Analysis

  • max time kernel
    117s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    16/01/2025, 07:24

General

  • Target

    PI ITS15235 (2).doc

  • Size

    143KB

  • MD5

    059f7753a76e86c8ed56f480041d631f

  • SHA1

    c356187bee23b8930e82ba2cea112873b39567d4

  • SHA256

    ce3681ec2e62af9f0231b1a32a7319766d8193d0ff86c69691176f4cd404f129

  • SHA512

    94ce1aff40a57a963dabec69fbc969dbc27ff7289ca07a21233379a415cca52fbc69cbab722afef149077ab3647798192332b6afd5500d3189206728dc22f81b

  • SSDEEP

    1536:17dgmjjy2lQkySTUb2roegTK+g9WomfaQjSqttJnkL5mS9kBwNR42q3V:1ZPjbTU+J799IjSqtteL5N9kBF2

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 58 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Drops file in Windows directory 1 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\PI ITS15235 (2).doc"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2460
    • C:\Users\Admin\AppData\Local\Temp\brightness.exe
      "brightness.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2672
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2672 -s 692
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:1604
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:3056

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \Users\Admin\AppData\Local\Temp\brightness.exe

      Filesize

      834KB

      MD5

      aea0bcdbddbeabfde26f53671890d1b7

      SHA1

      5a3cb9126f222bab082eae67e961d45a5e0529e4

      SHA256

      4e38df6415cd9a8857c5ff4185da103fa8585e8a589ff2286eaf7317e3d10755

      SHA512

      5701919429ca56e0a885dcf3c7a05c5c60974738371c55e844e78a841d13080cc93278ccf96372ed4ec616247d09587cffe005a4607a7949c7dce123701dfdcf

    • memory/2460-0-0x000000002F361000-0x000000002F362000-memory.dmp

      Filesize

      4KB

    • memory/2460-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2460-2-0x0000000070C9D000-0x0000000070CA8000-memory.dmp

