Analysis
-
max time kernel
141s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2024 20:15
Behavioral task
behavioral1
Sample
挖掘鸡7.2最新版_cngr.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
挖掘鸡7.2最新版_cngr.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
河源下载站-cngr.cn.url
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
河源下载站-cngr.cn.url
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
淘宝热卖.url
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
淘宝热卖.url
Resource
win10v2004-20241007-en
General
-
Target
挖掘鸡7.2最新版_cngr.exe
-
Size
1.7MB
-
MD5
f37023c41ae712e20595650fcc5f06d2
-
SHA1
f1d0887b2d2c3788b73ba4aefcc0d060d6bfeedd
-
SHA256
7d5bd56ecfdac63df44fc80c9b5bc2fdf55d491d0ab20edbb3a2ad6825cce076
-
SHA512
8b27218a41f69e743f11630eb31e5d8af472c688598f438f057a3f65aa2c2644eacd39286aecb090c2343e94ed481a1a291382402b297a7a7b52949ff6c2e643
-
SSDEEP
24576:nZXBJxLVwqSdNLRlJMXVWxaC5wa1tqqdXE+86TZStU4gf2EW5A2DJr/kS4vGIk6O:FrxBHofJMXGnrvi+RTZh43Dp/wPHXW
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral2/files/0x0008000000023cb8-2.dat modiloader_stage2 behavioral2/memory/4984-9-0x0000000000400000-0x00000000004BF000-memory.dmp modiloader_stage2 -
Executes dropped EXE 4 IoCs
pid Process 3512 EXE_temp0.exe 4984 EXE_temp1.exe 3652 EXE_temp2.exe 2632 recyclers-s-5-1-21.exe -
Loads dropped DLL 2 IoCs
pid Process 2632 recyclers-s-5-1-21.exe 2632 recyclers-s-5-1-21.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2396 3512 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 挖掘鸡7.2最新版_cngr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXE_temp0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXE_temp1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXE_temp2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language recyclers-s-5-1-21.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ recyclers-s-5-1-21.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" recyclers-s-5-1-21.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" recyclers-s-5-1-21.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" recyclers-s-5-1-21.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" recyclers-s-5-1-21.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3652 EXE_temp2.exe Token: SeDebugPrivilege 2632 recyclers-s-5-1-21.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2632 recyclers-s-5-1-21.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2632 recyclers-s-5-1-21.exe 2632 recyclers-s-5-1-21.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 428 wrote to memory of 3512 428 挖掘鸡7.2最新版_cngr.exe 85 PID 428 wrote to memory of 3512 428 挖掘鸡7.2最新版_cngr.exe 85 PID 428 wrote to memory of 3512 428 挖掘鸡7.2最新版_cngr.exe 85 PID 428 wrote to memory of 4984 428 挖掘鸡7.2最新版_cngr.exe 86 PID 428 wrote to memory of 4984 428 挖掘鸡7.2最新版_cngr.exe 86 PID 428 wrote to memory of 4984 428 挖掘鸡7.2最新版_cngr.exe 86 PID 428 wrote to memory of 3652 428 挖掘鸡7.2最新版_cngr.exe 87 PID 428 wrote to memory of 3652 428 挖掘鸡7.2最新版_cngr.exe 87 PID 428 wrote to memory of 3652 428 挖掘鸡7.2最新版_cngr.exe 87 PID 4984 wrote to memory of 2864 4984 EXE_temp1.exe 89 PID 4984 wrote to memory of 2864 4984 EXE_temp1.exe 89 PID 2632 wrote to memory of 4132 2632 recyclers-s-5-1-21.exe 93 PID 2632 wrote to memory of 4132 2632 recyclers-s-5-1-21.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\挖掘鸡7.2最新版_cngr.exe"C:\Users\Admin\AppData\Local\Temp\挖掘鸡7.2最新版_cngr.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Users\Admin\AppData\Local\Temp\EXE_temp0.exe"C:\Users\Admin\AppData\Local\Temp\EXE_temp0.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3512 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3512 -s 5043⤵
- Program crash
PID:2396
-
-
-
C:\Users\Admin\AppData\Local\Temp\EXE_temp1.exe"C:\Users\Admin\AppData\Local\Temp\EXE_temp1.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"3⤵PID:2864
-
-
-
C:\Users\Admin\AppData\Local\Temp\EXE_temp2.exe"C:\Users\Admin\AppData\Local\Temp\EXE_temp2.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3652
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3512 -ip 35121⤵PID:2144
-
C:\RECYCLER\recyclers-s-5-1-21.exeC:\RECYCLER\recyclers-s-5-1-21.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:4132
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
51KB
MD5aefafdd5c9b62db20fd28e0f935263e8
SHA13df1cb906cc6180776143b3cc8dd77d2d6956d59
SHA2569550cb7dcb5aae17c30239da490f44b782c0be45f626073a83cfafd45c9e8d3e
SHA512e3e953bcede18dbd183defe2e60c1ba654cec65eaa7a8d483f262b77d76cdbba1a13a9adfd8804f586ccf6ae69f3053f8963d9d4c1193df17a5209fa06c53d40
-
Filesize
250KB
MD5eec13aa4885914e23037b5d69f982cd5
SHA1feccd45713f84c5e3729b0660fdb054cb816df34
SHA256bf4739756d5282358b208bb75f0dd1af879cbfb3e9ff92cb670b98ba7b7c6ea9
SHA51242ddb099c48b17aab6a53004cdc62bb96695ead2bcbde055749ad30a9c56f04733b7e47d227120a1000eb97ece33b077a1076d37a2735102600b4fdc2829cd11
-
Filesize
681KB
MD5b8d8384b8ff97032e7230dd020763ebd
SHA121b53995c976ac5e9d749ce090ee7494beeca44d
SHA25643d33251a3ccfa19c940d875d1861a9f1606eaa3afdecc2c30118e2dd9a5a0d7
SHA5127a04e45417b8571cf0722fbcbd40f693da9c6a9bbca72e1577ae3b6024dd3df88cb07b87efc300f584a16e2dd4d64834841939d2bef3365e39e0b362f5cda13e
-
Filesize
795KB
MD56d4c27a39686689f98a83de90383ebc8
SHA113c37e67230033dc729c99c83da593f1af634908
SHA25660b79787052c00e26c733a04facb040c4d7f81b10b9b3b4ae423930b640c0d43
SHA512d29e2f043e1b6c71620658e5e3b510fde14407b28089bbbbdb12015ba7d0d21b290f6985e28b359fe9763066c4326f8734c066b427e0f0c05fb439a85a1f5748