Analysis
-
max time kernel
141s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
27/11/2024, 12:44
Static task
static1
Behavioral task
behavioral1
Sample
7f0fe0f164eb1473d719006b2b09c40b0e05aa0732331d90f9fd24dcab3a7058.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
7f0fe0f164eb1473d719006b2b09c40b0e05aa0732331d90f9fd24dcab3a7058.exe
Resource
win10v2004-20241007-en
General
-
Target
7f0fe0f164eb1473d719006b2b09c40b0e05aa0732331d90f9fd24dcab3a7058.exe
-
Size
348KB
-
MD5
03527c142799c1d689556b147c3437b2
-
SHA1
5f324fd0cd5f95356e24da4ab4a90b71196113c5
-
SHA256
7f0fe0f164eb1473d719006b2b09c40b0e05aa0732331d90f9fd24dcab3a7058
-
SHA512
3258cda3283f9a9b7186be67ae393bd26c12586f538f2b9b729247745fc969a49a4e02e84065d936fee190882d574b2a1f11bac0bbb80b98ab5c92c2d53b1a65
-
SSDEEP
6144:VFjL41SWW+Yta+ySQ+GyoCZUdzlEOVciyGCE+riGDAGxZKcJv6Msx/BGbFt:VFjs1SWpY/ySBVoCmdzlEqciy+yiGhZ5
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe \"C:\\Windows\\server.exe\"" server.exe -
Modiloader family
-
ModiLoader Second Stage 11 IoCs
resource yara_rule behavioral1/memory/3044-46-0x0000000000400000-0x000000000042C000-memory.dmp modiloader_stage2 behavioral1/memory/3044-47-0x0000000000400000-0x000000000042C000-memory.dmp modiloader_stage2 behavioral1/memory/3044-45-0x0000000000400000-0x000000000042C000-memory.dmp modiloader_stage2 behavioral1/memory/3044-42-0x0000000000400000-0x000000000042C000-memory.dmp modiloader_stage2 behavioral1/memory/3044-38-0x0000000000400000-0x000000000042C000-memory.dmp modiloader_stage2 behavioral1/memory/3044-36-0x0000000000400000-0x000000000042C000-memory.dmp modiloader_stage2 behavioral1/memory/3044-34-0x0000000000400000-0x000000000042C000-memory.dmp modiloader_stage2 behavioral1/memory/3044-32-0x0000000000400000-0x000000000042C000-memory.dmp modiloader_stage2 behavioral1/memory/3044-56-0x0000000000400000-0x000000000042C000-memory.dmp modiloader_stage2 behavioral1/memory/628-85-0x0000000000400000-0x000000000042C000-memory.dmp modiloader_stage2 behavioral1/memory/628-93-0x0000000000400000-0x000000000042C000-memory.dmp modiloader_stage2 -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{05I41M56-QW07-U20F-YX8T-VB4U6TP4UX63} server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{05I41M56-QW07-U20F-YX8T-VB4U6TP4UX63}\StubPath = "\"C:\\Windows\\server.exe\"" server.exe -
Deletes itself 1 IoCs
pid Process 3068 cmd.exe -
Executes dropped EXE 5 IoCs
pid Process 2192 fff2.exe 3036 J3qbFH8P8.exe 3044 J3qbFH8P8.exe 2064 server.exe 628 server.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\server = "C:\\Windows\\server.exe" server.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3036 set thread context of 3044 3036 J3qbFH8P8.exe 34 PID 2064 set thread context of 628 2064 server.exe 36 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\server.exe J3qbFH8P8.exe File opened for modification C:\Windows\server.exe J3qbFH8P8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language J3qbFH8P8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7f0fe0f164eb1473d719006b2b09c40b0e05aa0732331d90f9fd24dcab3a7058.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fff2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language J3qbFH8P8.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3044 J3qbFH8P8.exe 628 server.