Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-01-2025 02:33
Behavioral task
behavioral1
Sample
72c8cbdabd25c283b8be4333c4513e3edfbe5edd488744ff9f010ed13a780640.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
72c8cbdabd25c283b8be4333c4513e3edfbe5edd488744ff9f010ed13a780640.exe
Resource
win10v2004-20241007-en
General
-
Target
72c8cbdabd25c283b8be4333c4513e3edfbe5edd488744ff9f010ed13a780640.exe
-
Size
90KB
-
MD5
429d04548758a6742d96fae1a086059f
-
SHA1
2356d3cbcce1d1c888c12867660381c8730336e4
-
SHA256
72c8cbdabd25c283b8be4333c4513e3edfbe5edd488744ff9f010ed13a780640
-
SHA512
3c33a89961cd9e67660fc8bd0bd4280aca94dc5076d9c716f03dade917fa7218879fa3a40d1eb63df95fad9be02e95e01dc2bf461d906af7f204f08b254aba8d
-
SSDEEP
1536:UiYwjQt6QJvzZsgDIWzm/xsXfv+hYhyQQyV5uv4JBrB7w5VRGulTG1ZCL8nj1oDK:0wjZQJvzZsgsW6/Afv+hYfQIm4/rdE3Y
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 4 IoCs
resource yara_rule behavioral2/memory/3240-55-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 behavioral2/memory/3240-58-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 behavioral2/memory/3240-57-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 behavioral2/memory/3240-63-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 72c8cbdabd25c283b8be4333c4513e3edfbe5edd488744ff9f010ed13a780640.exe -
Executes dropped EXE 3 IoCs
pid Process 2844 csrsll.exe 3480 csrsll.exe 3240 csrsll.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Win Pdf = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\csrsll.exe" reg.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1312 set thread context of 1772 1312 72c8cbdabd25c283b8be4333c4513e3edfbe5edd488744ff9f010ed13a780640.exe 84 PID 2844 set thread context of 3480 2844 csrsll.exe 94 PID 2844 set thread context of 3240 2844 csrsll.exe 95 -
resource yara_rule behavioral2/memory/1312-0-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral2/memory/1312-5-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral2/memory/1772-7-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/1772-9-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/1312-11-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral2/memory/1772-13-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/files/0x0008000000023c73-29.dat upx behavioral2/memory/2844-36-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral2/memory/1772-40-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/2844-41-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral2/memory/2844-42-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral2/memory/3240-47-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/3240-52-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/3240-55-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/3240-58-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/3240-57-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/2844-56-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral2/memory/1772-61-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3480-62-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3240-63-0x0000000000400000-0x0000000000414000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csrsll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csrsll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csrsll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 72c8cbdabd25c283b8be4333c4513e3edfbe5edd488744ff9f010ed13a780640.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 72c8cbdabd25c283b8be4333c4513e3edfbe5edd488744ff9f010ed13a780640.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3480 csrsll.exe Token: SeDebugPrivilege 3480 csrsll.exe Token: SeDebugPrivilege 3480 csrsll.exe Token: SeDebugPrivilege 3480 csrsll.exe Token: SeDebugPrivilege 3480 csrsll.exe Token: SeDebugPrivilege 3480 csrsll.exe Token: SeDebugPrivilege 3480 csrsll.exe Token: SeDebugPrivilege 3480 csrsll.exe Token: SeDebugPrivilege 3480 csrsll.exe Token: SeDebugPrivilege 3480 csrsll.exe Token: SeDebugPrivilege 3480 csrsll.exe Token: SeDebugPrivilege 3480 csrsll.exe Token: SeDebugPrivilege 3480 csrsll.exe Token: SeDebugPrivilege 3480 csrsll.exe Token: SeDebugPrivilege 3480 csrsll.exe Token: SeDebugPrivilege 3480 csrsll.exe Token: SeDebugPrivilege 3480 csrsll.exe Token: SeDebugPrivilege 3480 csrsll.exe Token: SeDebugPrivilege 3480 csrsll.exe Token: SeDebugPrivilege 3480 csrsll.exe Token: SeDebugPrivilege 3480 csrsll.exe Token: SeDebugPrivilege 3480 csrsll.exe Token: SeDebugPrivilege 3480 csrsll.exe Token: SeDebugPrivilege 3480 csrsll.exe Token: SeDebugPrivilege 3480 csrsll.exe Token: SeDebugPrivilege 3480 csrsll.exe Token: SeDebugPrivilege 3480 csrsll.exe Token: SeDebugPrivilege 3480 csrsll.exe Token: SeDebugPrivilege 3480 csrsll.exe Token: SeDebugPrivilege 3480 csrsll.exe Token: SeDebugPrivilege 3480 csrsll.exe Token: SeDebugPrivilege 3480 csrsll.exe Token: SeDebugPrivilege 3480 csrsll.exe Token: SeDebugPrivilege 3480 csrsll.exe Token: SeDebugPrivilege 3480 csrsll.exe Token: SeDebugPrivilege 3480 csrsll.exe Token: SeDebugPrivilege 3480 csrsll.exe Token: SeDebugPrivilege 3480 csrsll.exe Token: SeDebugPrivilege 3480 csrsll.exe Token: SeDebugPrivilege 3480 csrsll.exe Token: SeDebugPrivilege 3480 csrsll.exe Token: SeDebugPrivilege 3480 csrsll.exe Token: SeDebugPrivilege 3480 csrsll.exe Token: SeDebugPrivilege 3480 csrsll.exe Token: SeDebugPrivilege 3480 csrsll.exe Token: SeDebugPrivilege 3480 csrsll.exe Token: SeDebugPrivilege 3480 csrsll.exe Token: SeDebugPrivilege 3480 csrsll.exe Token: SeDebugPrivilege 3480 csrsll.exe Token: SeDebugPrivilege 3480 csrsll.exe Token: SeDebugPrivilege 3480 csrsll.exe Token: SeDebugPrivilege 3480 csrsll.exe Token: SeDebugPrivilege 3480 csrsll.exe Token: SeDebugPrivilege 3480 csrsll.exe Token: SeDebugPrivilege 3480 csrsll.exe Token: SeDebugPrivilege 3480 csrsll.exe Token: SeDebugPrivilege 3480 csrsll.exe Token: SeDebugPrivilege 3480 csrsll.exe Token: SeDebugPrivilege 3480 csrsll.exe Token: SeDebugPrivilege 3480 csrsll.exe Token: SeDebugPrivilege 3480 csrsll.exe Token: SeDebugPrivilege 3480 csrsll.exe Token: SeDebugPrivilege 3480 csrsll.exe Token: SeDebugPrivilege 3480 csrsll.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1312 72c8cbdabd25c283b8be4333c4513e3edfbe5edd488744ff9f010ed13a780640.exe 1772 72c8cbdabd25c283b8be4333c4513e3edfbe5edd488744ff9f010ed13a780640.exe 2844 csrsll.exe 3480 csrsll.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1312 wrote to memory of 1772 1312 72c8cbdabd25c283b8be4333c4513e3edfbe5edd488744ff9f010ed13a780640.exe 84 PID 1312 wrote to memory of 1772 1312 72c8cbdabd25c283b8be4333c4513e3edfbe5edd488744ff9f010ed13a780640.exe 84 PID 1312 wrote to memory of 1772 1312 72c8cbdabd25c283b8be4333c4513e3edfbe5edd488744ff9f010ed13a780640.exe 84 PID 1312 wrote to memory of 1772 1312 72c8cbdabd25c283b8be4333c4513e3edfbe5edd488744ff9f010ed13a780640.exe 84 PID 1312 wrote to memory of 1772 1312 72c8cbdabd25c283b8be4333c4513e3edfbe5edd488744ff9f010ed13a780640.exe 84 PID 1312 wrote to memory of 1772 1312 72c8cbdabd25c283b8be4333c4513e3edfbe5edd488744ff9f010ed13a780640.exe 84 PID 1312 wrote to memory of 1772 1312 72c8cbdabd25c283b8be4333c4513e3edfbe5edd488744ff9f010ed13a780640.exe 84 PID 1312 wrote to memory of 1772 1312 72c8cbdabd25c283b8be4333c4513e3edfbe5edd488744ff9f010ed13a780640.exe 84 PID 1772 wrote to memory of 1788 1772 72c8cbdabd25c283b8be4333c4513e3edfbe5edd488744ff9f010ed13a780640.exe 85 PID 1772 wrote to memory of 1788 1772 72c8cbdabd25c283b8be4333c4513e3edfbe5edd488744ff9f010ed13a780640.exe 85 PID 1772 wrote to memory of 1788 1772 72c8cbdabd25c283b8be4333c4513e3edfbe5edd488744ff9f010ed13a780640.exe 85 PID 1788 wrote to memory of 2216 1788 cmd.exe 88 PID 1788 wrote to memory of 2216 1788 cmd.exe 88 PID 1788 wrote to memory of 2216 1788 cmd.exe 88 PID 1772 wrote to memory of 2844 1772 72c8cbdabd25c283b8be4333c4513e3edfbe5edd488744ff9f010ed13a780640.exe 89 PID 1772 wrote to memory of 2844 1772 72c8cbdabd25c283b8be4333c4513e3edfbe5edd488744ff9f010ed13a780640.exe 89 PID 1772 wrote to memory of 2844 1772 72c8cbdabd25c283b8be4333c4513e3edfbe5edd488744ff9f010ed13a780640.exe 89 PID 2844 wrote to memory of 3480 2844 csrsll.exe 94 PID 2844 wrote to memory of 3480 2844 csrsll.exe 94 PID 2844 wrote to memory of 3480 2844 csrsll.exe 94 PID 2844 wrote to memory of 3480 2844 csrsll.exe 94 PID 2844 wrote to memory of 3480 2844 csrsll.exe 94 PID 2844 wrote to memory of 3480 2844 csrsll.exe 94 PID 2844 wrote to memory of 3480 2844 csrsll.exe 94 PID 2844 wrote to memory of 3480 2844 csrsll.exe 94 PID 2844 wrote to memory of 3240 2844 csrsll.exe 95 PID 2844 wrote to memory of 3240 2844 csrsll.exe 95 PID 2844 wrote to memory of 3240 2844 csrsll.exe 95 PID 2844 wrote to memory of 3240 2844 csrsll.exe 95 PID 2844 wrote to memory of 3240 2844 csrsll.exe 95 PID 2844 wrote to memory of 3240 2844 csrsll.exe 95 PID 2844 wrote to memory of 3240 2844 csrsll.exe 95 PID 2844 wrote to memory of 3240 2844 csrsll.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\72c8cbdabd25c283b8be4333c4513e3edfbe5edd488744ff9f010ed13a780640.exe"C:\Users\Admin\AppData\Local\Temp\72c8cbdabd25c283b8be4333c4513e3edfbe5edd488744ff9f010ed13a780640.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Users\Admin\AppData\Local\Temp\72c8cbdabd25c283b8be4333c4513e3edfbe5edd488744ff9f010ed13a780640.exe"C:\Users\Admin\AppData\Local\Temp\72c8cbdabd25c283b8be4333c4513e3edfbe5edd488744ff9f010ed13a780640.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JLYBG.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Win Pdf" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2216
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3480
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3240
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
145B
MD54eb61ec7816c34ec8c125acadc57ec1b
SHA1b0015cc865c0bb1a027be663027d3829401a31cc
SHA25608375cdb2e9819391f67f71e9718c15b48d3eaa452c54bd8fdd1f6a42e899aff
SHA512f289f01d996dd643560370be8cdf8894e9a676ca3813f706c01ef5d705b9b18246c6cadf10d96edd433a616637b8a78fbd23c5738e76f1c4e671977b6d0cb6c1
-
Filesize
90KB
MD57627c9efec6f593c9e8160b6d9698eda
SHA1b1fcf38f0ed52a253d95be7d670d1816f1bd07d2
SHA2564b1dd8e5635f3a5ee8e516600af752cc00bff6e9f6fec4353b61f52233861a48
SHA51219736387f0dffa81d176452f9925770a48fdfc053f72566bd56fa0ac29f2521d2ca21bd644442881971459086a06a25d7058c9e087bfee89803b47a978e6f377