Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-12-2024 21:46
Behavioral task
behavioral1
Sample
e8efbb14a3fdb433e11f64993092a18c0c6605ef10f655cdf7dabf2d4a951e5e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e8efbb14a3fdb433e11f64993092a18c0c6605ef10f655cdf7dabf2d4a951e5e.exe
Resource
win10v2004-20241007-en
General
-
Target
e8efbb14a3fdb433e11f64993092a18c0c6605ef10f655cdf7dabf2d4a951e5e.exe
-
Size
2.2MB
-
MD5
88f65230b988517b529f15ee1f173b3c
-
SHA1
5dd29ced644415f87d106b340eba656eb9eae311
-
SHA256
e8efbb14a3fdb433e11f64993092a18c0c6605ef10f655cdf7dabf2d4a951e5e
-
SHA512
46ac27d80b61939f0fef7d5493866274f95494bcfb855751d8b82d6677ef2aef1d6fc9f26b1dbeb217277abe4408ccbc3c75dfc37bc552f31085dc31e99e0c91
-
SSDEEP
49152:4n7JG9CyViR+Y9ZYVCiIrNDctSXXEeXzAAAL:yV+C0nYoItyg9AL
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader First Stage 5 IoCs
resource yara_rule behavioral1/memory/1204-0-0x0000000000400000-0x000000000098F000-memory.dmp modiloader_stage1 behavioral1/memory/1204-4-0x0000000000400000-0x000000000098F000-memory.dmp modiloader_stage1 behavioral1/memory/1204-7-0x0000000000400000-0x000000000098F000-memory.dmp modiloader_stage1 behavioral1/memory/1204-11-0x0000000000400000-0x000000000098F000-memory.dmp modiloader_stage1 behavioral1/memory/1204-13-0x0000000000400000-0x000000000098F000-memory.dmp modiloader_stage1 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e8efbb14a3fdb433e11f64993092a18c0c6605ef10f655cdf7dabf2d4a951e5e.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{237561AB-1162-5837-1307-251216710420}\Info e8efbb14a3fdb433e11f64993092a18c0c6605ef10f655cdf7dabf2d4a951e5e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node e8efbb14a3fdb433e11f64993092a18c0c6605ef10f655cdf7dabf2d4a951e5e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID e8efbb14a3fdb433e11f64993092a18c0c6605ef10f655cdf7dabf2d4a951e5e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{237561AB-1162-5837-1307-251216710420} e8efbb14a3fdb433e11f64993092a18c0c6605ef10f655cdf7dabf2d4a951e5e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{237561AB-1162-5837-1307-251216710420}\Info e8efbb14a3fdb433e11f64993092a18c0c6605ef10f655cdf7dabf2d4a951e5e.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{237561AB-1162-5837-1307-251216710420}\Info\Data = 0062567724625677814c0d7858fa180098fa54778cf918001cf91800aafa547798fa1800cd1e5a776d7b400ffeffffff24625677fc1e8776340000c00d095276e4fa1800091f87762001000080fa180088fa18006ce3557784fa180002000000000000000000000020010000000000008cf91800340000c090332c0000000000602c2c000000000066003700640061006200660032006400340061003900350031006500350065002e00650078006500000000000000aa004844af00000000001800001825000e000200000000000000602c2c0000000000e843af00010000004044af0010fa180003e05577e4fa180058fa1800000000004044af0024fa180088e655770000aa00000000004844af0034fa1800ac82b3f2e50b00004c04b1f18af882bc60fa180000055977ac82b3f22a0c00000eb967faeb50d7c61a00000000000000000000009cfa18000000000080fa18000c0000000d000000962b69002e000000ac72ac04e8071801b4fa18009e2a6900acfa18009c010000ecfa1800cc2a6900d42a69005056990004d59a0004d59a0004322e30304a49fc770aed3f0f0000008c2f69009c01180049fc770a49fc770add4ae64005000d0015002e00 e8efbb14a3fdb433e11f64993092a18c0c6605ef10f655cdf7dabf2d4a951e5e.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1204 e8efbb14a3fdb433e11f64993092a18c0c6605ef10f655cdf7dabf2d4a951e5e.exe 1204 e8efbb14a3fdb433e11f64993092a18c0c6605ef10f655cdf7dabf2d4a951e5e.exe 1204 e8efbb14a3fdb433e11f64993092a18c0c6605ef10f655cdf7dabf2d4a951e5e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8efbb14a3fdb433e11f64993092a18c0c6605ef10f655cdf7dabf2d4a951e5e.exe"C:\Users\Admin\AppData\Local\Temp\e8efbb14a3fdb433e11f64993092a18c0c6605ef10f655cdf7dabf2d4a951e5e.exe"1⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1204