Analysis
-
max time kernel
142s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-12-2024 20:15
Behavioral task
behavioral1
Sample
挖掘鸡7.2最新版_cngr.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
挖掘鸡7.2最新版_cngr.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
河源下载站-cngr.cn.url
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
河源下载站-cngr.cn.url
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
淘宝热卖.url
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
淘宝热卖.url
Resource
win10v2004-20241007-en
General
-
Target
挖掘鸡7.2最新版_cngr.exe
-
Size
1.7MB
-
MD5
f37023c41ae712e20595650fcc5f06d2
-
SHA1
f1d0887b2d2c3788b73ba4aefcc0d060d6bfeedd
-
SHA256
7d5bd56ecfdac63df44fc80c9b5bc2fdf55d491d0ab20edbb3a2ad6825cce076
-
SHA512
8b27218a41f69e743f11630eb31e5d8af472c688598f438f057a3f65aa2c2644eacd39286aecb090c2343e94ed481a1a291382402b297a7a7b52949ff6c2e643
-
SSDEEP
24576:nZXBJxLVwqSdNLRlJMXVWxaC5wa1tqqdXE+86TZStU4gf2EW5A2DJr/kS4vGIk6O:FrxBHofJMXGnrvi+RTZh43Dp/wPHXW
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral1/files/0x000700000001878c-6.dat modiloader_stage2 behavioral1/memory/2336-10-0x0000000000400000-0x00000000004BF000-memory.dmp modiloader_stage2 -
Executes dropped EXE 4 IoCs
pid Process 2164 EXE_temp0.exe 2336 EXE_temp1.exe 2908 EXE_temp2.exe 2984 recyclers-s-5-1-21.exe -
Loads dropped DLL 9 IoCs
pid Process 2384 挖掘鸡7.2最新版_cngr.exe 2384 挖掘鸡7.2最新版_cngr.exe 2384 挖掘鸡7.2最新版_cngr.exe 2384 挖掘鸡7.2最新版_cngr.exe 2384 挖掘鸡7.2最新版_cngr.exe 2072 WerFault.exe 2072 WerFault.exe 2072 WerFault.exe 2984 recyclers-s-5-1-21.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat recyclers-s-5-1-21.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2072 2164 WerFault.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language recyclers-s-5-1-21.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 挖掘鸡7.2最新版_cngr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXE_temp0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXE_temp1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXE_temp2.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections recyclers-s-5-1-21.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{48BE3D07-CE27-44FD-83B0-B520ADC97E7F}\WpadDecision = "0" recyclers-s-5-1-21.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8e-e9-62-78-c7-6c\WpadDecision = "0" recyclers-s-5-1-21.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" recyclers-s-5-1-21.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix recyclers-s-5-1-21.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" recyclers-s-5-1-21.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8e-e9-62-78-c7-6c recyclers-s-5-1-21.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" recyclers-s-5-1-21.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings recyclers-s-5-1-21.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings recyclers-s-5-1-21.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 recyclers-s-5-1-21.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad recyclers-s-5-1-21.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{48BE3D07-CE27-44FD-83B0-B520ADC97E7F} recyclers-s-5-1-21.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{48BE3D07-CE27-44FD-83B0-B520ADC97E7F}\WpadNetworkName = "Network 3" recyclers-s-5-1-21.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 recyclers-s-5-1-21.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00eb000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 recyclers-s-5-1-21.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ recyclers-s-5-1-21.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{48BE3D07-CE27-44FD-83B0-B520ADC97E7F}\8e-e9-62-78-c7-6c recyclers-s-5-1-21.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" recyclers-s-5-1-21.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" recyclers-s-5-1-21.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{48BE3D07-CE27-44FD-83B0-B520ADC97E7F}\WpadDecisionReason = "1" recyclers-s-5-1-21.