f34836f7a2
SHA512f769bb188feb0d7ab4f1165cbce4abceb2de996a40f5466265eaf1ed41c1ec3707fe23ca6213518899cd08c04cb46469bbfbc9f16c0d090e903906a01d6ae9c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1646718148fe70789af8a83c05b5e38
SHA11030105713c5354bacd08094de36db906a6bacb9
SHA2568d411d7d2202d50dd8740ee50e87d82eea1a544487bd5aa946a14437a6727402
SHA512628a06a473cc5e9301f86b6e492f34bc53093dbecdfcd75c0cb5659a252dc5b8ea263677085a72ac84c9f6fd23250f29a33abf7644493e2730059b51212d3afb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5776440814a0a7e1cb53ec67c6244e683
SHA19a3aac349b57e48de9b797816d3878dd819af7f5
SHA2566bb596d4bce72057a09f72a38f55e874a0c35d3a8dda46896267048998302a02
SHA5127c520eb000e668761aa6916d57c7ee06f1e14dbec1be5006ce807468418bf9e183bbed3abbd655f8a7180008f54928e43f5e36efc3f69b4cf3019a9d03866426
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5849f349a35eafdfea4e8f8b9a58d3e6f
SHA17b27bbb3ec5d7c46a85e41c82e32465ada091887
SHA25655964ba13628b0c9045bff0020696823c76f45c7729e89d14a58faca8e53a498
SHA512375d2d7e645c6fd37a9235643faa1ef29d8ab847fc117a72ecb0b9849ea992f138580c1cf4d3d022d3bb088a773ba9f667f3e45af7c2da743d8d83837d938946
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb33e0ac3410c041971679b60e47f904
SHA18474d6523402c44973469ec99e861f305e0f606d
SHA256b4ca40462bb90dea30692db938a2b1d7a104ac55b9624e053da7ae135b1d3686
SHA5125575550bc83103ecde1039baf4bc9931e58c063456805809fede5b98cb8fc342ce69136ef071ed9c0293b19b9b28505e4fd6be26858ffe11faa928d5bef6d068
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c56d3d7353fc0e79b9b017fdb264062
SHA1a13fec8822055c6fbb4a0fc3ae51aef3fe1868cb
SHA256e7ee5e82b14aa0cb2babd17f70c741eb2140aa5d2d90a5423a498eefa92f1780
SHA512d91f20e0eb361357d78cddd4f7439c83c475b4157f549b14e9c33465952dc727d7cb96f44bc399d5a9430459f95c0b4c4ba27096da7bcf82a1d4c1f470b8803f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8f127550101bd967be3a3d4db8f69fb
SHA1eab53f69f45cec4a8e5f9052cecb07c7ba9122a8
SHA256a7242c2f2080a3e132dab9efed9ef46ac31d83c7ff2445da45c99c0b08a64eca
SHA512f38b8b8a34cb46888044812121beac8d5b9cc76b3a9ef8ace24cb80e9af924aa0d7bd8f73027263afda68f10bce8c26a468c218cb513d304ce895888b3d9c65f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55971086cea6c60b8e8fcb3c53e97e16d
SHA148fc6e4aaf84e1ff8c2dd758e1e1d6932ff87083
SHA256ff5aaaacb7c067ea03b2494f77cbd924b00f3fd95a0408b6e8efbc6ad3ccda38
SHA5129b871554c5943d549678141efe73490e67cf022b602bc92341c232f89dd090c886c55d1fa0e385c0bbc7bf8468bc0b11e188ef7c15e9d8e991712dfb6d9c58ff
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b