Analysis

  • max time kernel
    59s
  • max time network
    59s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-09-2024 19:35

General

  • Target

    9e21262444644ed806b67c9c21bb89e8e5579ab1ef596ad08632bf744784f2ef.exe

  • Size

    270KB

  • MD5

    92224916dece7e83fe34e50756dc866b

  • SHA1

    ce1221fd9fd4f2373d1b2a69bcff3480da35ad23

  • SHA256

    9e21262444644ed806b67c9c21bb89e8e5579ab1ef596ad08632bf744784f2ef

  • SHA512

    f7beb58ae58662eba921e3f0c82b225417f3ab2970ae58050630fd336fddc64b68350dc33ca99405157fa50711f08155dac590e1fe6cdf39b6a81fe3898424be

  • SSDEEP

    6144:apFZywoS9KT/qXAtzF5jaaFqgDfZstH1Sb:8ZdPKXjaaFqist4b

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • ModiLoader Second Stage 1 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9e21262444644ed806b67c9c21bb89e8e5579ab1ef596ad08632bf744784f2ef.exe
    "C:\Users\Admin\AppData\Local\Temp\9e21262444644ed806b67c9c21bb89e8e5579ab1ef596ad08632bf744784f2ef.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:5020
    • C:\Users\Admin\AppData\Local\Temp\Server.exe
      "C:\Users\Admin\AppData\Local\Temp\Server.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3764
      • C:\Windows\SysWOW64\netsh.exe
        netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Server.exe" "Server.exe" ENABLE
        3⤵
        • Modifies Windows Firewall
        • Event Triggered Execution: Netsh Helper DLL
        • System Location Discovery: System Language Discovery
        PID:736
    • C:\Users\Admin\AppData\Local\Temp\Wifi Password Hack 2014.exe
      "C:\Users\Admin\AppData\Local\Temp\Wifi Password Hack 2014.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3828
      • C:\Extracted\Wifi.exe
        "C:\Extracted\Wifi.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4252
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe
          dw20.exe -x -s 824
          4⤵
          • Checks processor information in registry
          • Enumerates system info in registry
          • Suspicious use of AdjustPrivilegeToken
          PID:2136
      • C:\Extracted\Wifi Password Hack 2014.exe
        "C:\Extracted\Wifi Password Hack 2014.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:1852

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Extracted\Wifi Password Hack 2014.exe

    Filesize

    95KB

    MD5

    ceb33e90bc90c8b6dad6e20d0756405d

    SHA1

    d1bb29aa192f49e87824490f5afdbf1e2dffbe34

    SHA256

    590213081e69fb24eceabb4947b939b9451f2ee87ae7c3a6441e970e3eff3979

    SHA512

    9c04ed1e0bce4faf79627bafffa9c8c87ad20d0845903c52f51fad927e7237e88b468afe3c43fc64fc7f39e29484ed5bdabd5523641f2d62386ba99c868298ae

  • C:\Extracted\Wifi.exe

    Filesize

    69KB

    MD5

    d890349dbb670a7fcd7e293f5e55b6a5

    SHA1

    288ae6a90efad5da83dfa4fd3ce0d3981e267a96

    SHA256

    fd25a7082c8623f4b2397ae4d090d1bd441fee5331b064ff002af3ec13bd77fa

    SHA512

    b68c3a89482180f1bcc6b21f66e850e90ced6308d5e5618e33a09ff818686fc4c61706d28edefa44742dedc75630a3bee7bd7075828dae72916b82e29bd976aa

  • C:\Users\Admin\AppData\Local\Temp\Server.exe

    Filesize

    23KB

    MD5

    2361cd0f4e2639717d64832700337e5b

    SHA1

    990a35cc7012d4b6c3eb7bb7c167e113349ab6bd

    SHA256

    43357bcafd427aaf96fdf3495bf38ba402090b7ac9b46ba13520381f5027d1ad

    SHA512

    9d55edcc78e7547aea6f15b9439b6140adac6df2b1f3f0e45333a2337a9dffc9522525b1df27e25cfd56f451d3dcd8f44f5cd84a743fefc046467e170dbf2971

  • C:\Users\Admin\AppData\Local\Temp\Wifi Password Hack 2014.exe

    Filesize

    217KB

    MD5

    27a51cbe1f0290b27b5e936356446b58

    SHA1

    cfc304447b7f07774ede994ccecc9db69a95b978

    SHA256

    8128299e7b54c80d097ea7ee65a47d78bc45a5ff99f98fe59195d58fd94dceed

    SHA512

    1ded2a9b56565547b0280c8ef04db474e50adf3b030bbf12df88514781fb146afc38d0e87c66756bd654c5741c4f49ddacd041828a73213abcbf938edfb64112

  • C:\Users\Admin\AppData\Local\Temp\sfx.ini

    Filesize

    226B

    MD5

    6a313f19181d97d006898ad025d4ef6a

    SHA1

    c090484def4c90eee1d0c974c38940c4f669d771

    SHA256

    2cfc6311c0e60140a2b804b3bf5ebe2f6eac7e56c3c7c9cab97eba1e361178a6

    SHA512

    2ed531365117e9e263ace01e8be9780bd9644e3fded528e8508172d08ead753152aff690592afc8143031a62d21537382735c9a1bce795a201873b82eda02021

  • memory/1852-72-0x0000000005960000-0x00000000059B6000-memory.dmp

    Filesize

    344KB

  • memory/1852-71-0x0000000005670000-0x000000000567A000-memory.dmp

    Filesize

    40KB

  • memory/1852-70-0x0000000005720000-0x00000000057B2000-memory.dmp

    Filesize

    584KB

  • memory/1852-69-0x0000000005CD0000-0x0000000006274000-memory.dmp

    Filesize

    5.6MB

  • memory/1852-68-0x0000000005680000-0x000000000571C000-memory.dmp

    Filesize

    624KB

  • memory/1852-67-0x0000000000CA0000-0x0000000000CC0000-memory.dmp

    Filesize

    128KB

  • memory/3764-36-0x00000000736C0000-0x0000000073C71000-memory.dmp

    Filesize

    5.7MB

  • memory/3764-37-0x00000000736C0000-0x0000000073C71000-memory.dmp

    Filesize

    5.7MB

  • memory/3764-33-0x00000000736C2000-0x00000000736C3000-memory.dmp

    Filesize

    4KB

  • memory/3764-73-0x00000000736C2000-0x00000000736C3000-memory.dmp

    Filesize

    4KB

  • memory/3764-74-0x00000000736C0000-0x0000000073C71000-memory.dmp

    Filesize

    5.7MB

  • memory/4252-50-0x000000001C510000-0x000000001C9DE000-memory.dmp

    Filesize

    4.8MB

  • memory/4252-49-0x000000001BF00000-0x000000001C036000-memory.dmp

    Filesize

    1.2MB

  • memory/4252-48-0x0000000001680000-0x0000000001690000-memory.dmp

    Filesize

    64KB

  • memory/5020-32-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB