Analysis

  • max time kernel
    890s
  • max time network
    413s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241211-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    07-01-2025 19:01

General

  • Target

    Client.exe

  • Size

    3.4MB

  • MD5

    96b45a03dcf66efe05bc4d585281bdd1

  • SHA1

    0f8ac17b72a43418b3c9a1aace204228e26c32ab

  • SHA256

    0d72b72773bb854b9dcdc83c5a0f76bcc5a6a1a344f28f81500d6aaaf8d2e69d

  • SHA512

    c8f6da8d660b5875b71601620d7e66571c2190223ce6005bbdecaa47fec45c162e50bbb640b457e379ab62bf86985b5f338430d22dcbcf4f28356c8e92c3ecab

  • SSDEEP

    49152:93Xec2c6RsjdmQbInhWTRTTRMqTy4moMbbo9ALzjg4z7gDN:9v6RsihkRYX1IMjgqKN

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 5 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Client.exe
    "C:\Users\Admin\AppData\Local\Temp\Client.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:4560

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Settings.ini

    Filesize

    20B

    MD5

    93732eb3b7cf28e39930d3a9849f59b2

    SHA1

    b500da9c440cf02bf5d902c193ba1ea55f6700af

    SHA256

    dfc1e0b6b06ea3c55897e5d4eb4bf732072cefdd4d7c9958b06c56ebc1d1d0b9

    SHA512

    06f41406f1c2ca30ed300c567f8c7aae775fb3b06379e836bf3232f7699e8042e4947246745da889ca58fcf44a988f4217fb9dd00a57a81dcacd767d405dff47

  • memory/4560-0-0x0000000000A90000-0x0000000000A91000-memory.dmp

    Filesize

    4KB

  • memory/4560-16-0x00000000074D0000-0x00000000074D1000-memory.dmp

    Filesize

    4KB

  • memory/4560-18-0x0000000000A90000-0x0000000000A91000-memory.dmp

    Filesize

    4KB

  • memory/4560-17-0x0000000000400000-0x000000000076E000-memory.dmp

    Filesize

    3.4MB

  • memory/4560-19-0x00000000074D0000-0x00000000074D1000-memory.dmp

    Filesize

    4KB

  • memory/4560-21-0x0000000000400000-0x000000000076E000-memory.dmp

    Filesize

    3.4MB

  • memory/4560-22-0x0000000000400000-0x000000000076E000-memory.dmp

    Filesize

    3.4MB

  • memory/4560-23-0x0000000000400000-0x000000000076E000-memory.dmp

    Filesize

    3.4MB

  • memory/4560-25-0x0000000000400000-0x000000000076E000-memory.dmp

    Filesize

    3.4MB