Analysis

  • max time kernel
    133s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06-12-2024 07:52

General

  • Target

    d0120e542a23e19fa1a4cb88845ee83f68279a131851999c5805c48647ddc478.exe

  • Size

    724KB

  • MD5

    fdd03e309f7bdc50b73b65989ddaeea9

  • SHA1

    0e6d7a6afd50e5773aacbf77494f559fd29732b4

  • SHA256

    d0120e542a23e19fa1a4cb88845ee83f68279a131851999c5805c48647ddc478

  • SHA512

    6e83e0b7cdd877d75913eccdbd7c4c7ad62eb96b6c0b99f052463ae63cd435f437860e975ff4044482415916c361130feb7986a7dd2e0d53fd242bd18ad47811

  • SSDEEP

    12288:9c//////XhHkFJ2PSwVIghpSZHzudJgdmthwKAYb5jYE541xIAZDnzyhK:9c//////XhEFCfzSNz2ujcWE541xIAF9

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 8 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d0120e542a23e19fa1a4cb88845ee83f68279a131851999c5805c48647ddc478.exe
    "C:\Users\Admin\AppData\Local\Temp\d0120e542a23e19fa1a4cb88845ee83f68279a131851999c5805c48647ddc478.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2676
    • C:\Users\Admin\AppData\Local\Temp\d0120e542a23e19fa1a4cb88845ee83f68279a131851999c5805c48647ddc478.exe
      C:\Users\Admin\AppData\Local\Temp\d0120e542a23e19fa1a4cb88845ee83f68279a131851999c5805c48647ddc478.exe
      2⤵
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1956
      • C:\program files\internet explorer\IEXPLORE.EXE
        "C:\program files\internet explorer\IEXPLORE.EXE"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2808
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2808 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2380

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c7238de7a66654bd7150417822bb2d20

    SHA1

    3579397b417dd9a0182cfa4befb36e40006eb4d4

    SHA256

    ffeb24081bdca9db0a41632e98ca074b9b6f0caa9a6b85c2fafaef91a7f3af2d

    SHA512

    50e189fc01577affe1d925a08ca890274b601ceac86084e9fa0bdf7324f215bae09e722b6fcbb81db2f5b22300b80dc01f05accad49ecab49888564737ecee39

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    201ed89abf5381a06f5da02d720f2da5

    SHA1

    e4dcc5550808497d559926a1c5b57d1b7ad53940

    SHA256

    c675662fc4a7a6302978c3dc8189386721fa573f0cbf041194cb6140ef043ca9

    SHA512

    c6e537580a094c0f7ce227505ed16126b164026711f7d4099460d553e1ec17c39a25ddd967bcf759e42b9df1bf2a155c3d643a24f7e4c6260641c7058c8823dd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8d7d58d64e9afcc0fb18102e5fce8f8d

    SHA1

    829a56a61c633836eb8d9020373d9e86243c9bd6

    SHA256

    c6aa7e8c636673784c543c6d3150f6b01a45f335ef7b555390e8bd23f3492bb8

    SHA512

    a0a2a8fade9173f28baec9265b9091fd0225c9b96751ec6a339b6db699f3f65bc4ee3a8a59a6209cf97d77a4c93bb612d2b9636e75ac2aa93fa23cd04422b6df

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8caa7647d3d6cc878065e363a5bfa4e6

    SHA1

    a53161d3d15a37a6cf9a162a4d4fd2afa83bde84

    SHA256

    5e586fad419f87298a66fc27aa4f4fb05f67bc8563303d482b8d04ec27c2533f

    SHA512

    53bfdc5ee9498659cc0e4c2bc3aeff93853bec5b8d2ef06ae2abb86ef3ccb67d2148f5da788d04b6c15e430b6acd080271f33252198223faed71d2c8705dd0a8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    61ee6b915ca3c87b860967843a6246ca

    SHA1

    d9a17c3d978e52e9e5170a5452d54dc511706d65

    SHA256

    6f47e488791ef380ff918312cafef88fb1322d7698f798a4e712d0bd51b5b95a

    SHA512

    bd59a881f2039c6bbfc7e84b65c45f983b32ff3c8e491742228e9178a1da580e312cd59f4fa86d2dab50405ecf02e82c803be893aad9df5742751609b9ac832f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b8a8159e4e94157dd2a8c4072326df06

    SHA1

    cc88542d7b9fe4f395d38728b910c53a09b6e565

    SHA256

    36430722a9babd54e4df71d8050e1003b4585c55bf90b4da797a891920a6b163

    SHA512

    ca1ec58d467beb8e49fa545aab388e6229e68750b66c02a0b1be7998b41d8c5195d131907cb14053f7f74c6d5de79ca11d0def54e787beecd44e23de5a26e431

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7fc9dd2d62cb91e442301185143e1b92

    SHA1

    f72dcded232d16e85565385aed911fdfb8381a32

    SHA256

    aa49310269a76372167df4015b6ec1c4cc44f4079a0603093e22c63449999d3d

    SHA512

    80e0ac3daed250823ed59044cdd4fca34948e36bb5e264eb87b80e434624b2f802cc898375159a59fbc5597bdc55e4ded40efc0e5b710bcbe7568d8f228e267f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a36abb59121c5df750fa92867dfe2a8b

    SHA1

    7324ef502f1df82f70a5e1264792974e6a1d1c57

    SHA256

    be1a9cb953c106b193a2dac14216013607c7c9b01fe7c998ea24c80dcc454b6c

    SHA512

    af4951912d87646de1ac4111b19e599d4757fcec99b344bacf88c2b0ee8bd8920bca4608993ba774ed15ded223e123de975788a4321761e69c1ccbbd7558f9d0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f6523f753ef15438459c6f2420adb49c

