Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/11/2024, 02:54

General

  • Target

    6650a769ac035e23964c16c27df892d7725f415dee92582a4c7b4ceeef7345b2.cmd

  • Size

    3.7MB

  • MD5

    ebdec3ea8aada5aae98146f1b61a13ed

  • SHA1

    9ed537ca66a14b296010eccdde716b1b1a629fe2

  • SHA256

    6650a769ac035e23964c16c27df892d7725f415dee92582a4c7b4ceeef7345b2

  • SHA512

    c733cb6cf2754bf58ed5729357307dfb311c2e571b273c199a079d0ef96526a23fa8b0e235dc4ff07f77af61f94d32bb26561eb2b4affcd5b71c0c0c649a471e

  • SSDEEP

    49152:bWnHE/6TEgA8/WHmZI3Oqz0oXp2jrCbM799GY:2

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 61 IoCs
  • Executes dropped EXE 12 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 44 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3556
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6650a769ac035e23964c16c27df892d7725f415dee92582a4c7b4ceeef7345b2.cmd"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4460
      • C:\Windows\System32\extrac32.exe
        C:\\Windows\\System32\\extrac32 /C /Y C:\\Windows\\System32\\cmd.exe "C:\\Users\\Public\\alpha.exe"
        3⤵
          PID:1836
        • C:\Users\Public\alpha.exe
          C:\\Users\\Public\\alpha /c extrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:3792
          • C:\Windows\system32\extrac32.exe
            extrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe
            4⤵
              PID:3144
          • C:\Users\Public\alpha.exe
            C:\\Users\\Public\\alpha /c C:\\Users\\Public\\kn -decodehex -F "C:\Users\Admin\AppData\Local\Temp\6650a769ac035e23964c16c27df892d7725f415dee92582a4c7b4ceeef7345b2.cmd" "C:\\Users\\Public\\AnyDesk.jpeg" 9
            3⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:4876
            • C:\Users\Public\kn.exe
              C:\\Users\\Public\\kn -decodehex -F "C:\Users\Admin\AppData\Local\Temp\6650a769ac035e23964c16c27df892d7725f415dee92582a4c7b4ceeef7345b2.cmd" "C:\\Users\\Public\\AnyDesk.jpeg" 9
              4⤵
              • Executes dropped EXE
              PID:3060
          • C:\Users\Public\alpha.exe
            C:\\Users\\Public\\alpha /c C:\\Users\\Public\\kn -decodehex -F "C:\\Users\\Public\\AnyDesk.jpeg" "C:\\Users\\Public\\Libraries\\AnyDesk.PIF" 12
            3⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:1048
            • C:\Users\Public\kn.exe
              C:\\Users\\Public\\kn -decodehex -F "C:\\Users\\Public\\AnyDesk.jpeg" "C:\\Users\\Public\\Libraries\\AnyDesk.PIF" 12
              4⤵
              • Executes dropped EXE
              PID:1936
          • C:\Users\Public\Libraries\AnyDesk.PIF
            C:\Users\Public\Libraries\AnyDesk.PIF
            3⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:3472
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Libraries\aoikokpI.cmd" "
              4⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:1600
              • C:\Windows\SysWOW64\esentutl.exe
                C:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\cmd.exe /d C:\\Users\\Public\\alpha.pif /o
                5⤵
                  PID:2136
                • C:\Windows\SysWOW64\esentutl.exe
                  C:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\ping.exe /d C:\\Users\\Public\\xpha.pif /o
                  5⤵
                  • System Network Configuration Discovery: Internet Connection Discovery
                  PID:3060
                • C:\Users\Public\alpha.pif
                  C:\\Users\\Public\\alpha.pif /c mkdir "\\?\C:\Windows "
                  5⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:848
                • C:\Users\Public\alpha.pif
                  C:\\Users\\Public\\alpha.pif /c mkdir "\\?\C:\Windows \SysWOW64"
                  5⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:4956
                • C:\Users\Public\alpha.pif
                  C:\\Users\\Public\\alpha.pif /c C:\\Users\\Public\\xpha.pif 127.0.0.1 -n 10
                  5⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:3188
                  • C:\Users\Public\xpha.pif
                    C:\\Users\\Public\\xpha.pif 127.0.0.1 -n 10
                    6⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    PID:4372
              • C:\Windows\SysWOW64\SndVol.exe
                C:\Windows\System32\SndVol.exe
                4⤵
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious behavior: MapViewOfSection
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                PID:3060
            • C:\Users\Public\alpha.exe
              C:\\Users\\Public\\alpha /c del /q "C:\Users\Public\kn.exe" / A / F / Q / S
              3⤵
              • Executes dropped EXE
              PID:4888
            • C:\Users\Public\alpha.exe
              C:\\Users\\Public\\alpha /c del /q "C:\Users\Public\AnyDesk.jpeg" / A / F / Q / S
              3⤵
              • Executes dropped EXE
              PID:848
          • C:\Windows\SysWOW64\mstsc.exe
            "C:\Windows\SysWOW64\mstsc.exe"
            2⤵
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4112
            • C:\Windows\SysWOW64\cmd.exe
              /c del "C:\Windows\SysWOW64\SndVol.exe"
              3⤵
              • System Location Discovery: System Language Discovery
              PID:5044

