Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
26-12-2024 07:12
Behavioral task
behavioral1
Sample
2960e092ebea34f381a2c1c432539fa70a90b98e139cf5f5447199695c39d3e2.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2960e092ebea34f381a2c1c432539fa70a90b98e139cf5f5447199695c39d3e2.exe
Resource
win10v2004-20241007-en
General
-
Target
2960e092ebea34f381a2c1c432539fa70a90b98e139cf5f5447199695c39d3e2.exe
-
Size
572KB
-
MD5
6a30964871471e3774a54dbca5e0f7b4
-
SHA1
6ace0f8c9010455e2cd5f0f12e09bfb86af5c9ff
-
SHA256
2960e092ebea34f381a2c1c432539fa70a90b98e139cf5f5447199695c39d3e2
-
SHA512
67c1485c6d1ffd3ad02b64ed86d9afcc75c3d99cbe52cb28c6f12f0f5d9624d576731b2d0807bb5d0d00b8f75710d3aa6734bec0621aac9e99676e54b50c41f5
-
SSDEEP
12288:us2w8hvkR2OWhNlGIZ0igJTtCThXP68d+FRCZtR8WHxh7bBIr0i:T2wC88OWhDDsJTtoNgDKrphWgi
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral1/memory/2300-27-0x0000000000400000-0x0000000000496000-memory.dmp modiloader_stage2 -
Executes dropped EXE 2 IoCs
pid Process 1724 ßáíä.exe 2392 ßáíä.exe -
Loads dropped DLL 3 IoCs
pid Process 2300 2960e092ebea34f381a2c1c432539fa70a90b98e139cf5f5447199695c39d3e2.exe 2300 2960e092ebea34f381a2c1c432539fa70a90b98e139cf5f5447199695c39d3e2.exe 1724 ßáíä.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1724 set thread context of 2392 1724 ßáíä.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2960e092ebea34f381a2c1c432539fa70a90b98e139cf5f5447199695c39d3e2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ßáíä.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main ßáíä.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes ßáíä.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadUpdates = "398336" ßáíä.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} ßáíä.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\SuggestionsURLFallback = "http://www.google.com/cse?cx=partner-pub-9588033570232632:rhmyra-cwbb&q={searchTerms}" ßáíä.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\URL = "http://www.google.com/cse?cx=partner-pub-9588033570232632:rhmyra-cwbb&q={searchTerms}" ßáíä.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\DisplayName = "Google" ßáíä.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "file://localhost/C:/www.google.com.htm" ßáíä.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2392 ßáíä.exe 2392 ßáíä.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2944 DllHost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2944 DllHost.exe 2944 DllHost.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2300 wrote to memory of 1724 2300 2960e092ebea34f381a2c1c432539fa70a90b98e139cf5f5447199695c39d3e2.exe 30 PID 2300 wrote to memory of 1724 2300 2960e092ebea34f381a2c1c432539fa70a90b98e139cf5f5447199695c39d3e2.exe 30 PID 2300 wrote to memory of 1724 2300 2960e092ebea34f381a2c1c432539fa70a90b98e139cf5f5447199695c39d3e2.exe 30 PID 2300 wrote to memory of 1724 2300 2960e092ebea34f381a2c1c432539fa70a90b98e139cf5f5447199695c39d3e2.exe 30 PID 1724 wrote to memory of 2392 1724 ßáíä.exe 31 PID 1724 wrote to memory of 2392 1724 ßáíä.exe 31 PID 1724 wrote to memory of 2392 1724 ßáíä.exe 31 PID 1724 wrote to memory of 2392 1724 ßáíä.exe 31 PID 1724 wrote to memory of 2392 1724 ßáíä.exe 31 PID 1724 wrote to memory of 2392 1724 ßáíä.exe 31 PID 1724 wrote to memory of 2392 1724 ßáíä.exe 31 PID 2392 wrote to memory of 1396 2392 ßáíä.exe 21 PID 2392 wrote to memory of 1396 2392 ßáíä.exe 21 PID 2392 wrote to memory of 1396 2392 ßáíä.exe 21 PID 2392 wrote to memory of 1396 2392 ßáíä.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1396
-
C:\Users\Admin\AppData\Local\Temp\2960e092ebea34f381a2c1c432539fa70a90b98e139cf5f5447199695c39d3e2.exe"C:\Users\Admin\AppData\Local\Temp\2960e092ebea34f381a2c1c432539fa70a90b98e139cf5f5447199695c39d3e2.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\ßáíä.exe"C:\Users\Admin\AppData\Local\Temp\ßáíä.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\ßáíä.exeC:\Users\Admin\AppData\Local\Temp\ßáíä.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2392
-
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2944
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
495KB
MD5c5a27cd076ba0c97d261674c3a30234d
SHA15e00601aed5769978366fbbad502e43212041c6c
SHA2569367ccc0dfcc1c920451e78766c9c1b5592be64e9b50c3d4350cbf09db86ba92
SHA51264c6c08c41583dda07f5a1ef49d4711d83533bcd77e96480c53db10d8d3c77452d5a075b78d7eb26bce58cab69063ec192bf729bb1ac409cea5be72f7c7942f6
-
Filesize
66KB
MD51ac0da80e149e476bc101f584d50bf85
SHA1295af024da94c7bff9af72a0c8ce6656fcf48d23
SHA256df662e9284f3da2a5b66d52920d832a796cf9ce7c944e1cf84f7cbf431be1c5a
SHA5122854fa55fead865e640576e91b652dd2ebdf536d1790031ac9c850bfeac7c8b67cdb5a15b00fdd29356452a93b2d36731aec13a062e83d1e696709efc5706172