    SHA1

    13b2153449bb2dd6f8f0adbe4ab5b7dfbdedbef1

    SHA256

    3788513ca786148aca8e37d0e5247399d713114cc41d71de8a2b933bb9699be6

    SHA512

    76b24106eed7cad9062111abca8ec010d6e2ba6bc730820746565a21346fe1e38462409f1a5ad7925c87f805322f0f49252c07432d78180b32901e9783f0790b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a03c27fab51b97e3bc8b1a10a5e122ec

    SHA1

    420ad259b16c2d9af26e1f132785112e6875d762

    SHA256

    256d61782cc1044491866fbd3fc63ada1dbcb860ff9961a346e245c0de795f8d

    SHA512

    3a9746c79c117032ca8a3457dee96b6dc6b705c4c38ed35c77d3224211c6b03803338ef6cee6c549a7ccd0587a4da8c5bd0ac2abe8f7301eb316bdeb105cedae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2b122d73c475f87a773f2267d8f9138d

    SHA1

    4039179fc3fb5843134cb72c9a56c09c8a25ab33

    SHA256

    89cc2803a5296bcce44e6bb404b2a34221388fd182203d35eb0fbdb2fe247d72

    SHA512

    8844ef960a484ea5a5f4201b7aba673e2636caab0b5c98b2db24017aadd17926432b7870d1328d2560dce60e77aa76390ec34847192e28b8eb3d695832e51602

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0d9c23d90079fbbacc39ad1b25376cbd

    SHA1

    d1c9c83ff71266191b74c6ae9af223c7a083324a

    SHA256

    6cc1d877f40a8bb5aacaa1bb497d5f2d7daad8ce11d05d9c2ab83a19b3dbd44c

    SHA512

    1bc3f0d99529e7a703a02c15c8fa00594a691f321adef45ee45521bebdbda45d3c3518063dd1abb88bacc4c15d86755e35ed062a713ca888b279abc6722be21c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7311bd89a9abb9a4864103b53990581b

    SHA1

    617440ec8186fb4b56a4bf571a93d38833ce5faf

    SHA256

    88a37f2ea16f946e0366b74c905e2c0e9962ffeaf6624ee33040832d969c5745

    SHA512

    c02039caae9d86eaf5aa78c4bf8150d690f75a70b1b6c18823d0c993fc9190fe4e7c9aef7db12bc385163c28f02886544a2ffb3993e77a75b4fd8af4d104bde8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5209640dbf8b25067dd9407a5a3866c0

    SHA1

    7043072e0d2c5cbc1682bf473d4345b747e587b2

    SHA256

    b00090cb62c5d5ccbf43f62255aeee6cf03c40cf40417d6b952d389ddc6f7d16

    SHA512

    633ebbee3d6b700eb9a50c5a46482a5e57bb9a589318b8fd55e1307c2eed067665b7fd9c9b47d1ca0faa4f85717f71b00d80dae6466867d909d14c52b4fdea1f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    13684b21619f303bcf99e7864fa67c00

    SHA1

    caa0596f9e99ecd04f41e2abe1c45334f809263c

    SHA256

    53917bb5fa34c78760ba7a4f12c42217899118e53ff2b822d5d07066960a1b9a

    SHA512

    be1880db612be6d821b35fba3b4ec2138ba4febfbc6d85954e111a5221e9921c6b02efca26bf165ac3cd4ba680a87df371ba09fa936201b9fd493b33c9736be0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3eeb49b4caaabf7a0119688fa6557b0f

    SHA1

    7b4168cab90fc0ff03e67d282b10dbabbd24a552

    SHA256

    8c20a4fd0faadbdf5509ffb83aa972a88418a9a331deb89e66709f8a89528d71

    SHA512

    47ac1687918329d4969c798d17128b682f73365a4171137cdd4b8cba71d58d2adb124f92ab9a92246cfd4babcc889dff631eb010bc55c002560e362efd0e20c8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8b7e2a597224b6c3dc2477992a014d90

    SHA1

    0d3f3445d4f670236eb2136eda3da97768b78c8f

    SHA256

    aeba346bf191abbe2021086f25ea016104d5ec929c74fd427975bf7b4a150cd5

    SHA512

    6947b0acee95ce59e58f58c4ab4197c02e6b8039a51970b0173dd29d19951392ffe7cb1ac744bb8fd171b50bdb5b5f34cbc92290b0b73f3d672a7c02efec4ccb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4f95c2c3fbf5a5bb89085896dbf089d6

    SHA1

    87f6b0f1bb00e38073157403b95a5bce647a3835

    SHA256

    7d846ced406ecfd73a82d978a1540be369bf79774c7716957ca3d9fd1ad43c56

    SHA512

    9f1204f4a5a6f2a7f84d15f43dd3c056bacccb80c3457266fbb359277a9c25b7c57e790ea9eab94c94cb9f51f403acd78a6d3760af27f924addac96827441000

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f21c6c2bfd7397d492dda297679481fb

    SHA1

    2c7d6062ddd09761ff6b6d281e59a938277b1f49

    SHA256

    40a36180cd51b11f357ef15d5b15586bbb1a93059ed903ee0e4de282a6324201

    SHA512

    fa749d91dca691f2fdb9165fef299711038d09b873204c4ba2ed08119f987a14f9036b4b5bd5f809de924eaf2a0d99a479f4a6804e3fedb94e66a3389cfcf876

  • C:\Users\Admin\AppData\Local\Temp\Cab2F2E.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar2F9E.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/1956-10-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/1956-7-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/1956-2-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/1956-0-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/1956-4-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/1956-13-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/1956-16-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/1956-9-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/1956-5-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/1956-8-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/2676-6-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB

  • memory/2808-12-0x0000000000060000-0x000000000011C000-memory.dmp

    Filesize

    752KB