Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2024, 12:44
Static task
static1
Behavioral task
behavioral1
Sample
7f0fe0f164eb1473d719006b2b09c40b0e05aa0732331d90f9fd24dcab3a7058.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
7f0fe0f164eb1473d719006b2b09c40b0e05aa0732331d90f9fd24dcab3a7058.exe
Resource
win10v2004-20241007-en
General
-
Target
7f0fe0f164eb1473d719006b2b09c40b0e05aa0732331d90f9fd24dcab3a7058.exe
-
Size
348KB
-
MD5
03527c142799c1d689556b147c3437b2
-
SHA1
5f324fd0cd5f95356e24da4ab4a90b71196113c5
-
SHA256
7f0fe0f164eb1473d719006b2b09c40b0e05aa0732331d90f9fd24dcab3a7058
-
SHA512
3258cda3283f9a9b7186be67ae393bd26c12586f538f2b9b729247745fc969a49a4e02e84065d936fee190882d574b2a1f11bac0bbb80b98ab5c92c2d53b1a65
-
SSDEEP
6144:VFjL41SWW+Yta+ySQ+GyoCZUdzlEOVciyGCE+riGDAGxZKcJv6Msx/BGbFt:VFjs1SWpY/ySBVoCmdzlEqciy+yiGhZ5
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe \"C:\\Windows\\server.exe\"" server.exe -
Modiloader family
-
ModiLoader Second Stage 7 IoCs
resource yara_rule behavioral2/memory/824-35-0x0000000000400000-0x000000000042C000-memory.dmp modiloader_stage2 behavioral2/memory/824-36-0x0000000000400000-0x000000000042C000-memory.dmp modiloader_stage2 behavioral2/memory/824-34-0x0000000000400000-0x000000000042C000-memory.dmp modiloader_stage2 behavioral2/memory/824-29-0x0000000000400000-0x000000000042C000-memory.dmp modiloader_stage2 behavioral2/memory/824-47-0x0000000000400000-0x000000000042C000-memory.dmp modiloader_stage2 behavioral2/memory/1300-59-0x0000000000400000-0x000000000042C000-memory.dmp modiloader_stage2 behavioral2/memory/1300-67-0x0000000000400000-0x000000000042C000-memory.dmp modiloader_stage2 -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{05I41M56-QW07-U20F-YX8T-VB4U6TP4UX63} server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{05I41M56-QW07-U20F-YX8T-VB4U6TP4UX63}\StubPath = "\"C:\\Windows\\server.exe\"" server.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7f0fe0f164eb1473d719006b2b09c40b0e05aa0732331d90f9fd24dcab3a7058.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation J3qbFH8P8.exe -
Executes dropped EXE 5 IoCs
pid Process 1692 fff2.exe 356 J3qbFH8P8.exe 824 J3qbFH8P8.exe 1504 server.exe 1300 server.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\server = "C:\\Windows\\server.exe" server.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 356 set thread context of 824 356 J3qbFH8P8.exe 86 PID 1504 set thread context of 1300 1504 server.exe 90 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\server.exe J3qbFH8P8.exe File opened for modification C:\Windows\server.exe J3qbFH8P8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fff2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language J3qbFH8P8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7f0fe0f164eb1473d719006b2b09c40b0e05aa0732331d90f9fd24dcab3a7058.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language J3qbFH8P8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 824 J3qbFH8P8.exe 824 J3qbFH8P8.exe 1300 server.exe 1300 server.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1752 7f0fe0f164eb1473d719006b2b09c40b0e05aa0732331d90f9fd24dcab3a7058.exe 356 J3qbFH8P8.exe 1504 server.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1752 wrote to memory of 1692 1752 7f0fe0f164eb1473d719006b2b09c40b0e05aa0732331d90f9fd24dcab3a7058.exe 82 PID 1752 wrote to memory of 1692 1752 7f0fe0f164eb1473d719006b2b09c40b0e05aa0732331d90f9fd24dcab3a7058.exe 82 PID 1752 wrote to memory of 1692 1752 7f0fe0f164eb1473d719006b2b09c40b0e05aa0732331d90f9fd24dcab3a7058.exe 82 PID 1752 wrote to memory of 356 1752 7f0fe0f164eb1473d719006b2b09c40b0e05aa0732331d90f9fd24dcab3a7058.exe 83 PID 1752 wrote to memory of 356 1752 7f0fe0f164eb1473d719006b2b09c40b0e05aa0732331d90f9fd24dcab3a7058.exe 83 PID 1752 wrote to memory of 356 1752 7f0fe0f164eb1473d719006b2b09c40b0e05aa0732331d90f9fd24dcab3a7058.exe 83 PID 1752 wrote to memory of 2532 1752 7f0fe0f164eb1473d719006b2b09c40b0e05aa0732331d90f9fd24dcab3a7058.exe 84 PID 1752 wrote to memory of 2532 1752 7f0fe0f164eb1473d719006b2b09c40b0e05aa0732331d90f9fd24dcab3a7058.exe 84 PID 1752 wrote to memory of 2532 1752 7f0fe0f164eb1473d719006b2b09c40b0e05aa0732331d90f9fd24dcab3a7058.exe 84 PID 356 wrote to memory of 824 356 J3qbFH8P8.exe 86 PID 356 wrote to memory of 824 356 J3qbFH8P8.exe 86 PID 356 wrote to memory of 824 356 J3qbFH8P8.exe 86 PID 356 wrote to memory of 824 356 J3qbFH8P8.exe 86 PID 356 wrote to memory of 824 356 J3qbFH8P8.exe 86 PID 356 wrote to memory of 824 356 J3qbFH8P8.exe 86 PID 356 wrote to memory of 824 356 J3qbFH8P8.exe 86 PID 356 wrote to memory of 824 356 J3qbFH8P8.exe 86 PID 356 wrote to memory of 824 356 J3qbFH8P8.exe 86 PID 356 wrote to memory of 824 356 J3qbFH8P8.exe 86 PID 356 wrote to memory of 824 356 J3qbFH8P8.exe 86 PID 356 wrote to memory of 824 356 J3qbFH8P8.exe 86 PID 356 wrote to memory of 824 356 J3qbFH8P8.exe 86 PID 356 wrote to memory of 3936 356 J3qbFH8P8.exe 87 PID 356 wrote to memory of 3936 356 J3qbFH8P8.exe 87 PID 356 wrote to memory of 3936 356 J3qbFH8P8.exe 87 PID 824 wrote to memory of 1504 824 J3qbFH8P8.exe 89 PID 824 wrote to memory of 1504 824 J3qbFH8P8.exe 89 PID 824 wrote to memory of 1504 824 J3qbFH8P8.exe 89 PID 1504 wrote to memory of 1300 1504 server.exe 90 PID 1504 wrote to memory of 1300 1504 server.exe 90 PID 1504 wrote to memory of 1300 1504 server.exe 90 PID 1504 wrote to memory of 1300 1504 server.exe 90 PID 1504 wrote to memory of 1300 1504 server.exe 90 PID 1504 wrote to memory of 1300 1504 server.exe 90 PID 1504 wrote to memory of 1300 1504 server.exe 90 PID 1504 wrote to memory of 1300 1504 server.exe 90 PID 1504 wrote to memory of 1300 1504 server.exe 90 PID 1504 wrote to memory of 1300 1504 server.exe 90 PID 1504 wrote to memory of 1300 1504 server.exe 90 PID 1504 wrote to memory of 1300 1504 server.exe 90 PID 1504 wrote to memory of 1300 1504 server.exe 90 PID 1504 wrote to memory of 524 1504 server.exe 91 PID 1504 wrote to memory of 524 1504 server.exe 91 PID 1504 wrote to memory of 524 1504 server.exe 91 PID 1300 wrote to memory of 2480 1300 server.exe 97 PID 1300 wrote to memory of 2480 1300 server.exe 97 PID 1300 wrote to memory of 2480 1300 server.exe 97 PID 1300 wrote to memory of 2480 1300 server.exe 97 PID 1300 wrote to memory of 2480 1300 server.exe 97 PID 1300 wrote to memory of 2480 1300 server.exe 97 PID 1300 wrote to memory of 2480 1300 server.exe 97 PID 1300 wrote to memory of 2480 1300 server.exe 97 PID 1300 wrote to memory of 2480 1300 server.exe 97 PID 1300 wrote to memory of 2480 1300 server.exe 97 PID 1300 wrote to memory of 2480 1300 server.exe 97 PID 1300 wrote to memory of 2480 1300 server.exe 97 PID 1300 wrote to memory of 2480 1300 server.exe 97 PID 1300 wrote to memory of 2480 1300 server.exe 97 PID 1300 wrote to memory of 2480 1300 server.exe 97 PID 1300 wrote to memory of 2480 1300 server.exe 97 PID 1300 wrote to memory of 2480 1300 server.exe 97 PID 1300 wrote to memory of 2480 1300 server.exe 97 PID 1300 wrote to memory of 2480 1300 server.exe 97 PID 1300 wrote to memory of 2480 1300 server.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\7f0fe0f164eb1473d719006b2b09c40b0e05aa0732331d90f9fd24dcab3a7058.exe"C:\Users\Admin\AppData\Local\Temp\7f0fe0f164eb1473d719006b2b09c40b0e05aa0732331d90f9fd24dcab3a7058.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\fff2.exe"C:\fff2.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1692
-
-
C:\J3qbFH8P8.exe"C:\J3qbFH8P8.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:356 -
C:\J3qbFH8P8.exe"C:\J3qbFH8P8.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Windows\server.exe"C:\Windows\server.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\server.exe"C:\Windows\server.exe"5⤵
- Modifies WinLogon for persistence
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵PID:2480
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c \melt.bat5⤵
- System Location Discovery: System Language Discovery
PID:524
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c \melt.bat3⤵
- System Location Discovery: System Language Discovery
PID:3936
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c \melt.bat2⤵
- System Location Discovery: System Language Discovery
PID:2532
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
220KB
MD5144dec755361311d15dce9b03d368d01
SHA14d331cb6d916d997ee0d14faa1ae8dded71b02c8
SHA25698e284e33c2b8aaa654fe78b5586dbfd10c45b694415c9fe7718feeab4f4ca25
SHA512d2fa423ca1dd8c6dac906ba640812686d6260120870b5878dcce00ef0d67229872eb6104d1e8caf043d9d8a38d28699c2b491d271f1d16839d631f9102130993
-
Filesize
54KB
MD5116d27fdf50ebecaada14096812dbf90
SHA15af91f4129b2e38f8decd50c8b0cc5d09c042bf1
SHA2563ed5f41bad3acaf3eb8507d61b70c75c84e18febe06ebd482f3c366edcec394c
SHA512e98eb844f4ddf74cccab1a14ea1a03accc3c2e0daa02aeb32d4718dbbb547ba80dbcd0d8469aed4d0f4fbb6949ddfe5e70fff099651d69d9fe8d2047b54b7c2a
-
Filesize
285B
MD585c3f59f17f0819c45bdc2d0193bc696
SHA177c709b2033b1f0f1f610519e24c6819117cf8b0
SHA256c2d2d4476ab1364d9b7279f0083800d19484c9c66a0ffbc5da53412746603bfb
SHA512e7c8fcab7f8c9ca567893921cf61f2f91d43000ec92720a067e7fffc34051dcbf6194d4275430d2d4e650b573d28506b6e9d7477abb2103c94556c10fbf2a159
-
Filesize
285B
MD54c3c12d14617f79a9d00776dd554804c
SHA163db6c3db46ab22cad450c104165b005b6ba8c2c
SHA256a3e84610342e17029856b94f294cc95ccdb77e392c7c70e228fda1c88397964c
SHA512b957c3b1a8f444c30b8b9b40511f3e9f88226b36426367e99480dac470e01d553c067570bfadf2ab0fc8a09e0bbe5279fc6cd9fe8d360299dadd789949809f9a