Overview
overview
10Static
static
100.46582298...58.exe
windows7-x64
700331dd25b...3a.exe
windows7-x64
10065988f36f...a0.exe
windows7-x64
30826716413...57.exe
windows7-x64
1008cf8ed94c...a4.exe
windows7-x64
100997ba7292...3c.exe
windows7-x64
30b7996bca4...5f.exe
windows7-x64
0c3431dbb8...ui.dll
windows7-x64
50cd7440ca9...bc.exe
windows7-x64
10100b8bfff5...ir.exe
windows7-x64
3101.ex_.exe
windows7-x64
3119.executable.exe
windows7-x64
6119.unp.exe
windows7-x64
611abb44de5...47.exe
windows7-x64
1011fb52c968...22.exe
windows7-x64
10123.exe
windows7-x64
1139.exe
windows7-x64
113E418BF18...73.dll
windows7-x64
3144.exe
windows7-x64
117697e1829...44.dll
windows7-x64
319561b3379...er.exe
windows7-x64
1019ec0d0e51...C5.exe
windows7-x64
71a6bed2aff...f2.exe
windows7-x64
101f210c60f9...40.exe
windows7-x64
101f3509cc11...dd.exe
windows7-x64
1020c6d29da8...7d.exe
windows7-x64
9234e77145d...2d.exe
windows7-x64
10263fc6fc9e...32.exe
windows7-x64
92e0da054d0...23.zip
windows7-x64
9Compenso.P...__.exe
windows7-x64
9301a3f5017...5f.exe
windows7-x64
1030620.ex_.exe
windows7-x64
10Analysis
-
max time kernel
299s -
max time network
295s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 02:14
Behavioral task
behavioral1
Sample
0.4658229854220858.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
00331dd25b83984d4b6d9753fec2b306e88ac87371ea48188df49cb630905d3a.exe
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
065988f36f3ab99ff40893c7ad756cfcc3baea1b8b5217f17cdd6e44160df0a0.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
082671641341d89fe49d0da717846035ba6af02edb59840148eddc3586d21557.exe
Resource
win7-20240903-en
Behavioral task
behavioral5
Sample
08cf8ed94cc1ef6ae23133f3e506a50d8aad9047c6fa74568a0373d991261aa4.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
0997ba7292ddbac1c7e7ade6766ed53c.exe
Resource
win7-20240708-en
Behavioral task
behavioral7
Sample
0b7996bca486575be15e68dba7cbd802b1e5f90436ba23f802da66292c8a055f.exe
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
0c3431dbb8cd0478250eb4357257880e_localui.dll
Resource
win7-20241023-en
Behavioral task
behavioral9
Sample
0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
100b8bfff550fb74c98a2ef9a71d4bb53553d2d7ba509bb451fe32814ec57e48.exe.vir.exe
Resource
win7-20240903-en
Behavioral task
behavioral11
Sample
101.ex_.exe
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
119.executable.exe
Resource
win7-20241010-en
Behavioral task
behavioral13
Sample
119.unp.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
11abb44de53807e32980a010a473514694f901841e63ab33f5e0ff8754009b47.exe
Resource
win7-20240903-en
Behavioral task
behavioral15
Sample
11fb52c96853e12f011b7b7894e9884e56eb5522.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
123.exe
Resource
win7-20240903-en
Behavioral task
behavioral17
Sample
139.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
13E418BF18B03AC80580DB69ADA305A2B7093DFED00692DCF91A99D2526D3A73.dll
Resource
win7-20240903-en
Behavioral task
behavioral19
Sample
144.exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
17697e1829f0d18d2051a67bc2bca134_da3ded254909e9abaa46eb5bc3b10944.dll
Resource
win7-20240903-en
Behavioral task
behavioral21
Sample
19561b33793dcb865eae56575a899ce8_kovter_from_Sakura82_taskmanger.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
19ec0d0e5143940492a1c79c06eb8f18aa9feb356e41b8b79fdc6a16a3bcd7bf_TDS=4F9B33C5.exe
Resource
win7-20241010-en
Behavioral task
behavioral23
Sample
1a6bed2afff1b9880e42a29cea9b8139bcb12e34085fb008de13aa983b82a4f2.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
1f210c60f90fd8403099482455f3220b56b2864bc4d2b6af0abda4a2c3854d40.exe
