Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17/01/2025, 16:03 UTC
Behavioral task
behavioral1
Sample
dc28d366c8aedaacdef334d27e73ac401bcd939b9281edf045fab62a69d21b18N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dc28d366c8aedaacdef334d27e73ac401bcd939b9281edf045fab62a69d21b18N.exe
Resource
win10v2004-20241007-en
General
-
Target
dc28d366c8aedaacdef334d27e73ac401bcd939b9281edf045fab62a69d21b18N.exe
-
Size
90KB
-
MD5
e461ae38fe15fdb5fb8db31e042b1a60
-
SHA1
6ea2112fbf6e19f3f1ea82d2c83a4588d7eb19e5
-
SHA256
dc28d366c8aedaacdef334d27e73ac401bcd939b9281edf045fab62a69d21b18
-
SHA512
8530165e540322dff9ce69d0feaaccf5c829453185589862b5cdf67a247eea62ed51002855171c962e226ac2e395894fa0a9f3fd2ec2f21857824b6bf8b83cd3
-
SSDEEP
1536:UiYwjQt6QJvzZsgDIWzm/xsXfv+hYhyQQyV5uv4JBrB7w5VRGulTG1ZCL8nj1oD7:0wjZQJvzZsgsW6/Afv+hYfQIm4/rdE3F
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 4 IoCs
resource yara_rule behavioral2/memory/1464-54-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 behavioral2/memory/1464-52-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 behavioral2/memory/1464-51-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 behavioral2/memory/1464-61-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation dc28d366c8aedaacdef334d27e73ac401bcd939b9281edf045fab62a69d21b18N.exe -
Executes dropped EXE 3 IoCs
pid Process 1732 csrsll.exe 4280 csrsll.exe 1464 csrsll.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Win Pdf = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\csrsll.exe" reg.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2420 set thread context of 3252 2420 dc28d366c8aedaacdef334d27e73ac401bcd939b9281edf045fab62a69d21b18N.exe 83 PID 1732 set thread context of 4280 1732 csrsll.exe 100 PID 1732 set thread context of 1464 1732 csrsll.exe 101 -
resource yara_rule behavioral2/memory/2420-0-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral2/memory/2420-5-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral2/memory/3252-7-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3252-9-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/2420-11-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral2/memory/3252-13-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/files/0x0008000000023cb3-29.dat upx behavioral2/memory/3252-39-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/1732-40-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral2/memory/1732-41-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral2/memory/1464-45-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/1464-50-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/1464-54-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/1732-56-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral2/memory/1464-52-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/1464-51-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/3252-59-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4280-60-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/1464-61-0x0000000000400000-0x0000000000414000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csrsll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csrsll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csrsll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dc28d366c8aedaacdef334d27e73ac401bcd939b9281edf045fab62a69d21b18N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dc28d366c8aedaacdef334d27e73ac401bcd939b9281edf045fab62a69d21b18N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4280 csrsll.exe Token: SeDebugPrivilege 4280 csrsll.exe Token: SeDebugPrivilege 4280 csrsll.exe Token: SeDebugPrivilege 4280 csrsll.exe Token: SeDebugPrivilege 4280 csrsll.exe Token: SeDebugPrivilege 4280 csrsll.exe Token: SeDebugPrivilege 