Analysis
-
max time kernel
112s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2024 08:39
Static task
static1
Behavioral task
behavioral1
Sample
fd8c7023c782ef9543a59a9562d2c5c0afc88e02421a9f5a758fd6449a4c28ddN.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
fd8c7023c782ef9543a59a9562d2c5c0afc88e02421a9f5a758fd6449a4c28ddN.exe
Resource
win10v2004-20240802-en
General
-
Target
fd8c7023c782ef9543a59a9562d2c5c0afc88e02421a9f5a758fd6449a4c28ddN.exe
-
Size
85KB
-
MD5
e49c6000102b0ac46d175ffa026cc790
-
SHA1
38a6ee53afa2744b78ad8d3331bbb6e597954547
-
SHA256
fd8c7023c782ef9543a59a9562d2c5c0afc88e02421a9f5a758fd6449a4c28dd
-
SHA512
a0110ff2d4d1adecc7353e2d0c22446399762c3f76468f80958c78acbab0f2e31047a8156f7c0d03748a0b41897a3338b915d21ca782891d4d088d2cb8f9f2c9
-
SSDEEP
1536:sqqu7R0GQ5d4ZytlyH/Kp9k7b4IVB0BByJtXZMa2cNfo4KoOI:f0d4EOivoZruByJtXOa2gr
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 4 IoCs
resource yara_rule behavioral2/memory/3740-26-0x0000000000540000-0x0000000000553000-memory.dmp modiloader_stage2 behavioral2/files/0x0007000000023451-25.dat modiloader_stage2 behavioral2/memory/3740-30-0x0000000000400000-0x000000000042A000-memory.dmp modiloader_stage2 behavioral2/memory/3740-31-0x0000000000540000-0x0000000000553000-memory.dmp modiloader_stage2 -
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\Beep.sys fd8c7023c782ef9543a59a9562d2c5c0afc88e02421a9f5a758fd6449a4c28ddN.exe File opened for modification C:\Windows\SysWOW64\drivers\Beep.sys fd8c7023c782ef9543a59a9562d2c5c0afc88e02421a9f5a758fd6449a4c28ddN.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation fd8c7023c782ef9543a59a9562d2c5c0afc88e02421a9f5a758fd6449a4c28ddN.exe -
Executes dropped EXE 2 IoCs
pid Process 3740 ÅÜÅÜ¿¨¶¡³µ¼¯ÆøС¹¤¾ß.exe 3256 csol.exe -
Loads dropped DLL 2 IoCs
pid Process 3740 ÅÜÅÜ¿¨¶¡³µ¼¯ÆøС¹¤¾ß.exe 3740 ÅÜÅÜ¿¨¶¡³µ¼¯ÆøС¹¤¾ß.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\SysInfo.dll ÅÜÅÜ¿¨¶¡³µ¼¯ÆøС¹¤¾ß.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2356 3256 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csol.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fd8c7023c782ef9543a59a9562d2c5c0afc88e02421a9f5a758fd6449a4c28ddN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ÅÜÅÜ¿¨¶¡³µ¼¯ÆøС¹¤¾ß.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 636 Process not Found 636 Process not Found -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3740 ÅÜÅÜ¿¨¶¡³µ¼¯ÆøС¹¤¾ß.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4632 wrote to memory of 3740 4632 fd8c7023c782ef9543a59a9562d2c5c0afc88e02421a9f5a758fd6449a4c28ddN.exe 82 PID 4632 wrote to memory of 3740 4632 fd8c7023c782ef9543a59a9562d2c5c0afc88e02421a9f5a758fd6449a4c28ddN.exe 82 PID 4632 wrote to memory of 3740 4632 fd8c7023c782ef9543a59a9562d2c5c0afc88e02421a9f5a758fd6449a4c28ddN.exe 82 PID 4632 wrote to memory of 3256 4632 fd8c7023c782ef9543a59a9562d2c5c0afc88e02421a9f5a758fd6449a4c28ddN.exe 83 PID 4632 wrote to memory of 3256 4632 fd8c7023c782ef9543a59a9562d2c5c0afc88e02421a9f5a758fd6449a4c28ddN.exe 83 PID 4632 wrote to memory of 3256 4632 fd8c7023c782ef9543a59a9562d2c5c0afc88e02421a9f5a758fd6449a4c28ddN.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd8c7023c782ef9543a59a9562d2c5c0afc88e02421a9f5a758fd6449a4c28ddN.exe"C:\Users\Admin\AppData\Local\Temp\fd8c7023c782ef9543a59a9562d2c5c0afc88e02421a9f5a758fd6449a4c28ddN.exe"1⤵
- Drops file in Drivers directory
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Users\Admin\AppData\Local\Temp\ÅÜÅÜ¿¨¶¡³µ¼¯ÆøС¹¤¾ß.exe"C:\Users\Admin\AppData\Local\Temp\ÅÜÅÜ¿¨¶¡³µ¼¯ÆøС¹¤¾ß.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3740
-
-
C:\Users\Admin\AppData\Local\Temp\csol.exe"C:\Users\Admin\AppData\Local\Temp\csol.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3256 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3256 -s 2283⤵
- Program crash
PID:2356
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3256 -ip 32561⤵PID:4156
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
57KB
MD59de9a9c8f0d23036322a52ae48f7dd9a
SHA168e09169b60ef65b2742900f716f5d2941d827ce
SHA2569ddf0e209197699fe001cad217d0da14fa629b2c196d30bdb91cbf808ceabd1d
SHA5127735dc24003cff4102c182063ef4e4c7ab8afffa9eebb06af55b1503e533cf7b1a01e63e19963ae6f9084d6927a4d0ed84f0bb5d6d71a1b43010d37ba18fadd2
-
Filesize
20KB
MD530f4acd300eabc29d24bef6b532216a6
SHA193f42f54949eb2dc6870f4edea86144d45e9ad78
SHA256d230e71da3e6231ee2f050d501f466353790882a6c4338e93b839ac0e4a4cfa0
SHA512d5456bae3911a5d9dbc8c56f196d72284c340fe41013c480fe24ba6eb06ffc0745367499bb1d2aa18eb880176ce411b0e39c2b5f35928d48176a830bbf18e140
-
Filesize
29KB
MD5a5014d677eebb5511fe416ceaee1cf91
SHA162344e63ec8a147920537152bf2c180e0001ccf6
SHA2562e71096b2518792c626c8e3771b9e0d642064901dc170a6b5ece717c2ac92892
SHA512d6b04e5fe95250e5286f5f5b5cc6a90aaa1ec46a26d5a92fdf9b1b505b14293b815ad1e24295a315afff063d2ed0d9e6c17e3808eca90f6d363e295ad1e0170a