Analysis

  • max time kernel
    68s
  • max time network
    73s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    03-01-2025 12:58

General

  • Target

    225d85788ef9d270589ba5c23aa533ff563e5a94498b8f3706307a7453e7f1d9N.exe

  • Size

    708KB

  • MD5

    910d8bc2b7a25b17690e7d8bd93cbac0

  • SHA1

    3da5cd11e5c3734e172e46f5aee7689077e194d7

  • SHA256

    225d85788ef9d270589ba5c23aa533ff563e5a94498b8f3706307a7453e7f1d9

  • SHA512

    88e7faa98b0338a47256cbaed9e1265ce86dafd1902179c2d1b41f0f4ce864af432be9c294b69336ae444444c123c3a77d846a72c0adb9faec866edd0f279020

  • SSDEEP

    12288:Fglx4CxSr1hKdOactGbPbo9Lb9zq25flnyw1pra6iGR/Tkus:Oljx81hKdOalbPbo9H9WGyw11iGR/Tkj

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\225d85788ef9d270589ba5c23aa533ff563e5a94498b8f3706307a7453e7f1d9N.exe
    "C:\Users\Admin\AppData\Local\Temp\225d85788ef9d270589ba5c23aa533ff563e5a94498b8f3706307a7453e7f1d9N.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2380
    • C:\program files\internet explorer\IEXPLORE.EXE
      "C:\program files\internet explorer\IEXPLORE.EXE"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2892
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2892 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2840

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5635742d9020aa857b5071bb876ccbfe

    SHA1

    10f273fced28937c2b115a17a0fe540db42acaf4

    SHA256

    686a59dcd399ded91b8fa8abc0811638931aa208b7136f81d375e35d22d07fab

    SHA512

    1a679b11ad437d2c2c1ab3f8a7f1cab6460981f3a85be24cb9980847a01833489a607c825d4a7aafb2b03679da75f99d9bb2696c0c85b6dbfb94241b934321ec

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    653989bf30d216963f01db9e88d25054

    SHA1

    98c171c9eadcc0a4aa2a8c63c5b91873b54b2d0f

    SHA256

    00b4e49037a873e53126ddf25e3c355e41c7089f8910c294fca6091240ca802d

    SHA512

    e57d8e3333fc5b919ac849e32107719ea4f7d12bef639bf34b3aeed765eb6cc43919fcfa7a1d4c3265a2eb588603223c4f63507d1ec2e3a5860daea3c684495e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c253a74fbc480d877020c8b02715860c

    SHA1

    266a9698949687e5b152884e77e3e54c572eccab

    SHA256

    f032657b578785008bf7a925c52110d9f207fbc5077df47deae2565880db6762

    SHA512

    787008f7bcb05a1ef8f438fe29ab0fd66cecc68518d40d296c8a0e32019cae1f72c06bb2c296f783c1e243ab2203c07ce4d683b1384c79e6d136b9347e9ed6b8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3facd16814c0bd428ba952564d766ef5

    SHA1

    861bc51d4faf8d9dec782daa3f714239a39c6216

    SHA256

    6dac1cc25565bc37557856e2c0ec9de1c56e419d57e88dc562f3e4fac5b3b967

    SHA512

    29bf4a40c86fda9502bf1a80fe888d33d04ad763f33e48766a63981cfff832f60c7ab42c1275d49e79a2868fa20b4900962fe90170c046e0a9ef871b63c403fd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d45a5e3a1995878ae4e267a2f9f626bb

    SHA1

    d50af36bf1305f29460c4d851ba6a2d32e7ffe45

    SHA256

    8ba77e33b729322b7a8464fa4558a79be9d1f3ddc5e5847825f2cf9262a56682

    SHA512

    89eda64e7083d4cd070bd7931b248364b1af5798c1a88115ad00d9c4ddc920bfe33c3d96e283718e448958bd7a5a87a20e2281f9a777f20c0cc5f98729b8ed27