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2192 fff2.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3012 7f0fe0f164eb1473d719006b2b09c40b0e05aa0732331d90f9fd24dcab3a7058.exe 3036 J3qbFH8P8.exe 2064 server.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2192 3012 7f0fe0f164eb1473d719006b2b09c40b0e05aa0732331d90f9fd24dcab3a7058.exe 30 PID 3012 wrote to memory of 2192 3012 7f0fe0f164eb1473d719006b2b09c40b0e05aa0732331d90f9fd24dcab3a7058.exe 30 PID 3012 wrote to memory of 2192 3012 7f0fe0f164eb1473d719006b2b09c40b0e05aa0732331d90f9fd24dcab3a7058.exe 30 PID 3012 wrote to memory of 2192 3012 7f0fe0f164eb1473d719006b2b09c40b0e05aa0732331d90f9fd24dcab3a7058.exe 30 PID 3012 wrote to memory of 3036 3012 7f0fe0f164eb1473d719006b2b09c40b0e05aa0732331d90f9fd24dcab3a7058.exe 31 PID 3012 wrote to memory of 3036 3012 7f0fe0f164eb1473d719006b2b09c40b0e05aa0732331d90f9fd24dcab3a7058.exe 31 PID 3012 wrote to memory of 3036 3012 7f0fe0f164eb1473d719006b2b09c40b0e05aa0732331d90f9fd24dcab3a7058.exe 31 PID 3012 wrote to memory of 3036 3012 7f0fe0f164eb1473d719006b2b09c40b0e05aa0732331d90f9fd24dcab3a7058.exe 31 PID 3012 wrote to memory of 3068 3012 7f0fe0f164eb1473d719006b2b09c40b0e05aa0732331d90f9fd24dcab3a7058.exe 32 PID 3012 wrote to memory of 3068 3012 7f0fe0f164eb1473d719006b2b09c40b0e05aa0732331d90f9fd24dcab3a7058.exe 32 PID 3012 wrote to memory of 3068 3012 7f0fe0f164eb1473d719006b2b09c40b0e05aa0732331d90f9fd24dcab3a7058.exe 32 PID 3012 wrote to memory of 3068 3012 7f0fe0f164eb1473d719006b2b09c40b0e05aa0732331d90f9fd24dcab3a7058.exe 32 PID 3036 wrote to memory of 3044 3036 J3qbFH8P8.exe 34 PID 3036 wrote to memory of 3044 3036 J3qbFH8P8.exe 34 PID 3036 wrote to memory of 3044 3036 J3qbFH8P8.exe 34 PID 3036 wrote to memory of 3044 3036 J3qbFH8P8.exe 34 PID 3036 wrote to memory of 3044 3036 J3qbFH8P8.exe 34 PID 3036 wrote to memory of 3044 3036 J3qbFH8P8.exe 34 PID 3036 wrote to memory of 3044 3036 J3qbFH8P8.exe 34 PID 3036 wrote to memory of 3044 3036 J3qbFH8P8.exe 34 PID 3036 wrote to memory of 3044 3036 J3qbFH8P8.exe 34 PID 3036 wrote to memory of 3044 3036 J3qbFH8P8.exe 34 PID 3036 wrote to memory of 3044 3036 J3qbFH8P8.exe 34 PID 3044 wrote to memory of 2064 3044 J3qbFH8P8.exe 35 PID 3044 wrote to memory of 2064 3044 J3qbFH8P8.exe 35 PID 3044 wrote to memory of 2064 3044 J3qbFH8P8.exe 35 PID 3044 wrote to memory of 2064 3044 J3qbFH8P8.exe 35 PID 2064 wrote to memory of 628 2064 server.exe 36 PID 2064 wrote to memory of 628 2064 server.exe 36 PID 2064 wrote to memory of 628 2064 server.exe 36 PID 2064 wrote to memory of 628 2064 server.exe 36 PID 2064 wrote to memory of 628 2064 server.exe 36 PID 2064 wrote to memory of 628 2064 server.exe 36 PID 2064 wrote to memory of 628 2064 server.exe 36 PID 2064 wrote to memory of 628 2064 server.exe 36 PID 2064 wrote to memory of 628 2064 server.exe 36 PID 2064 wrote to memory of 628 2064 server.exe 36 PID 2064 wrote to memory of 628 2064 server.exe 36 PID 2064 wrote to memory of 1472 2064 server.exe 37 PID 2064 wrote to memory of 1472 2064 server.exe 37 PID 2064 wrote to memory of 1472 2064 server.exe 37 PID 2064 wrote to memory of 1472 2064 server.exe 37 PID 628 wrote to memory of 892 628 server.exe 39 PID 628 wrote to memory of 892 628 server.exe 39 PID 628 wrote to memory of 892 628 server.exe 39 PID 628 wrote to memory of 892 628 server.exe 39 PID 628 wrote to memory of 892 628 server.exe 39 PID 628 wrote to memory of 892 628 server.exe 39 PID 628 wrote to memory of 892 628 server.exe 39 PID 628 wrote to memory of 892 628 server.exe 39 PID 628 wrote to memory of 892 628 server.exe 39 PID 628 wrote to memory of 892 628 server.exe 39 PID 628 wrote to memory of 892 628 server.exe 39 PID 628 wrote to memory of 892 628 server.exe 39 PID 628 wrote to memory of 892 628 server.exe 39 PID 628 wrote to memory of 892 628 server.exe 39 PID 628 wrote to memory of 892 628 server.exe 39 PID 628 wrote to memory of 892 628 server.exe 39 PID 628 wrote to memory of 892 628 server.exe 39 PID 628 wrote to memory of 892 628 server.exe 39 PID 628 wrote to memory of 892 628 server.exe 39 PID 628 wrote to memory of 892 628 server.exe 39 PID 628 wrote to memory of 892 628 server.exe 39 PID 628 wrote to memory of 892 628 server.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\7f0fe0f164eb1473d719006b2b09c40b0e05aa0732331d90f9fd24dcab3a7058.exe"C:\Users\Admin\AppData\Local\Temp\7f0fe0f164eb1473d719006b2b09c40b0e05aa0732331d90f9fd24dcab3a7058.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\fff2.exe"C:\fff2.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2192
-
-
C:\J3qbFH8P8.exe"C:\J3qbFH8P8.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\J3qbFH8P8.exe"C:\J3qbFH8P8.exe"3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\server.exe"C:\Windows\server.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\server.exe"C:\Windows\server.exe"5⤵
- Modifies WinLogon for persistence
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵PID:892
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c \melt.bat5⤵
- System Location Discovery: System Language Discovery
PID:1472
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c \melt.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:3068
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
220KB
MD5144dec755361311d15dce9b03d368d01
SHA14d331cb6d916d997ee0d14faa1ae8dded71b02c8
SHA25698e284e33c2b8aaa654fe78b5586dbfd10c45b694415c9fe7718feeab4f4ca25
SHA512d2fa423ca1dd8c6dac906ba640812686d6260120870b5878dcce00ef0d67229872eb6104d1e8caf043d9d8a38d28699c2b491d271f1d16839d631f9102130993
-
Filesize
54KB
MD5116d27fdf50ebecaada14096812dbf90
SHA15af91f4129b2e38f8decd50c8b0cc5d09c042bf1
SHA2563ed5f41bad3acaf3eb8507d61b70c75c84e18febe06ebd482f3c366edcec394c
SHA512e98eb844f4ddf74cccab1a14ea1a03accc3c2e0daa02aeb32d4718dbbb547ba80dbcd0d8469aed4d0f4fbb6949ddfe5e70fff099651d69d9fe8d2047b54b7c2a
-
Filesize
285B
MD5e63b0429ec82e1d058e932faf1cac2c6
SHA1299ea3d6a563ec1587f543c207e2589ccc2b73d0
SHA256cdfde3a16ee2c04597ef67bc2fe72724aa6e0f5b2e63c815165d487624bfad54
SHA5126e46493fd36a641e88140e1644ba9e2653dfab20c162aaaacc18422dd321c24b3e01dbdc4b3a447cdcf6b5b337af4d43212aa655732bfbe8f8a019ac682dad54
-
Filesize
123B
MD558a67e1781a193dcf2f9f0685426380d
SHA18ce90e1df11d529112abb400b930dcfc73d78fce
SHA256229cfb10926e706af01042a8348a9a910cfad0cb0aa9bc20c65e8dec0f006136
SHA512598349435ac6abe93fab69891f33a7cb2c1d47184398c867eed8b057ee9b045e20865e79a839762f465a27c05efdd21d30caa1dc262c03321804513eef66e05a