      Filesize

      44KB

    • memory/2460-6-0x0000000000720000-0x0000000000820000-memory.dmp

      Filesize

      1024KB

    • memory/2460-5-0x0000000000720000-0x0000000000820000-memory.dmp

      Filesize

      1024KB

    • memory/2460-4-0x0000000000720000-0x0000000000820000-memory.dmp

      Filesize

      1024KB

    • memory/2460-24-0x0000000070C9D000-0x0000000070CA8000-memory.dmp

      Filesize

      44KB

    • memory/2460-25-0x0000000000720000-0x0000000000820000-memory.dmp

      Filesize

      1024KB

    • memory/2672-15-0x0000000000260000-0x0000000000261000-memory.dmp

      Filesize

      4KB

    • memory/2672-17-0x0000000003020000-0x0000000004020000-memory.dmp

      Filesize

      16.0MB

    • memory/2672-19-0x0000000003020000-0x0000000004020000-memory.dmp

      Filesize

      16.0MB

    • memory/2672-26-0x0000000000400000-0x00000000004D9000-memory.dmp

      Filesize

      868KB

    • memory/2672-30-0x0000000003020000-0x0000000004020000-memory.dmp

      Filesize

      16.0MB

    • memory/2672-29-0x0000000003020000-0x0000000004020000-memory.dmp

      Filesize

      16.0MB

    • memory/2672-28-0x0000000003020000-0x0000000004020000-memory.dmp

      Filesize

      16.0MB

    • memory/2672-90-0x0000000003020000-0x0000000004020000-memory.dmp

      Filesize

      16.0MB

    • memory/2672-85-0x0000000003020000-0x0000000004020000-memory.dmp

      Filesize

      16.0MB

    • memory/2672-82-0x0000000003020000-0x0000000004020000-memory.dmp

      Filesize

      16.0MB

    • memory/2672-79-0x0000000003020000-0x0000000004020000-memory.dmp

      Filesize

      16.0MB

    • memory/2672-73-0x0000000003020000-0x0000000004020000-memory.dmp

      Filesize

      16.0MB

    • memory/2672-69-0x0000000003020000-0x0000000004020000-memory.dmp

      Filesize

      16.0MB

    • memory/2672-66-0x0000000003020000-0x0000000004020000-memory.dmp

      Filesize

      16.0MB

    • memory/2672-63-0x0000000003020000-0x0000000004020000-memory.dmp

      Filesize

      16.0MB

    • memory/2672-58-0x0000000003020000-0x0000000004020000-memory.dmp

      Filesize

      16.0MB

    • memory/2672-55-0x0000000003020000-0x0000000004020000-memory.dmp

      Filesize

      16.0MB

    • memory/2672-50-0x0000000003020000-0x0000000004020000-memory.dmp

      Filesize

      16.0MB

    • memory/2672-47-0x0000000003020000-0x0000000004020000-memory.dmp

      Filesize

      16.0MB

    • memory/2672-43-0x0000000003020000-0x0000000004020000-memory.dmp

      Filesize

      16.0MB

    • memory/2672-39-0x0000000003020000-0x0000000004020000-memory.dmp

      Filesize

      16.0MB

    • memory/2672-36-0x0000000003020000-0x0000000004020000-memory.dmp

      Filesize

      16.0MB

    • memory/2672-33-0x0000000003020000-0x0000000004020000-memory.dmp

      Filesize

      16.0MB

    • memory/2672-31-0x0000000003020000-0x0000000004020000-memory.dmp

      Filesize

      16.0MB

    • memory/2672-75-0x0000000003020000-0x0000000004020000-memory.dmp

      Filesize

      16.0MB

    • memory/2672-74-0x0000000003020000-0x0000000004020000-memory.dmp

      Filesize

      16.0MB

    • memory/2672-72-0x0000000003020000-0x0000000004020000-memory.dmp

      Filesize

      16.0MB

    • memory/2672-71-0x0000000003020000-0x0000000004020000-memory.dmp

      Filesize

      16.0MB

    • memory/2672-70-0x0000000003020000-0x0000000004020000-memory.dmp

      Filesize

      16.0MB

    • memory/2672-68-0x0000000003020000-0x0000000004020000-memory.dmp

      Filesize

      16.0MB

    • memory/2672-67-0x0000000003020000-0x0000000004020000-memory.dmp

      Filesize

      16.0MB

    • memory/2672-65-0x0000000003020000-0x0000000004020000-memory.dmp

      Filesize

      16.0MB

    • memory/2672-64-0x0000000003020000-0x0000000004020000-memory.dmp

      Filesize

      16.0MB

    • memory/2672-62-0x0000000003020000-0x0000000004020000-memory.dmp

      Filesize

      16.0MB

    • memory/2672-61-0x0000000003020000-0x0000000004020000-memory.dmp

      Filesize

      16.0MB

    • memory/2672-59-0x0000000003020000-0x0000000004020000-memory.dmp

      Filesize

      16.0MB

    • memory/2672-56-0x0000000003020000-0x0000000004020000-memory.dmp

      Filesize

      16.0MB

    • memory/2672-54-0x0000000003020000-0x0000000004020000-memory.dmp

      Filesize

      16.0MB

    • memory/2672-53-0x0000000003020000-0x0000000004020000-memory.dmp

      Filesize

      16.0MB

    • memory/2672-52-0x0000000003020000-0x0000000004020000-memory.dmp

      Filesize

      16.0MB

    • memory/2672-49-0x0000000003020000-0x0000000004020000-memory.dmp

      Filesize

      16.0MB

    • memory/2672-48-0x0000000003020000-0x0000000004020000-memory.dmp

      Filesize

      16.0MB

    • memory/2672-46-0x0000000003020000-0x0000000004020000-memory.dmp

      Filesize

      16.0MB

    • memory/2672-45-0x0000000003020000-0x0000000004020000-memory.dmp

      Filesize

      16.0MB

    • memory/2672-42-0x0000000003020000-0x0000000004020000-memory.dmp

      Filesize

      16.0MB

    • memory/2672-41-0x0000000003020000-0x0000000004020000-memory.dmp

      Filesize

      16.0MB

    • memory/2672-40-0x0000000003020000-0x0000000004020000-memory.dmp

      Filesize

      16.0MB

    • memory/2672-37-0x0000000003020000-0x0000000004020000-memory.dmp

      Filesize

      16.0MB

    • memory/2672-35-0x0000000003020000-0x0000000004020000-memory.dmp

      Filesize

      16.0MB

    • memory/2672-34-0x0000000003020000-0x0000000004020000-memory.dmp

      Filesize

      16.0MB

    • memory/2672-32-0x0000000003020000-0x0000000004020000-memory.dmp

      Filesize

      16.0MB

    • memory/2672-60-0x0000000003020000-0x0000000004020000-memory.dmp

      Filesize

      16.0MB

    • memory/2672-57-0x0000000003020000-0x0000000004020000-memory.dmp

      Filesize

      16.0MB

    • memory/2672-51-0x0000000003020000-0x0000000004020000-memory.dmp

      Filesize

      16.0MB

    • memory/2672-44-0x0000000003020000-0x0000000004020000-memory.dmp

      Filesize

      16.0MB

    • memory/2672-38-0x0000000003020000-0x0000000004020000-memory.dmp

      Filesize

      16.0MB

    • memory/2672-107-0x0000000003020000-0x0000000004020000-memory.dmp

      Filesize

      16.0MB

    • memory/2672-103-0x0000000003020000-0x0000000004020000-memory.dmp

      Filesize

      16.0MB

    • memory/2672-100-0x0000000003020000-0x0000000004020000-memory.dmp

      Filesize

      16.0MB

    • memory/2672-97-0x0000000003020000-0x0000000004020000-memory.dmp

      Filesize

      16.0MB

    • memory/2672-94-0x0000000003020000-0x0000000004020000-memory.dmp

      Filesize

      16.0MB