Resource
win7-20240903-en
Behavioral task
behavioral25
Sample
1f3509cc11ffa1f7d839df93615cf1ba0819d75cafd5ef59110d9b01fb90addd.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
20c6d29da875075afa0ed7b4fb58e555de89d4bed13bf5ad109817c593ddd77d.exe
Resource
win7-20241023-en
Behavioral task
behavioral27
Sample
234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe
Resource
win7-20240729-en
Behavioral task
behavioral28
Sample
263fc6fc9efa4c05a08d9ff1fc7bb060a7b8f376f82afa17fd3fc267bc8e8032.exe
Resource
win7-20240903-en
Behavioral task
behavioral29
Sample
2e0da054d03fde4e7b2c2057cc4aa410c64b6ab8777ee6d4fd43f031a5170a23.zip
Resource
win7-20240708-en
Behavioral task
behavioral30
Sample
Compenso.Pdf______________________________________________________________.exe
Resource
win7-20240903-en
Behavioral task
behavioral31
Sample
301a3f5017e578fb04b0eb33f45831bb9bb8318020e0a18d222ebea08bf1c75f.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
30620.ex_.exe
Resource
win7-20241010-en
General
-
Target
19561b33793dcb865eae56575a899ce8_kovter_from_Sakura82_taskmanger.exe
-
Size
119KB
-
MD5
19561b33793dcb865eae56575a899ce8
-
SHA1
aeff444147fb35adbdf4faed6b5c4bd385b1d98c
-
SHA256
d625fcec98e282032f550ba80f60de2603adc9f18dd6ae597defda9df5200bd2
-
SHA512
c1ddaafcd3b8623f446acec01afe763e765e3abf930fe258e6cb728f6c2f68c1cf3c966f12473267628c4d8613b74c68c5369e03a5bbbc3c9db4c0584da0fad1
-
SSDEEP
3072:TphxjSC0KVR9sr6NuO4pTMq5tWkLgQ3+jOJgg3gv/5f6XKk6+/F:Tp7jYKV8+Nhud5dLgDyggE5sKo
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SHELL = "explorer.exe, \"C:\\Users\\Admin\\AppData\\Local\\KB9175826\\KB9175826.exe\"" svchost.exe -
Modiloader family
-
ModiLoader Second Stage 24 IoCs
resource yara_rule behavioral21/memory/1076-5-0x0000000000400000-0x0000000000521000-memory.dmp modiloader_stage2 behavioral21/memory/1076-9-0x0000000000400000-0x0000000000521000-memory.dmp modiloader_stage2 behavioral21/memory/2408-18-0x0000000000EE0000-0x0000000001001000-memory.dmp modiloader_stage2 behavioral21/memory/2408-19-0x0000000000EE0000-0x0000000001001000-memory.dmp modiloader_stage2 behavioral21/memory/2408-17-0x0000000000EE0000-0x0000000001001000-memory.dmp modiloader_stage2 behavioral21/memory/2408-21-0x0000000000EE0000-0x0000000001001000-memory.dmp modiloader_stage2 behavioral21/memory/2408-26-0x0000000000EE0000-0x0000000001001000-memory.dmp modiloader_stage2 behavioral21/memory/2408-27-0x0000000000EE0000-0x0000000001001000-memory.dmp modiloader_stage2 behavioral21/memory/2408-28-0x0000000000EE0000-0x0000000001001000-memory.dmp modiloader_stage2 behavioral21/memory/2408-32-0x0000000000EE0000-0x0000000001001000-memory.dmp modiloader_stage2 behavioral21/memory/2408-37-0x0000000000EE0000-0x0000000001001000-memory.dmp modiloader_stage2 behavioral21/memory/2408-41-0x0000000000EE0000-0x0000000001001000-memory.dmp modiloader_stage2 behavioral21/memory/2408-45-0x0000000000EE0000-0x0000000001001000-memory.dmp modiloader_stage2 behavioral21/memory/2408-49-0x0000000000EE0000-0x0000000001001000-memory.dmp modiloader_stage2 behavioral21/memory/2408-55-0x0000000000EE0000-0x0000000001001000-memory.dmp modiloader_stage2 behavioral21/memory/2408-58-0x0000000000EE0000-0x0000000001001000-memory.dmp modiloader_stage2 behavioral21/memory/2408-112-0x0000000000EE0000-0x0000000001001000-memory.dmp modiloader_stage2 behavioral21/memory/2408-113-0x0000000000EE0000-0x0000000001001000-memory.dmp modiloader_stage2 behavioral21/memory/2408-114-0x0000000000EE0000-0x0000000001001000-memory.dmp modiloader_stage2 behavioral21/memory/2408-122-0x0000000000EE0000-0x0000000001001000-memory.dmp modiloader_stage2 behavioral21/memory/2408-125-0x0000000000EE0000-0x0000000001001000-memory.dmp modiloader_stage2 behavioral21/memory/2408-243-0x0000000000EE0000-0x0000000001001000-memory.dmp modiloader_stage2 behavioral21/memory/2408-245-0x0000000000EE0000-0x0000000001001000-memory.dmp modiloader_stage2 behavioral21/memory/2408-248-0x0000000000EE0000-0x0000000001001000-memory.dmp modiloader_stage2 -
