Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 08:39
Static task
static1
Behavioral task
behavioral1
Sample
fd8c7023c782ef9543a59a9562d2c5c0afc88e02421a9f5a758fd6449a4c28ddN.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
fd8c7023c782ef9543a59a9562d2c5c0afc88e02421a9f5a758fd6449a4c28ddN.exe
Resource
win10v2004-20240802-en
General
-
Target
fd8c7023c782ef9543a59a9562d2c5c0afc88e02421a9f5a758fd6449a4c28ddN.exe
-
Size
85KB
-
MD5
e49c6000102b0ac46d175ffa026cc790
-
SHA1
38a6ee53afa2744b78ad8d3331bbb6e597954547
-
SHA256
fd8c7023c782ef9543a59a9562d2c5c0afc88e02421a9f5a758fd6449a4c28dd
-
SHA512
a0110ff2d4d1adecc7353e2d0c22446399762c3f76468f80958c78acbab0f2e31047a8156f7c0d03748a0b41897a3338b915d21ca782891d4d088d2cb8f9f2c9
-
SSDEEP
1536:sqqu7R0GQ5d4ZytlyH/Kp9k7b4IVB0BByJtXZMa2cNfo4KoOI:f0d4EOivoZruByJtXOa2gr
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 3 IoCs
resource yara_rule behavioral1/memory/2184-24-0x0000000000400000-0x000000000042A000-memory.dmp modiloader_stage2 behavioral1/files/0x0007000000018b68-29.dat modiloader_stage2 behavioral1/memory/2184-35-0x0000000000400000-0x000000000042A000-memory.dmp modiloader_stage2 -
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\drivers\Beep.sys fd8c7023c782ef9543a59a9562d2c5c0afc88e02421a9f5a758fd6449a4c28ddN.exe File created C:\Windows\SysWOW64\drivers\Beep.sys fd8c7023c782ef9543a59a9562d2c5c0afc88e02421a9f5a758fd6449a4c28ddN.exe -
Executes dropped EXE 2 IoCs
pid Process 2184 ÅÜÅÜ¿¨¶¡³µ¼¯ÆøС¹¤¾ß.exe 2648 csol.exe -
Loads dropped DLL 9 IoCs
pid Process 1216 fd8c7023c782ef9543a59a9562d2c5c0afc88e02421a9f5a758fd6449a4c28ddN.exe 1216 fd8c7023c782ef9543a59a9562d2c5c0afc88e02421a9f5a758fd6449a4c28ddN.exe 1216 fd8c7023c782ef9543a59a9562d2c5c0afc88e02421a9f5a758fd6449a4c28ddN.exe 1216 fd8c7023c782ef9543a59a9562d2c5c0afc88e02421a9f5a758fd6449a4c28ddN.exe 2184 ÅÜÅÜ¿¨¶¡³µ¼¯ÆøС¹¤¾ß.exe 2728 WerFault.exe 2728 WerFault.exe 2728 WerFault.exe 2728 WerFault.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\SysInfo.dll ÅÜÅÜ¿¨¶¡³µ¼¯ÆøС¹¤¾ß.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process 2728 2648 WerFault.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csol.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fd8c7023c782ef9543a59a9562d2c5c0afc88e02421a9f5a758fd6449a4c28ddN.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 480 Process not Found 480 Process not Found -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2184 ÅÜÅÜ¿¨¶¡³µ¼¯ÆøС¹¤¾ß.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1216 wrote to memory of 2184 1216 fd8c7023c782ef9543a59a9562d2c5c0afc88e02421a9f5a758fd6449a4c28ddN.exe 29 PID 1216 wrote to memory of 2184 1216 fd8c7023c782ef9543a59a9562d2c5c0afc88e02421a9f5a758fd6449a4c28ddN.exe 29 PID 1216 wrote to memory of 2184 1216 fd8c7023c782ef9543a59a9562d2c5c0afc88e02421a9f5a758fd6449a4c28ddN.exe 29 PID 1216 wrote to memory of 2184 1216 fd8c7023c782ef9543a59a9562d2c5c0afc88e02421a9f5a758fd6449a4c28ddN.exe 29 PID 1216 wrote to memory of 2648 1216 fd8c7023c782ef9543a59a9562d2c5c0afc88e02421a9f5a758fd6449a4c28ddN.exe 30 PID 1216 wrote to memory of 2648 1216 fd8c7023c782ef9543a59a9562d2c5c0afc88e02421a9f5a758fd6449a4c28ddN.exe 30 PID 1216 wrote to memory of 2648 1216 fd8c7023c782ef9543a59a9562d2c5c0afc88e02421a9f5a758fd6449a4c28ddN.exe 30 PID 1216 wrote to memory of 2648 1216 fd8c7023c782ef9543a59a9562d2c5c0afc88e02421a9f5a758fd6449a4c28ddN.exe 30 PID 2648 wrote to memory of 2728 2648 csol.exe 31 PID 2648 wrote to memory of 2728 2648 csol.exe 31 PID 2648 wrote to memory of 2728 2648 csol.exe 31 PID 2648 wrote to memory of 2728 2648 csol.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd8c7023c782ef9543a59a9562d2c5c0afc88e02421a9f5a758fd6449a4c28ddN.exe"C:\Users\Admin\AppData\Local\Temp\fd8c7023c782ef9543a59a9562d2c5c0afc88e02421a9f5a758fd6449a4c28ddN.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\ÅÜÅÜ¿¨¶¡³µ¼¯ÆøС¹¤¾ß.exe"C:\Users\Admin\AppData\Local\Temp\ÅÜÅÜ¿¨¶¡³µ¼¯ÆøС¹¤¾ß.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:2184
-
-
C:\Users\Admin\AppData\Local\Temp\csol.exe"C:\Users\Admin\AppData\Local\Temp\csol.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2648 -s 363⤵
- Loads dropped DLL
- Program crash
PID:2728
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD530f4acd300eabc29d24bef6b532216a6
SHA193f42f54949eb2dc6870f4edea86144d45e9ad78
SHA256d230e71da3e6231ee2f050d501f466353790882a6c4338e93b839ac0e4a4cfa0
SHA512d5456bae3911a5d9dbc8c56f196d72284c340fe41013c480fe24ba6eb06ffc0745367499bb1d2aa18eb880176ce411b0e39c2b5f35928d48176a830bbf18e140
-
Filesize
57KB
MD59de9a9c8f0d23036322a52ae48f7dd9a
SHA168e09169b60ef65b2742900f716f5d2941d827ce
SHA2569ddf0e209197699fe001cad217d0da14fa629b2c196d30bdb91cbf808ceabd1d
SHA5127735dc24003cff4102c182063ef4e4c7ab8afffa9eebb06af55b1503e533cf7b1a01e63e19963ae6f9084d6927a4d0ed84f0bb5d6d71a1b43010d37ba18fadd2
-
Filesize
29KB
MD5a5014d677eebb5511fe416ceaee1cf91
SHA162344e63ec8a147920537152bf2c180e0001ccf6
SHA2562e71096b2518792c626c8e3771b9e0d642064901dc170a6b5ece717c2ac92892
SHA512d6b04e5fe95250e5286f5f5b5cc6a90aaa1ec46a26d5a92fdf9b1b505b14293b815ad1e24295a315afff063d2ed0d9e6c17e3808eca90f6d363e295ad1e0170a