Analysis

  • max time kernel
    69s
  • max time network
    70s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    18-09-2024 15:11

General

  • Target

    19fc4a0d1dd6520fe79582c7ca4383c7a91e68731ad2cf1a606fe1f16c490a70N.exe

  • Size

    469KB

  • MD5

    e276f767ed5156af232c6f82bcac5df0

  • SHA1

    58f7dd48b3f481c5ef39ee5ef5cefb5246c41c32

  • SHA256

    19fc4a0d1dd6520fe79582c7ca4383c7a91e68731ad2cf1a606fe1f16c490a70

  • SHA512

    23b1dc0eb7829d5b341001377d40da1f4285d521329976498d3e99db7c95aed2622f00a3133bd096477180f3316723be114040592fc346de591280f7507583d2

  • SSDEEP

    12288:vN3o7Qhke14kOKTJxyProSMDFW4KftL9IB:vNHhqkOKTyPYs4yhIB

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 5 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 10 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 5 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\19fc4a0d1dd6520fe79582c7ca4383c7a91e68731ad2cf1a606fe1f16c490a70N.exe
    "C:\Users\Admin\AppData\Local\Temp\19fc4a0d1dd6520fe79582c7ca4383c7a91e68731ad2cf1a606fe1f16c490a70N.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1676
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\10.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\10.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1280
      • C:\Windows\SysWOW64\10.exe
        "C:\Windows\system32\10.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1840
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\9.exe
          C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\9.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in Program Files directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2528
          • C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice101.exe
            "C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice101.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in System32 directory
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2812
            • C:\Windows\SysWOW64\calc.exe
              "C:\Windows\system32\calc.exe"
              6⤵
                PID:2728
              • C:\program files\internet explorer\IEXPLORE.EXE
                "C:\program files\internet explorer\IEXPLORE.EXE"
                6⤵
                • Modifies Internet Explorer settings
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:2092
                • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                  "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2092 CREDAT:275457 /prefetch:2
                  7⤵
                  • System Location Discovery: System Language Discovery
                  • Modifies Internet Explorer settings
                  • Suspicious use of SetWindowsHookEx
                  PID:2888
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c ""C:\Program Files\Common Files\Microsoft Shared\MSINFO\SgotoDel.bat""
              5⤵
              • System Location Discovery: System Language Discovery
              PID:2716

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\Common Files\Microsoft Shared\MSInfo\SgotoDel.bat

      Filesize

      144B

      MD5

      7a5c4dba29c879ddc3b8e421d4b39361

      SHA1

      613563ccc01da90520fc0384559d4eb1f2a711cd

      SHA256

      d06f78d4a720d31ea1fa7eaaa3492c22c35e495ec473c5c741bdeecd7472ae1d

      SHA512

      401baf8e95cce9ca6a6088771e5ff8a6be19418642a6a40aebdc6996ca69d89c9f5a07978091e3438f629d78bf1f2a609c1b22009c9ad9ddc1dffcdbda6cbd16

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b53e85120877d9bd5794d2d7e86571ab

      SHA1

      c668f3b6fead0e1a3a3de9a1218d58af64f80393

      SHA256

      ee735dfdcbd455e8dc135d831bf1096d0fbb896e46a1d23e06ef85a45ecfeb8e

      SHA512

      a3208e033599e16c6dd6c83a3fcfd184396a4e0d51fd5d951435cabaf080e0de8a9a0dc512a197acb9a9477191acf6e2c406ffb7ef8fcc88c726f1b540b1e816

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      c462ddf7826e1b8a16a787271a4cda19

      SHA1

      a4b2cd55aac46857d6f39d7f3f794b2e96779fde

      SHA256

      dd9c56b5eea7bd3c1adafcdb243a2dc17565a7aec290c9d7b1e19c3cc8762e22

      SHA512

      60c5596fdcf954faa9a6e4d0eb9129208c024026646df21a0f0fe8aafc862dd4b299c03630c3c7b5ff76b7c0e801c2a16941b2800e4022d6bd57ea5fe91dfe0a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      8fdd479d30e301a9f8172a766035398e