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8f901afcb54ae2dc017b9bef618efddd

    SHA1

    732b6fb4c32f6e465263c2e8f6b20878bf3dac3d

    SHA256

    bcacc7ee449b755b02bf6f33ffde764b08153be36e709ee897b184e4fac12e11

    SHA512

    5766acbe9068248d88addeb443cc97976bb3f4cc9a5fa881a72f2e20128b2f7eb5058bcdc84d86f0a01b04d760e2715759a2e794c4fdbed544554f4322c3bb0e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f7a60176294b2f01191bd8c353c2fd08

    SHA1

    ff8ae8af996f4e359bb4acfc39e14fb4f7f5144b

    SHA256

    b0dcdd1fbc9001cb1d2901875b8bc6f15f4ad5fa5087d455554ec3a1a0bf3977

    SHA512

    550c2d1cf228bd232c34af3c5dd89a33141ddea3e9293160031445375b419bab1a9ec962b96a96c0350ff61e68570cf6dc9d72a52449aaf88f637c55bc1f11c6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0666d641528cc61140d5465e1a736aac

    SHA1

    18b5f2b32653f946572988d2ac3d8d10afc83376

    SHA256

    302d1a9606ac0321e18dbbf0f399ae86b23a2085dc6f72096385dd8069c8d6a5

    SHA512

    6149073d14a5b0899b627abae9f0d9e223057e89b684aa6b401dc098e9fc21dfa500e8888becb1ef95636b0f6d4d35a436e39013f52675f953f211a69cd01d6a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7c6fc7b5f37196192632ae4acbdf71cd

    SHA1

    97b02fd0f99615230a3d5ee2f2cf5a55bf886c70

    SHA256

    75d0f2a41bcc21e2c05f2061c5eb70d8ff85f5f96393ff7009e990a7e1aaab28

    SHA512

    2ad38fcfcef7e530f808a3359723e379de701ee4f84bf6a83e68e7ca7863b76218f4a932fc13e5ae7d15e42a584d0df164d8cd27865a97b082448ed6c12af13b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    394a70682bcda026bdcea6b3063f59ce

    SHA1

    76c92f500eea54f7db0af778e1ae698c1d260f8f

    SHA256

    aa83e3ec021963a5bc93a24f98b24a87f8b5db007c0b691fb8a910b4d031e76f

    SHA512

    b9a6927812a22f3aff9bf5286ecb69f4f31fb1d16ff177f0bafa5be6b2b0aff0e53f572cf40b60181377e87d5423d64a6023f412197954bc78641063e6842a61

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    068f087762d5c8a196eea742d22c750a

    SHA1

    a39ef50c536c62936ff9a2b0ed13b21232606c9f

    SHA256

    d597b46868b8f0af6b1ed0f1e7806150721687d2067ab494781d4a81ed85af33

    SHA512

    d8027047efa487f07a0d777e54e4661218ce2e2afba7f76eaa498f905278697b6d3c2443d3f91bd9874521210e7ffbbd13f7b0ae0021abd1346162c9017fd58b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cedb246ae504ca7f70d129ea26742c1b

    SHA1

    80d8136c29cef9cddba562cb3567dcbec6b7ba27

    SHA256

    610bbe3463f5f643bfe28f5c69042b0d6bcf97c5172123ca5e045426398ab1df

    SHA512

    619406ab9194b10ed558378550e7312823328fb188b6ea3b34fe5097d7a95cf6d7d55f92420be651e623a859a950949ad2537f3922d74e4244f22e3d89fc614c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cbe7490670ddf1cfe2824787b8e08ad4

    SHA1

    bb6b955fc9404d053d7f41472ecbdaa47b31c73c

    SHA256

    85df07b33c1ff02d7949d3c8b6bcba7cf8954b6ee07afcf63a0ed7a727bd5609

    SHA512

    234012f6687ea7e99e1c75ff19fbb84b01c0d5deb18d8d582f88a17e491a20101b46695f5c2453afdbad3726149ec5f7b9290b1bf4502457f780f54379a90d41

