Analysis

  • max time kernel
    196s
  • max time network
    206s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-11-2024 20:26

General

  • Target

    Ziraat_Bankasi_Swift_Mesaji_DXB04958T.gz

  • Size

    949KB

  • MD5

    e03958d8be1c86d13809017c9df1b774

  • SHA1

    3d064aa9ce1c26f0e0fff1251150467260fe87d8

  • SHA256

    9ad05e28fec2e97732380986f8b645298d6cce8c1e4e8ca27d3ddf89cc05426e

  • SHA512

    a3d8efc3e6b101303ff3eb712ce7222b5d7e42fc408f0f90013f08b72155fdb18a5ad6b896a40680d2eaeb460a0fcd2841bff81c925c611805598ace6bce781d

  • SSDEEP

    24576:x0v1fers4iESTpLQw/REdhakd0NCsoDqT0u5Twb2ZRIiIONNQVhM+h:+9AspLQw0hakdCCqTD5Twb2ZgONNUJ

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 61 IoCs
  • Executes dropped EXE 8 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Ziraat_Bankasi_Swift_Mesaji_DXB04958T.gz"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2228
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7zO4B80266A\Ziraat_Bankasi_Swift_Mesaji_DXB04958T.cmd" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:60
      • C:\Windows\System32\extrac32.exe
        C:\\Windows\\System32\\extrac32 /C /Y C:\\Windows\\System32\\cmd.exe "C:\\Users\\Public\\alpha.exe"
        3⤵
          PID:1964
        • C:\Users\Public\alpha.exe
          C:\\Users\\Public\\alpha /c extrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:2776
          • C:\Windows\system32\extrac32.exe
            extrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe
            4⤵
              PID:516
          • C:\Users\Public\alpha.exe
            C:\\Users\\Public\\alpha /c C:\\Users\\Public\\kn -decodehex -F "C:\Users\Admin\AppData\Local\Temp\7zO4B80266A\Ziraat_Bankasi_Swift_Mesaji_DXB04958T.cmd" "C:\\Users\\Public\\AnyDesk.jpeg" 9
            3⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:2568
            • C:\Users\Public\kn.exe
              C:\\Users\\Public\\kn -decodehex -F "C:\Users\Admin\AppData\Local\Temp\7zO4B80266A\Ziraat_Bankasi_Swift_Mesaji_DXB04958T.cmd" "C:\\Users\\Public\\AnyDesk.jpeg" 9
              4⤵
              • Executes dropped EXE
              PID:1336
          • C:\Users\Public\alpha.exe
            C:\\Users\\Public\\alpha /c C:\\Users\\Public\\kn -decodehex -F "C:\\Users\\Public\\AnyDesk.jpeg" "C:\\Users\\Public\\Libraries\\AnyDesk.PIF" 12
            3⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:2676
            • C:\Users\Public\kn.exe
              C:\\Users\\Public\\kn -decodehex -F "C:\\Users\\Public\\AnyDesk.jpeg" "C:\\Users\\Public\\Libraries\\AnyDesk.PIF" 12
              4⤵
              • Executes dropped EXE
              PID:4852
          • C:\Users\Public\Libraries\AnyDesk.PIF
            C:\Users\Public\Libraries\AnyDesk.PIF
            3⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:3696
          • C:\Users\Public\alpha.exe
            C:\\Users\\Public\\alpha /c del /q "C:\Users\Public\kn.exe" / A / F / Q / S
            3⤵
            • Executes dropped EXE
            PID:320
          • C:\Users\Public\alpha.exe
            C:\\Users\\Public\\alpha /c del /q "C:\Users\Public\AnyDesk.jpeg" / A / F / Q / S
            3⤵
            • Executes dropped EXE
            PID:4108

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\7zO4B80266A\Ziraat_Bankasi_Swift_Mesaji_DXB04958T.cmd

        Filesize

        3.2MB

        MD5

        5f351f07b94613764a8bc09970bbcd58

        SHA1

        47fcfcac926a0007010b7afb776671d2276b8b81

        SHA256

        2a81c419a9fcd1eb9f778dba6911c366586b0ae9a5cf2cd25155413bfbff9eea

        SHA512

        49ddfcc8f58117ec824e35b1a2bf6928cf580e4337a8f9aa1d7d4dc62a6e93bb811702d0ed2c970f1f0a08b013ffc5ba6dcc6951c6d59f9a0d7915c3b9f3baae

      • C:\Users\Public\AnyDesk.jpeg

        Filesize

        2.3MB

        MD5

        04ad7e38aa2f399b5862e6267697632a

        SHA1

        a30e9c94bb215f0b96a651432f8f74f4a06284de

        SHA256

        da4101eba193661f3016d2b4b6328cf8d0cb16ac58c1470683bc07d8baf34ebe

        SHA512

        b7cacc98c0d5c7b3f03cde8b294cb6534be25c560e78c6cf5304285774b56493e98346152a587162d1347eddc7f751bd164a78dd257383b0b59b37d89d6ba5a8