      SHA1

      ea8c85089d5dc9db16945a85d96afbbad74c9d31

      SHA256

      188fc47ea3e8c42ed99c4eda8be62c9c2d0a23d7c753fae9265b53e2d83418db

      SHA512

      5a60495d682eeb5c46dbb7aeb1e5f8080de769194a1a8574162f2b5ed0bb19af6ec921f3fe052aa3cbd77d57b9c61e2f1bc72dffe8e00494c1b19717603938b4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      70caeb1628deb870e25ab1ca7fe54463

      SHA1

      10cd62eed979c41134bf182dc27b12a6a4b7c76a

      SHA256

      fb18e12e0ed542e3decb04c6ebd89a0633d99730b72e0fada9cc82784a618766

      SHA512

      40e1c58e31207d3e7ed704701a3b7dd9673d64e2274ffc7c9c38e292b8357c517be6037232b5cc62a48cc5e0a57f9fbf9514494243be748e3844affb3e0a790f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      3a903f70e7747e42e46ad3c2952f6a5d

      SHA1

      863cfa85decc3bddd8e1901fdf812c43c3b90035

      SHA256

      8692dd179e9754eb32e410fa2a3973f5a993aa086b809a2b913e799cf1b7075d

      SHA512

      196f2f61c6cbb77b6305130f0fecc64fd1195f3fa9036e2b468710e4f32e11a98e74058480c3d908f1247ace551e92fa2b3add39b93d7497e8f600be2ccf281b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      f64541790f010aefeaef17cbf879b686

      SHA1

      837d46d62b449304e62eb597e9ccd39512af662f

      SHA256

      77736a7f74dd76739c3cb5c02c93fd00a192243ca7aba5e9f398a35c6bb70f7c

      SHA512

      571dbdcc634d686374690c35da611faa45dbbfd5fe8d025a9b56eee232a1a2e32a4783f71d0a6aec5eddf35e8c4a912cba68133cdf2bc0079f6b76b7c7332802

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      e54fe7423cb45d219e4d96372df29974

      SHA1

      a04edabb959e913889bcf316f43bc441406ca453

      SHA256

      703880ca6683d3d42b37ccd401ac3d52992651ce98b0b6be73aefa3aadb34726

      SHA512

      75634c4b2d5e405ee9c32d2e251322c805cf2cda5dcad5fa3ab9eea115295b5d0fff015749f962918ad725bb05ba68f124a729c74f1dd6fa1543d5540f35a11e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      06d0fd20b7196c2adf31b146a764645d

      SHA1

      4a0c56fefec66133751db575f19d6027791afedd

      SHA256

      f1dbba97204c4385fd522ff4f7ed75be1615098248c83b23814534f92f9f93d6

      SHA512

      5bbad72bd4232e9b873774a097af384f5e6c99b116cee4fa2464eb3feaf78b72bc50eecf7dc5137ebe4b873d358987debb4c24509febc5e27e5fe2ebc180f76e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      0a7ade1f78e3f009627aa0a096bba178

      SHA1

      6f4455764a239e25794063a566dd8639dfe45758

      SHA256

      dd9c8f7c1e1dbc612329e51cdd699a8ed643f37cffae6136f6553e2b65e553e2

      SHA512

      a20975b2541546d02a8e7f9219a4317ed811f293d3ffd430c6979cd16dc9ad7d9f0536bd46c5b994c1cf6bf23851fe3cb6185e47281dfce478ddb7cc2204f97f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      1c04f21a39d8bc6b98528206fb6e575f

      SHA1

      a7ae52c86e92efb18807a157646323b8624b7fc7

      SHA256

      222d7c03b52f6a042d39fe1517ce9ea32514277a2e51a60e18b7f7144da2b067

      SHA512

      6ea03c61b35ca96473c756ecd3a0382f4d5056eec5552bfe01c149b6f2fd111b778461d62184d1058c7e7a28cc104f19c81d8991e66b3992b8e01036dafb947c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      583906d4135f0e1e47e1cc41d0a904cb