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\KB9175826 = "\"C:\\Users\\Admin\\AppData\\Local\\KB9175826\\KB9175826.exe\"" svchost.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\KB9175826 = "\"C:\\Users\\Admin\\AppData\\Local\\KB9175826\\KB9175826.exe\"" svchost.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" svchost.exe -
Disables Task Manager via registry modification
-
Deletes itself 1 IoCs
pid Process 2408 svchost.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\KB9175826 = "\"C:\\Users\\Admin\\AppData\\Local\\KB9175826\\KB9175826.exe\"" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\KB9175826 = "\"C:\\Users\\Admin\\AppData\\Local\\KB9175826\\KB9175826.exe\"" svchost.exe -
resource yara_rule behavioral21/memory/1076-0-0x0000000000400000-0x0000000000521000-memory.dmp upx behavioral21/memory/1076-2-0x0000000000400000-0x0000000000521000-memory.dmp upx behavioral21/memory/1076-5-0x0000000000400000-0x0000000000521000-memory.dmp upx behavioral21/memory/1076-9-0x0000000000400000-0x0000000000521000-memory.dmp upx behavioral21/memory/2408-13-0x0000000000EE0000-0x0000000001001000-memory.dmp upx behavioral21/memory/2408-18-0x0000000000EE0000-0x0000000001001000-memory.dmp upx behavioral21/memory/2408-19-0x0000000000EE0000-0x0000000001001000-memory.dmp upx behavioral21/memory/2408-14-0x0000000000EE0000-0x0000000001001000-memory.dmp upx behavioral21/memory/2408-11-0x0000000000EE0000-0x0000000001001000-memory.dmp upx behavioral21/memory/2408-8-0x0000000000EE0000-0x0000000001001000-memory.dmp upx behavioral21/memory/2408-17-0x0000000000EE0000-0x0000000001001000-memory.dmp upx behavioral21/memory/2408-7-0x0000000000EE0000-0x0000000001001000-memory.dmp upx behavioral21/memory/2408-21-0x0000000000EE0000-0x0000000001001000-memory.dmp upx behavioral21/files/0x0009000000016a47-25.dat upx behavioral21/memory/2408-26-0x0000000000EE0000-0x0000000001001000-memory.dmp upx behavioral21/memory/2408-27-0x0000000000EE0000-0x0000000001001000-memory.dmp upx behavioral21/memory/2408-28-0x0000000000EE0000-0x0000000001001000-memory.dmp upx behavioral21/memory/2408-32-0x0000000000EE0000-0x0000000001001000-memory.dmp upx behavioral21/memory/2408-37-0x0000000000EE0000-0x0000000001001000-memory.dmp upx behavioral21/memory/2408-41-0x0000000000EE0000-0x0000000001001000-memory.dmp upx behavioral21/memory/2408-45-0x0000000000EE0000-0x0000000001001000-memory.dmp upx behavioral21/memory/2408-49-0x0000000000EE0000-0x0000000001001000-memory.dmp upx behavioral21/memory/2408-55-0x0000000000EE0000-0x0000000001001000-memory.dmp upx behavioral21/memory/2408-58-0x0000000000EE0000-0x0000000001001000-memory.dmp upx behavioral21/memory/2408-112-0x0000000000EE0000-0x0000000001001000-memory.dmp upx behavioral21/memory/2408-113-0x0000000000EE0000-0x0000000001001000-memory.dmp upx behavioral21/memory/2408-114-0x0000000000EE0000-0x0000000001001000-memory.dmp upx behavioral21/memory/2408-122-0x0000000000EE0000-0x0000000001001000-memory.dmp upx behavioral21/memory/2408-125-0x0000000000EE0000-0x0000000001001000-memory.dmp upx behavioral21/memory/2408-243-0x0000000000EE0000-0x0000000001001000-memory.dmp upx behavioral21/memory/2408-245-0x0000000000EE0000-0x0000000001001000-memory.dmp upx behavioral21/memory/2408-248-0x0000000000EE0000-0x0000000001001000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 19561b33793dcb865eae56575a899ce8_kovter_from_Sakura82_taskmanger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main svchost.