Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05-12-2024 03:50

General

  • Target

    545144737c64e9ba29f799a58c81a79131361e5754c423fca7c0394f46f2939dN.exe

  • Size

    724KB

  • MD5

    b6ac631bfeda3b4a32058b4b7763ead0

  • SHA1

    8743eaf53f9851494b8b347044c88a3b1618c7b4

  • SHA256

    545144737c64e9ba29f799a58c81a79131361e5754c423fca7c0394f46f2939d

  • SHA512

    820e763043347b0b3c2e11ee984ae1f11fa29335df807d7d608f9a457403a034173e08314d026bd71e971e3b5f9571acbc1b0a30f9e3739ab07f7151bbff6ef6

  • SSDEEP

    12288:9c//////XhHkFJ2PSwVIghpSZHzudJgdmthwKAYb5jYE541xIAZDnzyh6:9c//////XhEFCfzSNz2ujcWE541xIAFF

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 8 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\545144737c64e9ba29f799a58c81a79131361e5754c423fca7c0394f46f2939dN.exe
    "C:\Users\Admin\AppData\Local\Temp\545144737c64e9ba29f799a58c81a79131361e5754c423fca7c0394f46f2939dN.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1848
    • C:\Users\Admin\AppData\Local\Temp\545144737c64e9ba29f799a58c81a79131361e5754c423fca7c0394f46f2939dN.exe
      C:\Users\Admin\AppData\Local\Temp\545144737c64e9ba29f799a58c81a79131361e5754c423fca7c0394f46f2939dN.exe
      2⤵
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2380
      • C:\program files\internet explorer\IEXPLORE.EXE
        "C:\program files\internet explorer\IEXPLORE.EXE"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1716
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1716 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2312

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    674107889f1115d0cd8cb76ac824e75d

    SHA1

    d9f3d23d5c933f30af3b2e135a44493c511df8a6

    SHA256

    227ad3a582c5e736ad56ea122439268e058412aa44b8e677ff10637f25fb0c41

    SHA512

    8fe7cd605e2819ecf9acae10ddacd7a7c37edebb8d5b5dafe03f342fd1ecef9d8ef67ce89a712dc4e70f2750c959344008251df50a1f283e3d103ee4e28f3dde

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b1246e9c551fa8a854b8b34adbc95a7f

    SHA1

    c5b0f179c2afff266f9766150a01313a8425d4f5

    SHA256

    33d892f058a759c6fd881ff17a5265595cc49aaa2124a80980bc2d3abfebc91b

    SHA512

    67def43ddff826071c52e126be63fe790a1f5ea6ab398ccce292bce241342053542af04ff76f143beb92a3a1272f30071582fedafd4fa6d7de3cef072399b165

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    74779437dad1e3ec2d57a8900012e80d

    SHA1

    610814a479d2074f42176af9587b94990018416e

    SHA256

    c16cff20e913aa1a05b3e9c80e92d273ecda98c83c2d8816e591dccfbb75804b

    SHA512

    f2ebbfc08de2f621f82477bc681fc711a57e6c3ffdea6bda96e5ada592251c4b1a4ec61e141cc1c4c95b8b00a4a0974962ff5004bb4585165bb9f1ce4bac8aa4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    513e7cf65130d4f541730c051f487c1f

    SHA1

    ecb97dfc40c940d6b4302bd5c203d5119f86bc33

    SHA256

    605ff3bf21654f8a82213c2dee1faa460f14b59835ef61ad3f8312e5c50a2e7e

    SHA512

    9136d9f019c40092e4a4b54fbc35e31e252bba222b82f5f816fca48d08ce598eeb1c33a83f5537b13677b4f41a7567248dd831c9e068bdeb3747b2a42716011a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c056a61d08c800ee4cf13f20d9f59ed2

    SHA1

    1f8f103494266e5d7d3ed9446e405a78ac807139

    SHA256

    a4f5ad610a22201462c3d80029c9922998db2e6a0078213ec89aa72b5206f8a9

    SHA512

    a8ef4fdf4cbd4dda703f3b7d41cb1b3ab1b6181bb049d65899637a7a5e2fef987cf5cd3bb25d55e317abca1fc58363bf07be1db79325f378585c202d5df2fd66

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    083d052cee6f75afbf9ea46989114c34

    SHA1

    ea5d0d7b7f9f7ecbfae1ea6770117a46c33d1223

    SHA256

    0162b5331936f7baf4a93ab5c79f361f49508905f85bd58745f9fe62c0140da7

    SHA512

    5ca4d479cbab52fdb16c37a14570953b6fdd9f8a5ea2188d8f1c4121af7df66773ba307587ead3787c5c29ec225524597ee1fb74b8437d5320530a9fba0c922e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    60d0ea66a8a5195dd60bc08fb4510197

    SHA1

    d69aa62029155dbe7fd2ae1ce6fb27700881d1eb

    SHA256

    fecbaf190f46d4ea5796441561df39925d49f0216aabc524cfdac338917fb799

    SHA512

    2dd3e99627f7439de0c5901a27e9f5bb8737f95f263acf761f81864ee819ccce088461410861ae86286523a45bced9199bcccfb1e193f7206c8e89a8d97ced00

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ffba6ca63e76197b90ba61de5753b318

    SHA1

    bfe08af251c2303a2b0cc1068ed0ccbb9987093e

    SHA256

    864161ed84f40007bcaf241b23ea87e3bafa3d9cce54fcadf93527162e04f785

    SHA512

    0b180ac1a62abafc2a9a36cdeaf603248cd52a7049ffe497f6da749502cc1a588e334f1596edca33839972ce37ab00a7f40977cba241ecd6df620bd7ffc73138

