Analysis
-
max time kernel
90s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2024 05:07
Static task
static1
Behavioral task
behavioral1
Sample
62299b67780dc58dc0be584583700ed18f4c73d18f922ecb3593db4cbe32e3a9.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
62299b67780dc58dc0be584583700ed18f4c73d18f922ecb3593db4cbe32e3a9.exe
Resource
win10v2004-20241007-en
General
-
Target
62299b67780dc58dc0be584583700ed18f4c73d18f922ecb3593db4cbe32e3a9.exe
-
Size
444KB
-
MD5
799b8c5c4b6e8ede0c74b85b1f6fe85e
-
SHA1
2dd944737fbc6ce0bf9b5a076475c7c9a62b3e50
-
SHA256
62299b67780dc58dc0be584583700ed18f4c73d18f922ecb3593db4cbe32e3a9
-
SHA512
75b10f6deabc36195438b4122e641f519e94493aaaaf4b7cd801ebb884e2ce72eefb6bfc226f586998f06a7b3460792eee7230c74168febdef93e65968cbccde
-
SSDEEP
12288:SV+mzFHYEt+UmeGhiHbT613/p0thOYxG26sh+Vh:S83x4GYbTWSthG2B+Vh
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 3 IoCs
resource yara_rule behavioral2/memory/368-21-0x0000000002030000-0x0000000002053000-memory.dmp modiloader_stage2 behavioral2/memory/368-22-0x0000000002030000-0x0000000002053000-memory.dmp modiloader_stage2 behavioral2/memory/368-23-0x0000000002030000-0x0000000002053000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 62299b67780dc58dc0be584583700ed18f4c73d18f922ecb3593db4cbe32e3a9.exe -
Executes dropped EXE 1 IoCs
pid Process 368 QQ.exe -
Loads dropped DLL 2 IoCs
pid Process 368 QQ.exe 368 QQ.exe -
Drops file in Program Files directory 7 IoCs
description ioc Process File created C:\Program Files (x86)\%system%\__tmp_rar_sfx_access_check_240623015 62299b67780dc58dc0be584583700ed18f4c73d18f922ecb3593db4cbe32e3a9.exe File created C:\Program Files (x86)\%system%\QQ.exe 62299b67780dc58dc0be584583700ed18f4c73d18f922ecb3593db4cbe32e3a9.exe File opened for modification C:\Program Files (x86)\%system%\QQ.exe 62299b67780dc58dc0be584583700ed18f4c73d18f922ecb3593db4cbe32e3a9.exe File created C:\Program Files (x86)\%system%\090316.exe 62299b67780dc58dc0be584583700ed18f4c73d18f922ecb3593db4cbe32e3a9.exe File opened for modification C:\Program Files (x86)\%system%\090316.exe 62299b67780dc58dc0be584583700ed18f4c73d18f922ecb3593db4cbe32e3a9.exe File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\atmQQ2.dll QQ.exe File opened for modification C:\Program Files (x86)\%system% 62299b67780dc58dc0be584583700ed18f4c73d18f922ecb3593db4cbe32e3a9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 62299b67780dc58dc0be584583700ed18f4c73d18f922ecb3593db4cbe32e3a9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language QQ.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 368 QQ.exe 368 QQ.exe 368 QQ.exe 368 QQ.exe 368 QQ.exe 368 QQ.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeSystemtimePrivilege 368 QQ.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 368 QQ.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2404 wrote to memory of 368 2404 62299b67780dc58dc0be584583700ed18f4c73d18f922ecb3593db4cbe32e3a9.exe 82 PID 2404 wrote to memory of 368 2404 62299b67780dc58dc0be584583700ed18f4c73d18f922ecb3593db4cbe32e3a9.exe 82 PID 2404 wrote to memory of 368 2404 62299b67780dc58dc0be584583700ed18f4c73d18f922ecb3593db4cbe32e3a9.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\62299b67780dc58dc0be584583700ed18f4c73d18f922ecb3593db4cbe32e3a9.exe"C:\Users\Admin\AppData\Local\Temp\62299b67780dc58dc0be584583700ed18f4c73d18f922ecb3593db4cbe32e3a9.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Program Files (x86)\%system%\QQ.exe"C:\Program Files (x86)\%system%\QQ.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:368
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD5b41cf0e0cff16ad5c5c46ca0cc72c8b4
SHA1a7cc123dadbaf7d2811b524fa80d4fcbff967973
SHA256007047c0a03878eb4e81f526f0ff4006d96bcac955ba7f398758b18467986256
SHA512813f64e368e7c7a03d8f0d8b4e7cb67065aeaa27ba174d77b118fc5d2ccfea9661fc48e8013bb92c9cd2ca6446c15573e3c028d9f641b91f065d6e3f30116af8
-
Filesize
20KB
MD533cb3dcfbde8200a0144f98a46467f14
SHA1a95ec9ed18295dd2e4ae46ac8731c97d90a11c90
SHA25692638efda9726a9ecd2f235e603614aa1c7e01d1789b15f8430c92e9e9823f97
SHA512b25f1d7ff5856c69f124d6294ac792c9a73f04fe196a55ccb94870084e1a0de1decf6444086b5efba087f34a332074e61081ea97d3d4225f0cc9f79cb7743c9e