      • C:\Users\Public\Libraries\AnyDesk.PIF

        Filesize

        1.2MB

        MD5

        2ef70d96354cc04d9168e8f69e7b17a0

        SHA1

        92eee1bb5de4f4d50805101b83e4a3a1a602856b

        SHA256

        5842b3e5271efed831bf21f4821431bb1a7dcc94bafab135b62d34bfdb32f503

        SHA512

        3c46f059b5e2c806efdfea71dad8bcc236bfc753dc3b15e637d6697231313b68232d0f4bc6921b41ed76f2471891718678ec7b6c6dda0a5d7c9f7ae8a57580b3

      • C:\Users\Public\alpha.exe

        Filesize

        283KB

        MD5

        8a2122e8162dbef04694b9c3e0b6cdee

        SHA1

        f1efb0fddc156e4c61c5f78a54700e4e7984d55d

        SHA256

        b99d61d874728edc0918ca0eb10eab93d381e7367e377406e65963366c874450

        SHA512

        99e784141193275d4364ba1b8762b07cc150ca3cb7e9aa1d4386ba1fa87e073d0500e61572f8d1b071f2faa2a51bb123e12d9d07054b59a1a2fd768ad9f24397

      • C:\Users\Public\kn.exe

        Filesize

        1.6MB

        MD5

        bd8d9943a9b1def98eb83e0fa48796c2

        SHA1

        70e89852f023ab7cde0173eda1208dbb580f1e4f

        SHA256

        8de7b4eb1301d6cbe4ea2c8d13b83280453eb64e3b3c80756bbd1560d65ca4d2

        SHA512

        95630fdddad5db60cc97ec76ee1ca02dbb00ee3de7d6957ecda8968570e067ab2a9df1cc07a3ce61161a994acbe8417c83661320b54d04609818009a82552f7b