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c01371c6b5bfc48c18426f45ee95ed52

    SHA1

    f519e5880ee02c21e019c9c33017ee183c918edd

    SHA256

    b69f9bac1ba8d91adde9ccb4d017708a13f18560453c5528f4b058d30b00f53a

    SHA512

    a6b73788bf1dd23f9224764cccf207276ee34ba38f3e7f4050cb717ad5accdabeb881decee9b9f09927be75315ffd572bfb95c4fcfe100bd2310ff68492a4531

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c475ddb171e4fec9fcda61c70fcc4425

    SHA1

    fc02d70fea7f64d2f7016fd3553d204c20c9adee

    SHA256

    ec564b9d85457285e3844c6a4ba879b439ecbef24c5c2850b1b484aa5339091e

    SHA512

    223802013478f078b6104a94a2bb15e127c4180c6f2fbdcf49bcdad816a38be8b972bc66116a705e60d7bd1aeff63b96ffd9aae890428ea16ac5c95171099e5e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e462b3a9af39e5496ebf7c053ad89aa4

    SHA1

    d0aa432994ed2f7c48ac743e890882033570284e

    SHA256

    1631c512427a2cb1d6020d8d7f74051be4ac8950ee12f927ad32066770a3552a

    SHA512

    c40319514708c2a74306633f08e3fb0bb492a9667fec3970a491cb007e7613d52944b841f1de7bb700be34320a23ccb7de9c4a659bf619f874bd22d25b82382f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4a99869cae76344c0cd3a889d9bc6773

    SHA1

    a84628cc51fc26b10ad8ad76e620984931e218be

    SHA256

    6019950f5923e90972ac10431a96153cdd16fdca2644141470e52a5ae9616ab2

    SHA512

    904db63f75487e3836515d58d105f80c8f717424092b1e795e6ea5fff4a7e5e196e6b987b17dce774597996a26b38bfac7180fa2cd45d878925fe3df629bf30d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    26fa67f764784cecf9dd5e6c6ee6a088

    SHA1

    553a4aaef7251dd6d42aac1c2abcc25db8c6967c

    SHA256

    e501c8cf1776bdc0083fcab63cb5e75848abed547c76843f58bca2b89eab49d7

    SHA512

    606d9b08c39ce36e0aa879f8c7d35ca76a7f3a8b1a1f7a8006bd9d0ea9ebcaa5190b01959b9850d1e60a80c26dec1ef5eb670fb539af98697fd8b2bd663073f7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    71386557fbb7edd792e97acf57b1f604

    SHA1

    79ec70966329401aa1221e964598ef587324966f

    SHA256

    d4f42a823ace0622e6846d07ae6782270d2ec494ef5ac9daa95314fad81a0e65

    SHA512

    3fdddeda9276c90ebf0c34e31e72070f82b7960f2dda4e5320d68514a31e818d06c05430ad88e8075d481ade3d6d1b6769727913e94328009a98dbe7c4e79b0b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a6d96365497b92e8f949cbbc1210d4d3

    SHA1

    54a6ea68492064091e16337e5b8333b004a1a012

    SHA256

    f3346e75839850455bc910da897546b9600297984da5707b3567289aa8562e19

    SHA512

    3e29ad1c5af3f6a8d05995d31ff4f6e02611d26809e5340a53d95829d574255c89557e47332d23b8a0cf6b8442992db7f56686e1f1bd8e67d5ca88adf797579e

  • C:\Users\Admin\AppData\Local\Temp\Cab49CF.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar4A9D.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2380-3-0x0000000000400000-0x00000000004BB000-memory.dmp

    Filesize

    748KB

  • memory/2380-0-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/2892-2-0x0000000000210000-0x00000000002CB000-memory.dmp

    Filesize

    748KB