      SHA1

      21cb86b5011fbe6b5cd720ec153ea34723aa4ff7

      SHA256

      1fac9cd8967d6a12d126a1e81473fd6e70dd669b59339a41536be7b08081815f

      SHA512

      461726eca70dbee8a20af57aa83c183d7453abf9b5a894beb2d32f84a35dd2c040002f8bc9d3ade0e96a5e31a3bdea5dd468ac303c77dc1bc6d9fe427e7b54f4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      73713e96981587e8e59ae2a6c83c3136

      SHA1

      e7a35a334ceb17fcec1e79cedd2675dfe5df8667

      SHA256

      f704f2d9b86c164b4a3d414fd7f10e10aa73e2f1ad9cf541100e19b856bc3914

      SHA512

      d122b6fa2df51ef06cff1abed6c4927f9d1ea106ea0e93928ced12dbe32cd27789355560ed15a795c67e94790df62324d68bdc6992359e37a7526abb8f9acdbc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      41b7845b5e4adc951ab3544388dbbeb1

      SHA1

      762457123ffc3d82ad86eec1ac83511e89682577

      SHA256

      03dfedc4694ef13d3b7eeabef42a727e4fd5ce4ed8baa0708ed4d752608dc181

      SHA512

      c00c61c3b565c1dc0a42885e2dcb147fd0b38e73be44f45e557f80455522a6133e69307f361efc18aea3ed9dc7cf98c1838446261b981a711d0493836e7a8fbe

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      3e09fb57a10d16fe3ff26bb571a70cd7

      SHA1

      ed4a56af6b9d903bdeadc2a92a5e10b104b94743

      SHA256

      20c4b6fe167844b041110723605a1c9372a5fb3f5158d26b7f4de3601135c7be

      SHA512

      9fdc9b93540577b6673bab0bae25623518d1a9a512733abd76b5626aa87b0c29260b2f312c2fbde28cf685ad2b902a9191ef526add37983dee9da152c1ae0af5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      5044535f48ac32c1d83de5cee8981a52

      SHA1

      434bca359bf6920266e7465f884d2b8fd68d7fb1

      SHA256

      707305635a284fa1780bf93fec813c06e31530e9cd0b0ce7ef6c3e883ef348f4

      SHA512

      42a7288b9451f708e2fae539deac854d609e6cc601fe6cd770ec067e61254f21b9e7373bda25ae012f11d135cf2c5e62970b744e263d326995b90d6aa3ae7e9c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      93b24038fd2c751107146c41683dd6b3

      SHA1

      59b37aa98ebf96cd0402d293f4fbe64965403620

      SHA256

      7478cc6c676ec346df79e0a126995705ae5be867fe4cb126591792728e5738a2

      SHA512

      4307bdebad909bbe75f9d86a78285f906db15111e8ab4d86cf7d7957123e05b7fb9a804602965a46abb527db25c9ed3d13a8b3131bfd8bb50e07022a500b689b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      2aff17b59cd1de92677c88ff492cdcb1

      SHA1

      445908ca838f5245d27e1adcc6935bf1c71c4520

      SHA256

      d696a2524a3f72b5c12f3243cdbd6ab0b7673870ec6720e4ae1d464a385c27df

      SHA512

      d535f3fa703967add164a8a8ca39c585faa1ecf5c910dcf8a363d8d886596acad8ef94206f03b6b94dcefce40957f826b29b775ae273e10469a42da38c6ccbf3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      4a1a061f430652b8d79a429507ea5f23

      SHA1

      aa945568bb50e4b2336a9f5369ba246e8b584048

      SHA256

      430cc0723263deca6165e36d42c59b8109281379a87389d991003c16e7f290e1

      SHA512

      5bb011aa3bff9116db91c66e11d1866fd23fae2c7c2f6c468b4535087be167279794c580a9d1541376aac51878ac00ceff92b148fae3afe1d8cc6e66f6dcb6cb

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      533671f0b35cb26384a0c417836f6124

      SHA1

      d030130d7ad5b0be6e36af71d6d1f9a1c4934e2e

      SHA256

      422eedcb4e2a4f38b7b591717b342865d69748b4421949aa0958cfe4c623eba2

      SHA512

      9e5cd0feb4aa3f2cace3774cb9e91c2672ee55f130a5f2bea8b992155b780c342bff1890848ad844ebb9fa4602511d9d9a2769928692c5988076c4d017417f60