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Public\AnyDesk.jpeg

          Filesize

          2.7MB

          MD5

          5701d503c293645679d856d0c494b94e

          SHA1

          71d664ad536d21adedfb84b3f9a16fc89165c1e5

          SHA256

          ce18404f625bf524666db80e18e715dd93c20ffb33508adfc0fe2dc1b9160d3c

          SHA512

          2805ab3b2cae50847d9d0e77ccc92fb8f819c8d1bfad2abf61bb5f442ad3f77c448c1669c3addddcd201148e8b5303093f853d1bc9c076727fa739d3a8154443

        • C:\Users\Public\Libraries\AnyDesk.PIF

          Filesize

          1.3MB

          MD5

          a8af2d572217e48eeebdf7dd135f90cd

          SHA1

          79130f4d66f04c8b6cf6d88307039478060da9e9

          SHA256

          5687ad48c8b8268f79cb520b632175beadd8cdf7b6e6431a636a518774d47faa

          SHA512

          3385579e987e19dac4a069510ab9204ecb98c6655d86680668eee05bcc4901809d9d3f5a30d0a4522dde45288dae1f2110988010389a4597ff4b623e5665c596

        • C:\Users\Public\Libraries\aoikokpI.cmd

          Filesize

          60KB

          MD5

          b87f096cbc25570329e2bb59fee57580

          SHA1

          d281d1bf37b4fb46f90973afc65eece3908532b2

          SHA256

          d08ccc9b1e3acc205fe754bad8416964e9711815e9ceed5e6af73d8e9035ec9e

          SHA512

          72901adde38f50cf6d74743c0a546c0fea8b1cd4a18449048a0758a7593a176fc33aad1ebfd955775eefc2b30532bcc18e4f2964b3731b668dd87d94405951f7

        • C:\Users\Public\alpha.exe

          Filesize

          283KB

          MD5

          8a2122e8162dbef04694b9c3e0b6cdee

          SHA1

          f1efb0fddc156e4c61c5f78a54700e4e7984d55d

          SHA256

          b99d61d874728edc0918ca0eb10eab93d381e7367e377406e65963366c874450

          SHA512

          99e784141193275d4364ba1b8762b07cc150ca3cb7e9aa1d4386ba1fa87e073d0500e61572f8d1b071f2faa2a51bb123e12d9d07054b59a1a2fd768ad9f24397

        • C:\Users\Public\alpha.pif

          Filesize

          231KB

          MD5

          d0fce3afa6aa1d58ce9fa336cc2b675b

          SHA1

          4048488de6ba4bfef9edf103755519f1f762668f

          SHA256

          4d89fc34d5f0f9babd022271c585a9477bf41e834e46b991deaa0530fdb25e22

          SHA512

          80e127ef81752cd50f9ea2d662dc4d3bf8db8d29680e75fa5fc406ca22cafa5c4d89ef2eac65b486413d3cdd57a2c12a1cb75f65d1e312a717d262265736d1c2

        • C:\Users\Public\kn.exe

          Filesize

          1.6MB

          MD5

          bd8d9943a9b1def98eb83e0fa48796c2

          SHA1

          70e89852f023ab7cde0173eda1208dbb580f1e4f

          SHA256

          8de7b4eb1301d6cbe4ea2c8d13b83280453eb64e3b3c80756bbd1560d65ca4d2

          SHA512

          95630fdddad5db60cc97ec76ee1ca02dbb00ee3de7d6957ecda8968570e067ab2a9df1cc07a3ce61161a994acbe8417c83661320b54d04609818009a82552f7b