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{48BE3D07-CE27-44FD-83B0-B520ADC97E7F}\WpadDecisionTime = 108ec1aa1b48db01 recyclers-s-5-1-21.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8e-e9-62-78-c7-6c\WpadDecisionReason = "1" recyclers-s-5-1-21.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8e-e9-62-78-c7-6c\WpadDecisionTime = 108ec1aa1b48db01 recyclers-s-5-1-21.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2908 EXE_temp2.exe Token: SeDebugPrivilege 2984 recyclers-s-5-1-21.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2984 recyclers-s-5-1-21.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2984 recyclers-s-5-1-21.exe 2984 recyclers-s-5-1-21.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2164 2384 挖掘鸡7.2最新版_cngr.exe 32 PID 2384 wrote to memory of 2164 2384 挖掘鸡7.2最新版_cngr.exe 32 PID 2384 wrote to memory of 2164 2384 挖掘鸡7.2最新版_cngr.exe 32 PID 2384 wrote to memory of 2164 2384 挖掘鸡7.2最新版_cngr.exe 32 PID 2164 wrote to memory of 2072 2164 EXE_temp0.exe 33 PID 2164 wrote to memory of 2072 2164 EXE_temp0.exe 33 PID 2164 wrote to memory of 2072 2164 EXE_temp0.exe 33 PID 2164 wrote to memory of 2072 2164 EXE_temp0.exe 33 PID 2384 wrote to memory of 2336 2384 挖掘鸡7.2最新版_cngr.exe 34 PID 2384 wrote to memory of 2336 2384 挖掘鸡7.2最新版_cngr.exe 34 PID 2384 wrote to memory of 2336 2384 挖掘鸡7.2最新版_cngr.exe 34 PID 2384 wrote to memory of 2336 2384 挖掘鸡7.2最新版_cngr.exe 34 PID 2384 wrote to memory of 2908 2384 挖掘鸡7.2最新版_cngr.exe 35 PID 2384 wrote to memory of 2908 2384 挖掘鸡7.2最新版_cngr.exe 35 PID 2384 wrote to memory of 2908 2384 挖掘鸡7.2最新版_cngr.exe 35 PID 2384 wrote to memory of 2908 2384 挖掘鸡7.2最新版_cngr.exe 35 PID 2984 wrote to memory of 2848 2984 recyclers-s-5-1-21.exe 37 PID 2984 wrote to memory of 2848 2984 recyclers-s-5-1-21.exe 37 PID 2984 wrote to memory of 2848 2984 recyclers-s-5-1-21.exe 37 PID 2984 wrote to memory of 2848 2984 recyclers-s-5-1-21.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\挖掘鸡7.2最新版_cngr.exe"C:\Users\Admin\AppData\Local\Temp\挖掘鸡7.2最新版_cngr.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\EXE_temp0.exe"C:\Users\Admin\AppData\Local\Temp\EXE_temp0.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2164 -s 1763⤵
- Loads dropped DLL
- Program crash
PID:2072
-
-
-
C:\Users\Admin\AppData\Local\Temp\EXE_temp1.exe"C:\Users\Admin\AppData\Local\Temp\EXE_temp1.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2336
-
-
C:\Users\Admin\AppData\Local\Temp\EXE_temp2.exe"C:\Users\Admin\AppData\Local\Temp\EXE_temp2.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2908
-
-
C:\RECYCLER\recyclers-s-5-1-21.exeC:\RECYCLER\recyclers-s-5-1-21.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:2848
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
250KB
MD5eec13aa4885914e23037b5d69f982cd5
SHA1feccd45713f84c5e3729b0660fdb054cb816df34
SHA256bf4739756d5282358b208bb75f0dd1af879cbfb3e9ff92cb670b98ba7b7c6ea9
SHA51242ddb099c48b17aab6a53004cdc62bb96695ead2bcbde055749ad30a9c56f04733b7e47d227120a1000eb97ece33b077a1076d37a2735102600b4fdc2829cd11
-
Filesize
681KB
MD5b8d8384b8ff97032e7230dd020763ebd
SHA121b53995c976ac5e9d749ce090ee7494beeca44d
SHA25643d33251a3ccfa19c940d875d1861a9f1606eaa3afdecc2c30118e2dd9a5a0d7
SHA5127a04e45417b8571cf0722fbcbd40f693da9c6a9bbca72e1577ae3b6024dd3df88cb07b87efc300f584a16e2dd4d64834841939d2bef3365e39e0b362f5cda13e
-
Filesize
795KB
MD56d4c27a39686689f98a83de90383ebc8
SHA113c37e67230033dc729c99c83da593f1af634908
SHA25660b79787052c00e26c733a04facb040c4d7f81b10b9b3b4ae423930b640c0d43
SHA512d29e2f043e1b6c71620658e5e3b510fde14407b28089bbbbdb12015ba7d0d21b290f6985e28b359fe9763066c4326f8734c066b427e0f0c05fb439a85a1f5748
-
Filesize
51KB
MD5aefafdd5c9b62db20fd28e0f935263e8
SHA13df1cb906cc6180776143b3cc8dd77d2d6956d59
SHA2569550cb7dcb5aae17c30239da490f44b782c0be45f626073a83cfafd45c9e8d3e
SHA512e3e953bcede18dbd183defe2e60c1ba654cec65eaa7a8d483f262b77d76cdbba1a13a9adfd8804f586ccf6ae69f3053f8963d9d4c1193df17a5209fa06c53d40