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0b5bcfe95f0cdb03599a73a384d3e8c7

    SHA1

    25eb82a74a073e432e1e3ec6a08e4e7a6f440733

    SHA256

    5a89a170bd0095a876ad6ca4219af0ef7f76e79f8aa9f7018f4c4cdf93bfeb3e

    SHA512

    f04e76c67fcef325bc2317e722a710df2af54e094b828f50586ddaddbab02475530edc826032fa5971761b8b9627fc82a9b782761c67a7250245da321dc2edfe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    677f24bc10122268b30a9efa0ee8ebb2

    SHA1

    cbb3c331014457147b8d07131a5c09dd9f45eea9

    SHA256

    d0b47d6981ab4a7ab54ff73f40b2c3dd7b14b537372c10ac8edbb3a5aa4785e7

    SHA512

    ce87e9327d12aacfbe1758bd3eff52bcae31865816bac7920fdb1b7195329c406e240532d258a83d5d1722a32f49023677d8f14408e0f4ebfbb09dcd180ceb7d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ec9395dc1304738d70d3d5ac6816cc0c

    SHA1

    19d4209371928ee197b1e61fd2de57b2e79d5eb8

    SHA256

    ea2d472c33ec8147c129696ddeea09b17e46197ee627920b8568b35b1f87c3b5

    SHA512

    0320731adc3c98595445971cbccef1a73af7b6cd800b1b693186e8e43f5dcabf79cc80236622921c9c8e17d757ba905b4015e18d6a5a2c787efcbc7ef2f2fc6e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    29f8f6e5c8ff9aeb690f7328f398176f

    SHA1

    407ed55d95369fa42e2aca0e945f709c3aaedd06

    SHA256

    03e4409c3ed9fd117e2477b50b014714b51ac4b66fdd342ef3581e0f0278b002

    SHA512

    7e069c5e092f0e65ad0297241623d535df70cb146717031861e7355fa0bc59d65687e24e7ca44ba9f0ff3d93f6f6db6d640685eed032224e8b4ad617b1d4f093

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    14f892b51b157be312fadb6bc9e0e9a9

    SHA1

    33b6ad2d934ec837d1c94ba9eb55e5e2b9bb9e6c

    SHA256

    58965a14a7c522a36c9550a891776949dd50036ae3aa5445aa090ad864c5c448

    SHA512

    79b6a33fa3baa5fac928a979a6a259426ca10f1a93596e659634962602c2d8c6d7bcfb15ddc842e9b8ea4ba1768a91c153213e9772c9e4b99e2de2c615547e96

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fd2602cdec302563ce05d8af6dde1fbb

    SHA1

    517545e9da9d7c027b0fd38d457df76bda4925a4

    SHA256

    2ea05452dd37ef007c9f5af28decf40dfccd2e1fb97a47731124892d31342251

    SHA512

    609e702bb7147263af35012f4626aae9c804f3166665c9d8761452ed69ba88414e70a54775798faffd03f1e293d3211eb1d7630e95af105300ae4f4a66dfe871

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9c8ee6c14bce0e2a99a09af6652d7f39

    SHA1

    7e3c8408ffcf204dbe660c788da8f6f58bcf77f2

    SHA256

    600b27f37bef00fa8a338c2e886f9af2174f45921c8697b66fc3d1442f9e1d60

    SHA512

    48c78f792727bf25c6618d7bbe1c820da9ef345e3d49a1ad5da4ee6baa699a10a7fcdf3e1bcac3247357b83b812e6b3c8cb087a122473812085e47fde7f3dffa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3ad6afaf0797706648e6e21419f74297

    SHA1

    9fb53c4179da7420f863d9abc377ef1e9000202e

    SHA256

    cf187e7dd926320231634eb6f39838800275e100d8d2bc6d3d9361778880fd1c

    SHA512

    2dcda26857257bc35f54449c8acfc0b9ad777ce650c59ba64cfbbe46ae56cd61059ea4e4721ce6d08e298c3ab0deee84dab8da1ca7ecafcc3105c03dabff1786

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    29e7884c009432bd57c80d25a4d804a3

    SHA1

    edcc3f503894f99bf8882ae16895a4e0c9c413c5

    SHA256

    9abe4358d1c17bd5da523b4854e013060cca923cb9320163c1d9bf4ae00bff36

    SHA512

    a469375c5308bb475c0a2a499dca719c42a537a55429fb6c125b07615ea9ea1bc8a75d3b0f4e2a5a2d992497ccee616ccad3c2e327fc70a674d9a6d4377836e8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a2a3760ff20ee4b0ea0573053e4b9f44

    SHA1

    8810f8dab3a72d72142e1bf61e9ad1dd28171086

    SHA256

    c03e7823ce5ad5b16174df1c8c8aca49b756d30c6e4cf08d6220e988ee641fcb

    SHA512

    a2d9969b9c0ac707bc787c332f5f3ecaa1a3a258f1a6006df7433dd87230da263a065b50d347e4cea52fa3156659b6fd9bc0de9fea9133a7224c31273a00b761

  • C:\Users\Admin\AppData\Local\Temp\CabB676.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarB6E7.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/1716-12-0x0000000000060000-0x000000000011C000-memory.dmp

    Filesize

    752KB

  • memory/1848-5-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB

  • memory/2380-4-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/2380-9-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/2380-13-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/2380-7-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/2380-10-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/2380-3-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/2380-6-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/2380-8-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/2380-16-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/2380-0-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB