Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2024 21:21
Static task
static1
Behavioral task
behavioral1
Sample
c9e82a4359cc99fcf53b2dd93b41c7d385af977700df33558a6bf26ecafc642aN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c9e82a4359cc99fcf53b2dd93b41c7d385af977700df33558a6bf26ecafc642aN.exe
Resource
win10v2004-20241007-en
General
-
Target
c9e82a4359cc99fcf53b2dd93b41c7d385af977700df33558a6bf26ecafc642aN.exe
-
Size
300KB
-
MD5
68ce3677fb39228c6abbb3b7d9cbe800
-
SHA1
8c9bb4b2f48c86f9171b5f21096376a27a6565a8
-
SHA256
c9e82a4359cc99fcf53b2dd93b41c7d385af977700df33558a6bf26ecafc642a
-
SHA512
e51488f571fd63a09b93790d875db9cf39971457f8016ce042165b17921847eaaa2e499b8854ac28722c40b5185c878f2753ccde0beafd90cb3c6d4e9f0dd50a
-
SSDEEP
3072:Ue2A0wxDqUpM5scww4chO+O1BmP5DG0sg3i4XZ9WvDZHwdRX/L+gP38GU:UsxD5cwohO+O1sVG0/pZ6iPC8a
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 4 IoCs
resource yara_rule behavioral2/memory/4828-54-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 behavioral2/memory/4828-53-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 behavioral2/memory/4828-51-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 behavioral2/memory/4828-59-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation c9e82a4359cc99fcf53b2dd93b41c7d385af977700df33558a6bf26ecafc642aN.exe -
Executes dropped EXE 3 IoCs
pid Process 2996 csrsll.exe 1880 csrsll.exe 4828 csrsll.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Win Pdf = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\csrsll.exe" reg.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 540 set thread context of 676 540 c9e82a4359cc99fcf53b2dd93b41c7d385af977700df33558a6bf26ecafc642aN.exe 84 PID 2996 set thread context of 1880 2996 csrsll.exe 96 PID 2996 set thread context of 4828 2996 csrsll.exe 97 -
resource yara_rule behavioral2/memory/676-6-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/676-8-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/676-10-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/676-37-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4828-54-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/4828-53-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/4828-52-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/4828-51-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/4828-46-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/676-56-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/1880-58-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4828-59-0x0000000000400000-0x0000000000414000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c9e82a4359cc99fcf53b2dd93b41c7d385af977700df33558a6bf26ecafc642aN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c9e82a4359cc99fcf53b2dd93b41c7d385af977700df33558a6bf26ecafc642aN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csrsll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csrsll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csrsll.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1880 csrsll.exe Token: SeDebugPrivilege 1880 csrsll.exe Token: SeDebugPrivilege 1880 csrsll.exe Token: SeDebugPrivilege 1880 csrsll.exe Token: SeDebugPrivilege 1880 csrsll.exe Token: SeDebugPrivilege 1880 csrsll.exe Token: SeDebugPrivilege 1880 csrsll.exe Token: SeDebugPrivilege 1880 csrsll.exe Token: SeDebugPrivilege 1880 csrsll.exe Token: SeDebugPrivilege 1880 csrsll.exe Token: SeDebugPrivilege 1880 csrsll.exe Token: SeDebugPrivilege 1880 csrsll.exe Token: SeDebugPrivilege 1880 csrsll.exe Token: SeDebugPrivilege 1880 csrsll.exe Token: SeDebugPrivilege 1880 csrsll.exe Token: SeDebugPrivilege 1880 csrsll.exe Token: SeDebugPrivilege 1880 csrsll.exe Token: SeDebugPrivilege 1880 csrsll.exe Token: SeDebugPrivilege 1880 csrsll.exe Token: SeDebugPrivilege 1880 csrsll.exe Token: SeDebugPrivilege 1880 csrsll.exe Token: SeDebugPrivilege 1880 csrsll.exe Token: SeDebugPrivilege 1880 csrsll.exe Token: SeDebugPrivilege 1880 csrsll.exe Token: SeDebugPrivilege 1880 csrsll.exe Token: SeDebugPrivilege 1880 csrsll.exe Token: SeDebugPrivilege 1880 csrsll.exe Token: SeDebugPrivilege 1880 csrsll.exe Token: SeDebugPrivilege 1880 csrsll.exe Token: SeDebugPrivilege 1880 csrsll.exe Token: SeDebugPrivilege 1880 csrsll.exe Token: SeDebugPrivilege 1880 csrsll.exe Token: SeDebugPrivilege 1880 csrsll.exe Token: SeDebugPrivilege 1880 csrsll.exe Token: SeDebugPrivilege 1880 csrsll.exe Token: SeDebugPrivilege 1880 csrsll.exe Token: SeDebugPrivilege 1880 csrsll.exe Token: SeDebugPrivilege 1880 csrsll.exe Token: SeDebugPrivilege 1880 csrsll.exe Token: SeDebugPrivilege 1880 csrsll.exe Token: SeDebugPrivilege 1880 csrsll.exe Token: SeDebugPrivilege 1880 csrsll.exe Token: SeDebugPrivilege 1880 csrsll.exe Token: SeDebugPrivilege 1880 csrsll.exe Token: SeDebugPrivilege 1880 csrsll.exe Token: SeDebugPrivilege 1880 csrsll.exe Token: SeDebugPrivilege 1880 csrsll.exe Token: SeDebugPrivilege 1880 csrsll.exe Token: SeDebugPrivilege 1880 csrsll.exe Token: SeDebugPrivilege 1880 csrsll.exe Token: SeDebugPrivilege 1880 csrsll.exe Token: SeDebugPrivilege 1880 csrsll.exe Token: SeDebugPrivilege 1880 csrsll.exe Token: SeDebugPrivilege 1880 csrsll.exe Token: SeDebugPrivilege 1880 csrsll.exe Token: SeDebugPrivilege 1880 csrsll.exe Token: SeDebugPrivilege 1880 csrsll.exe Token: SeDebugPrivilege 1880 csrsll.exe Token: SeDebugPrivilege 1880 csrsll.exe Token: SeDebugPrivilege 1880 csrsll.exe Token: SeDebugPrivilege 1880 csrsll.exe Token: SeDebugPrivilege 1880 csrsll.exe Token: SeDebugPrivilege 1880 csrsll.exe Token: SeDebugPrivilege 1880 csrsll.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 540 c9e82a4359cc99fcf53b2dd93b41c7d385af977700df33558a6bf26ecafc642aN.exe 676 c9e82a4359cc99fcf53b2dd93b41c7d385af977700df33558a6bf26ecafc642aN.exe 2996 csrsll.exe 1880 csrsll.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 540 wrote to memory of 676 540 c9e82a4359cc99fcf53b2dd93b41c7d385af977700df33558a6bf26ecafc642aN.exe 84 PID 540 wrote to memory of 676 540 c9e82a4359cc99fcf53b2dd93b41c7d385af977700df33558a6bf26ecafc642aN.exe 84 PID 540 wrote to memory of 676 540 c9e82a4359cc99fcf53b2dd93b41c7d385af977700df33558a6bf26ecafc642aN.exe 84 PID 540 wrote to memory of 676 540 c9e82a4359cc99fcf53b2dd93b41c7d385af977700df33558a6bf26ecafc642aN.exe 84 PID 540 wrote to memory of 676 540 c9e82a4359cc99fcf53b2dd93b41c7d385af977700df33558a6bf26ecafc642aN.exe 84 PID 540 wrote to memory of 676 540 c9e82a4359cc99fcf53b2dd93b41c7d385af977700df33558a6bf26ecafc642aN.exe 84 PID 540 wrote to memory of 676 540 c9e82a4359cc99fcf53b2dd93b41c7d385af977700df33558a6bf26ecafc642aN.exe 84 PID 540 wrote to memory of 676 540 c9e82a4359cc99fcf53b2dd93b41c7d385af977700df33558a6bf26ecafc642aN.exe 84 PID 676 wrote to memory of 1092 676 c9e82a4359cc99fcf53b2dd93b41c7d385af977700df33558a6bf26ecafc642aN.exe 85 PID 676 wrote to memory of 1092 676 c9e82a4359cc99fcf53b2dd93b41c7d385af977700df33558a6bf26ecafc642aN.exe 85 PID 676 wrote to memory of 1092 676 c9e82a4359cc99fcf53b2dd93b41c7d385af977700df33558a6bf26ecafc642aN.exe 85 PID 1092 wrote to memory of 2500 1092 cmd.exe 89 PID 1092 wrote to memory of 2500 1092 cmd.exe 89 PID 1092 wrote to memory of 2500 1092 cmd.exe 89 PID 676 wrote to memory of 2996 676 c9e82a4359cc99fcf53b2dd93b41c7d385af977700df33558a6bf26ecafc642aN.exe 90 PID 676 wrote to memory of 2996 676 c9e82a4359cc99fcf53b2dd93b41c7d385af977700df33558a6bf26ecafc642aN.exe 90 PID 676 wrote to memory of 2996 676 c9e82a4359cc99fcf53b2dd93b41c7d385af977700df33558a6bf26ecafc642aN.exe 90 PID 2996 wrote to memory of 1880 2996 csrsll.exe 96 PID 2996 wrote to memory of 1880 2996 csrsll.exe 96 PID 2996 wrote to memory of 1880 2996 csrsll.exe 96 PID 2996 wrote to memory of 1880 2996 csrsll.exe 96 PID 2996 wrote to memory of 1880 2996 csrsll.exe 96 PID 2996 wrote to memory of 1880 2996 csrsll.exe 96 PID 2996 wrote to memory of 1880 2996 csrsll.exe 96 PID 2996 wrote to memory of 1880 2996 csrsll.exe 96 PID 2996 wrote to memory of 4828 2996 csrsll.exe 97 PID 2996 wrote to memory of 4828 2996 csrsll.exe 97 PID 2996 wrote to memory of 4828 2996 csrsll.exe 97 PID 2996 wrote to memory of 4828 2996 csrsll.exe 97 PID 2996 wrote to memory of 4828 2996 csrsll.exe 97 PID 2996 wrote to memory of 4828 2996 csrsll.exe 97 PID 2996 wrote to memory of 4828 2996 csrsll.exe 97 PID 2996 wrote to memory of 4828 2996 csrsll.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\c9e82a4359cc99fcf53b2dd93b41c7d385af977700df33558a6bf26ecafc642aN.exe"C:\Users\Admin\AppData\Local\Temp\c9e82a4359cc99fcf53b2dd93b41c7d385af977700df33558a6bf26ecafc642aN.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Users\Admin\AppData\Local\Temp\c9e82a4359cc99fcf53b2dd93b41c7d385af977700df33558a6bf26ecafc642aN.exe"C:\Users\Admin\AppData\Local\Temp\c9e82a4359cc99fcf53b2dd93b41c7d385af977700df33558a6bf26ecafc642aN.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\KPACF.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Win Pdf" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2500
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1880
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4828
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
145B
MD54eb61ec7816c34ec8c125acadc57ec1b
SHA1b0015cc865c0bb1a027be663027d3829401a31cc
SHA25608375cdb2e9819391f67f71e9718c15b48d3eaa452c54bd8fdd1f6a42e899aff
SHA512f289f01d996dd643560370be8cdf8894e9a676ca3813f706c01ef5d705b9b18246c6cadf10d96edd433a616637b8a78fbd23c5738e76f1c4e671977b6d0cb6c1
-
Filesize
300KB
MD5bb67fe6ad29baea411b12717cac3702d
SHA16457e2f23b789f6b61a5e72d932cee7ff601677e
SHA2566e310fe5f7f75655e8160c0aaca86f3156539e002e06f77c8c911c51e3f7313f
SHA5127c5c42c51ca57027314879f68990eeb95fd3a0b091d5380f59762f37d5367e9371a14b41140cfea9893053cf33c5342582868dc56e42f1d3a3b2b3c9d716e19f