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 1076 19561b33793dcb865eae56575a899ce8_kovter_from_Sakura82_taskmanger.exe 1076 19561b33793dcb865eae56575a899ce8_kovter_from_Sakura82_taskmanger.exe 1076 19561b33793dcb865eae56575a899ce8_kovter_from_Sakura82_taskmanger.exe 1076 19561b33793dcb865eae56575a899ce8_kovter_from_Sakura82_taskmanger.exe 1076 19561b33793dcb865eae56575a899ce8_kovter_from_Sakura82_taskmanger.exe 1076 19561b33793dcb865eae56575a899ce8_kovter_from_Sakura82_taskmanger.exe 1076 19561b33793dcb865eae56575a899ce8_kovter_from_Sakura82_taskmanger.exe 1076 19561b33793dcb865eae56575a899ce8_kovter_from_Sakura82_taskmanger.exe 1076 19561b33793dcb865eae56575a899ce8_kovter_from_Sakura82_taskmanger.exe 1076 19561b33793dcb865eae56575a899ce8_kovter_from_Sakura82_taskmanger.exe 1076 19561b33793dcb865eae56575a899ce8_kovter_from_Sakura82_taskmanger.exe 1076 19561b33793dcb865eae56575a899ce8_kovter_from_Sakura82_taskmanger.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1076 19561b33793dcb865eae56575a899ce8_kovter_from_Sakura82_taskmanger.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 2712 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2712 AUDIODG.EXE Token: 33 2712 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2712 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2408 svchost.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1076 wrote to memory of 2408 1076 19561b33793dcb865eae56575a899ce8_kovter_from_Sakura82_taskmanger.exe 30 PID 1076 wrote to memory of 2408 1076 19561b33793dcb865eae56575a899ce8_kovter_from_Sakura82_taskmanger.exe 30 PID 1076 wrote to memory of 2408 1076 19561b33793dcb865eae56575a899ce8_kovter_from_Sakura82_taskmanger.exe 30 PID 1076 wrote to memory of 2408 1076 19561b33793dcb865eae56575a899ce8_kovter_from_Sakura82_taskmanger.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\19561b33793dcb865eae56575a899ce8_kovter_from_Sakura82_taskmanger.exe"C:\Users\Admin\AppData\Local\Temp\19561b33793dcb865eae56575a899ce8_kovter_from_Sakura82_taskmanger.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Windows\SysWOW64\svchost.exepath<<C:\Users\Admin\AppData\Local\Temp\19561b33793dcb865eae56575a899ce8_kovter_from_Sakura82_taskmanger.exe>>path2⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Deletes itself
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2408
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4b01⤵
- Suspicious use of AdjustPrivilegeToken
PID:2712
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524c86959186c21d525f80fe4e0bc4b6a
SHA157f20ad834745bb54242b27cc71d3e015c2e0879
SHA25636def945b7060f4bc287595468790c8eba36eb506b7b9bb2d53d6bc0eb248172
SHA512c40c7f626522f7c836a033fb9b6bd200bd0bc14c1546ac9649d4e7a2f8e96d72703c3f22f19f8656bb05df1e7b72b95a74355ec46f8a734cbd52c8511ad8bf06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512868648da207468a927bedddcb972cd
SHA166d192a92a8486e6d074c6fddd26efef5fcf88e4
SHA25682abfd6e10c0d6f729607c574ecf98d2783dbfa953c22d4a99e41671695a3cbb
SHA51267baa4128ecbdfe9d9fb7578b26d9e0c1952b317e810035110224209907f3cf10fdc6dda9e1c288b3388313d65fda7b1e4c2639ffdccdf6b5320838391fcdc07
-
Filesize
119KB
MD519561b33793dcb865eae56575a899ce8
SHA1aeff444147fb35adbdf4faed6b5c4bd385b1d98c
SHA256d625fcec98e282032f550ba80f60de2603adc9f18dd6ae597defda9df5200bd2
SHA512c1ddaafcd3b8623f446acec01afe763e765e3abf930fe258e6cb728f6c2f68c1cf3c966f12473267628c4d8613b74c68c5369e03a5bbbc3c9db4c0584da0fad1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b