        • C:\Users\Public\xpha.pif

          Filesize

          18KB

          MD5

          b3624dd758ccecf93a1226cef252ca12

          SHA1

          fcf4dad8c4ad101504b1bf47cbbddbac36b558a7

          SHA256

          4aaa74f294c15aeb37ada8185d0dead58bd87276a01a814abc0c4b40545bf2ef

          SHA512

          c613d18511b00fa25fc7b1bdde10d96debb42a99b5aaab9e9826538d0e229085bb371f0197f6b1086c4f9c605f01e71287ffc5442f701a95d67c232a5f031838

        • memory/3472-67-0x0000000002B20000-0x0000000003B20000-memory.dmp

          Filesize

          16.0MB

        • memory/3472-56-0x0000000002B20000-0x0000000003B20000-memory.dmp

          Filesize

          16.0MB

        • memory/3472-35-0x0000000002B20000-0x0000000003B20000-memory.dmp

          Filesize

          16.0MB

        • memory/3472-42-0x0000000002B20000-0x0000000003B20000-memory.dmp

          Filesize

          16.0MB

        • memory/3472-59-0x0000000002B20000-0x0000000003B20000-memory.dmp

          Filesize

          16.0MB

        • memory/3472-92-0x0000000002B20000-0x0000000003B20000-memory.dmp

          Filesize

          16.0MB

        • memory/3472-91-0x0000000002B20000-0x0000000003B20000-memory.dmp

          Filesize

          16.0MB

        • memory/3472-90-0x0000000002B20000-0x0000000003B20000-memory.dmp

          Filesize

          16.0MB

        • memory/3472-89-0x0000000002B20000-0x0000000003B20000-memory.dmp

          Filesize

          16.0MB

        • memory/3472-87-0x0000000002B20000-0x0000000003B20000-memory.dmp

          Filesize

          16.0MB

        • memory/3472-86-0x0000000002B20000-0x0000000003B20000-memory.dmp

          Filesize

          16.0MB

        • memory/3472-85-0x0000000002B20000-0x0000000003B20000-memory.dmp

          Filesize

          16.0MB

        • memory/3472-84-0x0000000002B20000-0x0000000003B20000-memory.dmp

          Filesize

          16.0MB

        • memory/3472-83-0x0000000002B20000-0x0000000003B20000-memory.dmp

          Filesize

          16.0MB

        • memory/3472-82-0x0000000002B20000-0x0000000003B20000-memory.dmp

          Filesize

          16.0MB

        • memory/3472-62-0x0000000002B20000-0x0000000003B20000-memory.dmp

          Filesize

          16.0MB

        • memory/3472-80-0x0000000002B20000-0x0000000003B20000-memory.dmp

          Filesize

          16.0MB

        • memory/3472-79-0x0000000002B20000-0x0000000003B20000-memory.dmp

          Filesize

          16.0MB

        • memory/3472-78-0x0000000002B20000-0x0000000003B20000-memory.dmp

          Filesize

          16.0MB

        • memory/3472-77-0x0000000002B20000-0x0000000003B20000-memory.dmp

          Filesize

          16.0MB

        • memory/3472-76-0x0000000002B20000-0x0000000003B20000-memory.dmp

          Filesize

          16.0MB

        • memory/3472-75-0x0000000002B20000-0x0000000003B20000-memory.dmp

          Filesize

          16.0MB

        • memory/3472-74-0x0000000002B20000-0x0000000003B20000-memory.dmp

          Filesize

          16.0MB

        • memory/3472-73-0x0000000002B20000-0x0000000003B20000-memory.dmp

          Filesize

          16.0MB

        • memory/3472-72-0x0000000002B20000-0x0000000003B20000-memory.dmp

          Filesize

          16.0MB

        • memory/3472-70-0x0000000002B20000-0x0000000003B20000-memory.dmp

          Filesize

          16.0MB

        • memory/3472-68-0x0000000002B20000-0x0000000003B20000-memory.dmp

          Filesize

          16.0MB

        • memory/3472-28-0x0000000002B20000-0x0000000003B20000-memory.dmp

          Filesize

          16.0MB

        • memory/3472-66-0x0000000002B20000-0x0000000003B20000-memory.dmp

          Filesize

          16.0MB

        • memory/3472-65-0x0000000002B20000-0x0000000003B20000-memory.dmp

          Filesize

          16.0MB

        • memory/3472-27-0x0000000002B20000-0x0000000003B20000-memory.dmp

          Filesize

          16.0MB

        • memory/3472-64-0x0000000002B20000-0x0000000003B20000-memory.dmp

          Filesize

          16.0MB

        • memory/3472-81-0x0000000002B20000-0x0000000003B20000-memory.dmp

          Filesize

          16.0MB

        • memory/3472-57-0x0000000002B20000-0x0000000003B20000-memory.dmp

          Filesize

          16.0MB

        • memory/3472-63-0x0000000002B20000-0x0000000003B20000-memory.dmp

          Filesize

          16.0MB

        • memory/3472-88-0x0000000002B20000-0x0000000003B20000-memory.dmp

          Filesize

          16.0MB

        • memory/3472-52-0x0000000002B20000-0x0000000003B20000-memory.dmp

          Filesize

          16.0MB

        • memory/3472-50-0x0000000002B20000-0x0000000003B20000-memory.dmp

          Filesize

          16.0MB

        • memory/3472-48-0x0000000002B20000-0x0000000003B20000-memory.dmp

          Filesize

          16.0MB

        • memory/3472-69-0x0000000002B20000-0x0000000003B20000-memory.dmp

          Filesize

          16.0MB

        • memory/3472-46-0x0000000002B20000-0x0000000003B20000-memory.dmp

          Filesize

          16.0MB

        • memory/3472-45-0x0000000002B20000-0x0000000003B20000-memory.dmp

          Filesize

          16.0MB

        • memory/3472-61-0x0000000002B20000-0x0000000003B20000-memory.dmp

          Filesize

          16.0MB

        • memory/3472-43-0x0000000002B20000-0x0000000003B20000-memory.dmp

          Filesize

          16.0MB

        • memory/3472-60-0x0000000002B20000-0x0000000003B20000-memory.dmp

          Filesize

          16.0MB

        • memory/3472-58-0x0000000002B20000-0x0000000003B20000-memory.dmp

          Filesize

          16.0MB

        • memory/3472-41-0x0000000002B20000-0x0000000003B20000-memory.dmp

          Filesize

          16.0MB

        • memory/3472-55-0x0000000002B20000-0x0000000003B20000-memory.dmp

          Filesize

          16.0MB

        • memory/3472-54-0x0000000002B20000-0x0000000003B20000-memory.dmp

          Filesize

          16.0MB

        • memory/3472-40-0x0000000002B20000-0x0000000003B20000-memory.dmp

          Filesize

          16.0MB

        • memory/3472-53-0x0000000002B20000-0x0000000003B20000-memory.dmp

          Filesize

          16.0MB

        • memory/3472-51-0x0000000002B20000-0x0000000003B20000-memory.dmp

          Filesize

          16.0MB

        • memory/3472-39-0x0000000002B20000-0x0000000003B20000-memory.dmp

          Filesize

          16.0MB

        • memory/3472-49-0x0000000002B20000-0x0000000003B20000-memory.dmp

          Filesize

          16.0MB

        • memory/3472-38-0x0000000002B20000-0x0000000003B20000-memory.dmp

          Filesize

          16.0MB

        • memory/3472-47-0x0000000002B20000-0x0000000003B20000-memory.dmp

          Filesize

          16.0MB

        • memory/3472-71-0x0000000000400000-0x000000000055E000-memory.dmp

          Filesize

          1.4MB

        • memory/3472-37-0x0000000002B20000-0x0000000003B20000-memory.dmp

          Filesize

          16.0MB

        • memory/3472-44-0x0000000002B20000-0x0000000003B20000-memory.dmp

          Filesize

          16.0MB

        • memory/3472-36-0x0000000002B20000-0x0000000003B20000-memory.dmp

          Filesize

          16.0MB

        • memory/3472-33-0x0000000002B20000-0x0000000003B20000-memory.dmp

          Filesize

          16.0MB

        • memory/3472-34-0x0000000002B20000-0x0000000003B20000-memory.dmp

          Filesize

          16.0MB

        • memory/3472-32-0x0000000002B20000-0x0000000003B20000-memory.dmp

          Filesize

          16.0MB