      • memory/3696-33-0x0000000003000000-0x0000000004000000-memory.dmp

        Filesize

        16.0MB

      • memory/3696-34-0x0000000003000000-0x0000000004000000-memory.dmp

        Filesize

        16.0MB

      • memory/3696-39-0x0000000000400000-0x0000000000535000-memory.dmp

        Filesize

        1.2MB

      • memory/3696-43-0x0000000003000000-0x0000000004000000-memory.dmp

        Filesize

        16.0MB

      • memory/3696-44-0x0000000003000000-0x0000000004000000-memory.dmp

        Filesize

        16.0MB

      • memory/3696-48-0x0000000003000000-0x0000000004000000-memory.dmp

        Filesize

        16.0MB

      • memory/3696-47-0x0000000003000000-0x0000000004000000-memory.dmp

        Filesize

        16.0MB

      • memory/3696-42-0x0000000003000000-0x0000000004000000-memory.dmp

        Filesize

        16.0MB

      • memory/3696-46-0x0000000003000000-0x0000000004000000-memory.dmp

        Filesize

        16.0MB

      • memory/3696-41-0x0000000003000000-0x0000000004000000-memory.dmp

        Filesize

        16.0MB

      • memory/3696-51-0x0000000003000000-0x0000000004000000-memory.dmp

        Filesize

        16.0MB

      • memory/3696-60-0x0000000003000000-0x0000000004000000-memory.dmp

        Filesize

        16.0MB

      • memory/3696-55-0x0000000003000000-0x0000000004000000-memory.dmp

        Filesize

        16.0MB

      • memory/3696-45-0x0000000003000000-0x0000000004000000-memory.dmp

        Filesize

        16.0MB

      • memory/3696-63-0x0000000003000000-0x0000000004000000-memory.dmp

        Filesize

        16.0MB

      • memory/3696-101-0x0000000003000000-0x0000000004000000-memory.dmp

        Filesize

        16.0MB

      • memory/3696-125-0x0000000003000000-0x0000000004000000-memory.dmp

        Filesize

        16.0MB

      • memory/3696-73-0x0000000003000000-0x0000000004000000-memory.dmp

        Filesize

        16.0MB

      • memory/3696-123-0x0000000003000000-0x0000000004000000-memory.dmp

        Filesize

        16.0MB

      • memory/3696-118-0x0000000003000000-0x0000000004000000-memory.dmp

        Filesize

        16.0MB

      • memory/3696-69-0x0000000003000000-0x0000000004000000-memory.dmp

        Filesize

        16.0MB

      • memory/3696-113-0x0000000003000000-0x0000000004000000-memory.dmp

        Filesize

        16.0MB

      • memory/3696-68-0x0000000003000000-0x0000000004000000-memory.dmp

        Filesize

        16.0MB

      • memory/3696-111-0x0000000003000000-0x0000000004000000-memory.dmp

        Filesize

        16.0MB

      • memory/3696-109-0x0000000003000000-0x0000000004000000-memory.dmp

        Filesize

        16.0MB

      • memory/3696-107-0x0000000003000000-0x0000000004000000-memory.dmp

        Filesize

        16.0MB

      • memory/3696-105-0x0000000003000000-0x0000000004000000-memory.dmp

        Filesize

        16.0MB

      • memory/3696-103-0x0000000003000000-0x0000000004000000-memory.dmp

        Filesize

        16.0MB

      • memory/3696-104-0x0000000003000000-0x0000000004000000-memory.dmp

        Filesize

        16.0MB

      • memory/3696-102-0x0000000003000000-0x0000000004000000-memory.dmp

        Filesize

        16.0MB

      • memory/3696-67-0x0000000003000000-0x0000000004000000-memory.dmp

        Filesize

        16.0MB

      • memory/3696-66-0x0000000003000000-0x0000000004000000-memory.dmp

        Filesize

        16.0MB

      • memory/3696-65-0x0000000003000000-0x0000000004000000-memory.dmp

        Filesize

        16.0MB

      • memory/3696-64-0x0000000003000000-0x0000000004000000-memory.dmp

        Filesize

        16.0MB

      • memory/3696-91-0x0000000003000000-0x0000000004000000-memory.dmp

        Filesize

        16.0MB

      • memory/3696-89-0x0000000003000000-0x0000000004000000-memory.dmp

        Filesize

        16.0MB

      • memory/3696-88-0x0000000003000000-0x0000000004000000-memory.dmp

        Filesize

        16.0MB

      • memory/3696-86-0x0000000003000000-0x0000000004000000-memory.dmp

        Filesize

        16.0MB

      • memory/3696-84-0x0000000003000000-0x0000000004000000-memory.dmp

        Filesize

        16.0MB

      • memory/3696-58-0x0000000003000000-0x0000000004000000-memory.dmp

        Filesize

        16.0MB

      • memory/3696-81-0x0000000003000000-0x0000000004000000-memory.dmp

        Filesize

        16.0MB

      • memory/3696-57-0x0000000003000000-0x0000000004000000-memory.dmp

        Filesize

        16.0MB

      • memory/3696-80-0x0000000003000000-0x0000000004000000-memory.dmp

        Filesize

        16.0MB

      • memory/3696-77-0x0000000003000000-0x0000000004000000-memory.dmp

        Filesize

        16.0MB

      • memory/3696-76-0x0000000003000000-0x0000000004000000-memory.dmp

        Filesize

        16.0MB

      • memory/3696-72-0x0000000003000000-0x0000000004000000-memory.dmp

        Filesize

        16.0MB

      • memory/3696-71-0x0000000003000000-0x0000000004000000-memory.dmp

        Filesize

        16.0MB

      • memory/3696-70-0x0000000003000000-0x0000000004000000-memory.dmp

        Filesize

        16.0MB

      • memory/3696-114-0x0000000003000000-0x0000000004000000-memory.dmp

        Filesize

        16.0MB

      • memory/3696-112-0x0000000003000000-0x0000000004000000-memory.dmp

        Filesize

        16.0MB

      • memory/3696-110-0x0000000003000000-0x0000000004000000-memory.dmp

        Filesize

        16.0MB

      • memory/3696-106-0x0000000003000000-0x0000000004000000-memory.dmp

        Filesize

        16.0MB

      • memory/3696-62-0x0000000003000000-0x0000000004000000-memory.dmp

        Filesize

        16.0MB

      • memory/3696-49-0x0000000003000000-0x0000000004000000-memory.dmp

        Filesize

        16.0MB

      • memory/3696-61-0x0000000003000000-0x0000000004000000-memory.dmp

        Filesize

        16.0MB

      • memory/3696-87-0x0000000003000000-0x0000000004000000-memory.dmp

        Filesize

        16.0MB

      • memory/3696-83-0x0000000003000000-0x0000000004000000-memory.dmp

        Filesize

        16.0MB

      • memory/3696-79-0x0000000003000000-0x0000000004000000-memory.dmp

        Filesize

        16.0MB

      • memory/3696-56-0x0000000003000000-0x0000000004000000-memory.dmp

        Filesize

        16.0MB

      • memory/3696-54-0x0000000003000000-0x0000000004000000-memory.dmp

        Filesize

        16.0MB

      • memory/3696-53-0x0000000003000000-0x0000000004000000-memory.dmp

        Filesize

        16.0MB

      • memory/3696-52-0x0000000003000000-0x0000000004000000-memory.dmp

        Filesize

        16.0MB

      • memory/3696-50-0x0000000003000000-0x0000000004000000-memory.dmp

        Filesize

        16.0MB