Overview
overview
10Static
static
7AutoPath.dll
windows7-x64
5AutoPath.dll
windows10-2004-x64
5BOOKMARK.dll
windows7-x64
3BOOKMARK.dll
windows10-2004-x64
3Cmdline.dll
windows7-x64
3Cmdline.dll
windows10-2004-x64
3DBGHELP.dll
windows7-x64
3DBGHELP.dll
windows10-2004-x64
3DeJunk.dll
windows7-x64
3DeJunk.dll
windows10-2004-x64
3EXPLORER.exe
windows7-x64
3EXPLORER.exe
windows10-2004-x64
3Importer.dll
windows7-x64
3Importer.dll
windows10-2004-x64
3Loaddll fi...er.exe
windows7-x64
1Loaddll fi...er.exe
windows10-2004-x64
3ODBHELP.dll
windows7-x64
3ODBHELP.dll
windows10-2004-x64
3OllyDbg Russian.exe
windows7-x64
3OllyDbg Russian.exe
windows10-2004-x64
3OllyICE.exe
windows7-x64
10OllyICE.exe
windows10-2004-x64
10OllyIXE.exe
windows7-x64
10OllyIXE.exe
windows10-2004-x64
10MiniSafe.exe
windows7-x64
3MiniSafe.exe
windows10-2004-x64
3Olly.Hard.Point.dll
windows7-x64
3Olly.Hard.Point.dll
windows10-2004-x64
3OllySafe.sys
windows7-x64
1OllySafe.sys
windows10-2004-x64
1Ollydbg.exe
windows7-x64
3Ollydbg.exe
windows10-2004-x64
3Analysis
-
max time kernel
140s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-12-2024 03:50
Behavioral task
behavioral1
Sample
AutoPath.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
AutoPath.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
BOOKMARK.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
BOOKMARK.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Cmdline.dll
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
Cmdline.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
DBGHELP.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
DBGHELP.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
DeJunk.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
DeJunk.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
EXPLORER.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
EXPLORER.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Importer.dll
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
Importer.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Loaddll fix by heXer.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
Loaddll fix by heXer.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
ODBHELP.dll
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
ODBHELP.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
OllyDbg Russian.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
OllyDbg Russian.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
OllyICE.exe
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
OllyICE.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
OllyIXE.exe
Resource
win7-20240729-en
Behavioral task
behavioral24
Sample
OllyIXE.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
MiniSafe.exe
Resource
win7-20241023-en
Behavioral task
behavioral26
Sample
MiniSafe.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
Olly.Hard.Point.dll
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
Olly.Hard.Point.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
OllySafe.sys
Resource
win7-20241010-en
Behavioral task
behavioral30
Sample
OllySafe.sys
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
Ollydbg.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
Ollydbg.exe
Resource
win10v2004-20241007-en
General
-
Target
OllyIXE.exe
-
Size
1.2MB
-
MD5
6ee3935e71fffdc6a5e0dc864f027732
-
SHA1
3d9f62b5957a2ee75319bed684647c5ac0a1cbd2
-
SHA256
5d0c3643c2384c24176589cce3a6dc4bfc5ca74903adaaaad1806870da819fbc
-
SHA512
5294ed0822563d1f56ab4810372cffb51fe32efb112ff479da57b33664a964dfcdd7cf963a596b34aa80b50125b5089dc134df796c356cca9d813c2d56eecaf2
-
SSDEEP
24576:Wf5qaJnraHZ8aLswpZPPYQbx7WhdiY4GVhtb0+gOsVijuNA9:wOK8PYk7WHO1OsKue
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader First Stage 2 IoCs
resource yara_rule behavioral24/memory/3872-248-0x000000000DBD0000-0x000000000DCC0000-memory.dmp modiloader_stage1 behavioral24/memory/3872-250-0x000000000DBD0000-0x000000000DCC0000-memory.dmp modiloader_stage1 -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\kmwok.sys OllyIXE.exe -
resource yara_rule behavioral24/memory/3872-241-0x00000000070D0000-0x0000000007112000-memory.dmp upx behavioral24/memory/3872-247-0x00000000072A0000-0x00000000072BC000-memory.dmp upx behavioral24/memory/3872-248-0x000000000DBD0000-0x000000000DCC0000-memory.dmp upx behavioral24/memory/3872-246-0x0000000007270000-0x000000000727D000-memory.dmp upx behavioral24/memory/3872-250-0x000000000DBD0000-0x000000000DCC0000-memory.dmp upx behavioral24/memory/3872-300-0x000000000EA00000-0x000000000EA5B000-memory.dmp upx behavioral24/memory/3872-327-0x00000000070D0000-0x0000000007112000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OllyIXE.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 648 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3872 OllyIXE.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3872 OllyIXE.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD5b79c76b1625479c22d5e60107ec9dffd
SHA1caba15530d4299234ae3fd8d2f8a7dfabe6e2b03
SHA256c264643cd8581de2afa31db1de817e701ba9159f29422603b0f0d4c85d011d7c
SHA5120acaab0c697516b63b963bb0fed703bfa68193209d442efeb184badb4a8fd19abc3411b0c6d3344c5d08587fca75f2d40b50380341ee13cf0d1fac00adfb188a