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      d756d641a348bf428c6542ad481c2b07

      SHA1

      adc5253b459f3c077dc943c267683f94bb994ddf

      SHA256

      78e265b3e9266ddd4217fd5ea8b93b0cb9799e04f46cad1b5394f061a7498b12

      SHA512

      a83b02cfc7a562e61d05fba8300228ce57e30b4a6deff03a695e6b1d85932c8391be1a9849528900b68d0595346c494a959efedf6221614d4cbbac9887252ce4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      7233e37338fba2793bb05c133fe7a343

      SHA1

      6b57e6e405891595f4f7b01e096d9229402060b7

      SHA256

      28b863a6c733a396c564e25b4543d322953a8c21b1a18182e01dca407155ac2f

      SHA512

      ed4bc07c2d5a658fb7e7e6f8217e9b1e575947d311a16dc1fc477425f5ac72064f68b6025b72dedd24308cceaf70ad6e78ce05a52e882b2ee1455028ab85ffa9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      3a4a502dee210635490260c865c5be1a

      SHA1

      5b052fbbf8b8f1fe4d11288a75b51aab609e6bb0

      SHA256

      742784f73e1119812a168001651b68c30998fd77acf9fed2a00c02c57a23fb32

      SHA512

      2ad18ff1f6edc3361d689e4f20b6c56793a3c88b8f982acb825d6219501f9f0c39d23cc9069fab40be3ed08093e484b91dc2174b0ac97b89a862a44a36e2013d

    • C:\Users\Admin\AppData\Local\Temp\CabCE19.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\TarCEE9.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\10.exe

      Filesize

      441KB

      MD5

      f2daa5a2d5fa10ea473576417babd717

      SHA1

      8b60e361d24851b54223afe9a0fbd8f98d04fa4b

      SHA256

      3b6dccdcd4751f331e90abe564272bd9d733d31db52b027027e5c81c44a7c655

      SHA512

      e174a91f0be23ecbe8419a86806433c8ba2da61579013f8b21647aca60051fd43b4b60e3c632dbd89dc244529e00cec2f245d50038081b9247cf0af9017518ca

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\9.exe

      Filesize

      735KB

      MD5

      f233637598073883ee100a2477e99abc

      SHA1

      2f3c17eccb4d8a961aa720b1ad0eb75769e36cdc

      SHA256

      e8e9d4f16828f407ae93cc6f76c1cd7edd2c19466ec6cef5470f54f57297156e

      SHA512

      048228290f524470570abd2396ce580ae33dc5c413b595c0c69f8fad9c88fa8051d2cf059aae3da7ae32c2f2a74ccadf6b65b581a8befa8502cb889f6960397a

    • \Windows\SysWOW64\10.exe

      Filesize

      371KB

      MD5

      7166b3a3299abc33e6634ea31d8e2014

      SHA1

      a9cf3fa1bc8d7fe40b31219242b8b4635ae152c3

      SHA256

      2a5264c8f205a19b36a7ac2f35968746fee38acecc1da1e34c805f0966b5137e

      SHA512

      27f1f3b3f5e666cd317612bcf75d321cabc3c9f7b66d837fba199846453e79fa7df691ad8f5f7526f556a97452a81915f44249934fc197ded535d89c97219df2

    • memory/1280-18-0x0000000000400000-0x0000000000421000-memory.dmp

      Filesize

      132KB

    • memory/1676-0-0x0000000001000000-0x00000000010E9000-memory.dmp

      Filesize

      932KB

    • memory/1676-20-0x0000000001000000-0x00000000010E9000-memory.dmp

      Filesize

      932KB

    • memory/2092-51-0x0000000000070000-0x000000000012F000-memory.dmp

      Filesize

      764KB

    • memory/2528-60-0x0000000000400000-0x00000000004BF000-memory.dmp

      Filesize

      764KB

    • memory/2728-49-0x0000000000400000-0x00000000004BF000-memory.dmp

      Filesize

      764KB

    • memory/2728-47-0x0000000000400000-0x00000000004BF000-memory.dmp

      Filesize

      764KB

    • memory/2728-46-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2812-52-0x0000000000400000-0x00000000004BF000-memory.dmp

      Filesize

      764KB