4280 csrsll.exe Token: SeDebugPrivilege 4280 csrsll.exe Token: SeDebugPrivilege 4280 csrsll.exe Token: SeDebugPrivilege 4280 csrsll.exe Token: SeDebugPrivilege 4280 csrsll.exe Token: SeDebugPrivilege 4280 csrsll.exe Token: SeDebugPrivilege 4280 csrsll.exe Token: SeDebugPrivilege 4280 csrsll.exe Token: SeDebugPrivilege 4280 csrsll.exe Token: SeDebugPrivilege 4280 csrsll.exe Token: SeDebugPrivilege 4280 csrsll.exe Token: SeDebugPrivilege 4280 csrsll.exe Token: SeDebugPrivilege 4280 csrsll.exe Token: SeDebugPrivilege 4280 csrsll.exe Token: SeDebugPrivilege 4280 csrsll.exe Token: SeDebugPrivilege 4280 csrsll.exe Token: SeDebugPrivilege 4280 csrsll.exe Token: SeDebugPrivilege 4280 csrsll.exe Token: SeDebugPrivilege 4280 csrsll.exe Token: SeDebugPrivilege 4280 csrsll.exe Token: SeDebugPrivilege 4280 csrsll.exe Token: SeDebugPrivilege 4280 csrsll.exe Token: SeDebugPrivilege 4280 csrsll.exe Token: SeDebugPrivilege 4280 csrsll.exe Token: SeDebugPrivilege 4280 csrsll.exe Token: SeDebugPrivilege 4280 csrsll.exe Token: SeDebugPrivilege 4280 csrsll.exe Token: SeDebugPrivilege 4280 csrsll.exe Token: SeDebugPrivilege 4280 csrsll.exe Token: SeDebugPrivilege 4280 csrsll.exe Token: SeDebugPrivilege 4280 csrsll.exe Token: SeDebugPrivilege 4280 csrsll.exe Token: SeDebugPrivilege 4280 csrsll.exe Token: SeDebugPrivilege 4280 csrsll.exe Token: SeDebugPrivilege 4280 csrsll.exe Token: SeDebugPrivilege 4280 csrsll.exe Token: SeDebugPrivilege 4280 csrsll.exe Token: SeDebugPrivilege 4280 csrsll.exe Token: SeDebugPrivilege 4280 csrsll.exe Token: SeDebugPrivilege 4280 csrsll.exe Token: SeDebugPrivilege 4280 csrsll.exe Token: SeDebugPrivilege 4280 csrsll.exe Token: SeDebugPrivilege 4280 csrsll.exe Token: SeDebugPrivilege 4280 csrsll.exe Token: SeDebugPrivilege 4280 csrsll.exe Token: SeDebugPrivilege 4280 csrsll.exe Token: SeDebugPrivilege 4280 csrsll.exe Token: SeDebugPrivilege 4280 csrsll.exe Token: SeDebugPrivilege 4280 csrsll.exe Token: SeDebugPrivilege 4280 csrsll.exe Token: SeDebugPrivilege 4280 csrsll.exe Token: SeDebugPrivilege 4280 csrsll.exe Token: SeDebugPrivilege 4280 csrsll.exe Token: SeDebugPrivilege 4280 csrsll.exe Token: SeDebugPrivilege 4280 csrsll.exe Token: SeDebugPrivilege 4280 csrsll.exe Token: SeDebugPrivilege 4280 csrsll.exe Token: SeDebugPrivilege 4280 csrsll.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2420 dc28d366c8aedaacdef334d27e73ac401bcd939b9281edf045fab62a69d21b18N.exe 3252 dc28d366c8aedaacdef334d27e73ac401bcd939b9281edf045fab62a69d21b18N.exe 1732 csrsll.exe 4280 csrsll.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 2420 wrote to memory of 3252 2420 dc28d366c8aedaacdef334d27e73ac401bcd939b9281edf045fab62a69d21b18N.exe 83 PID 2420 wrote to memory of 3252 2420 dc28d366c8aedaacdef334d27e73ac401bcd939b9281edf045fab62a69d21b18N.exe 83 PID 2420 wrote to memory of 3252 2420 dc28d366c8aedaacdef334d27e73ac401bcd939b9281edf045fab62a69d21b18N.exe 83 PID 2420 wrote to memory of 3252 2420 dc28d366c8aedaacdef334d27e73ac401bcd939b9281edf045fab62a69d21b18N.exe 83 PID 2420 wrote to memory of 3252 2420 dc28d366c8aedaacdef334d27e73ac401bcd939b9281edf045fab62a69d21b18N.exe 83 PID 2420 wrote to memory of 3252 2420 dc28d366c8aedaacdef334d27e73ac401bcd939b9281edf045fab62a69d21b18N.exe 83 PID 2420 wrote to memory of 3252 2420 dc28d366c8aedaacdef334d27e73ac401bcd939b9281edf045fab62a69d21b18N.exe 83 PID 2420 wrote to memory of 3252 2420 dc28d366c8aedaacdef334d27e73ac401bcd939b9281edf045fab62a69d21b18N.exe 83 PID 3252 wrote to memory of 4312 3252 dc28d366c8aedaacdef334d27e73ac401bcd939b9281edf045fab62a69d21b18N.exe 86 PID 3252 wrote to memory of 4312 3252 dc28d366c8aedaacdef334d27e73ac401bcd939b9281edf045fab62a69d21b18N.exe 86 PID 3252 wrote to memory of 4312 3252 dc28d366c8aedaacdef334d27e73ac401bcd939b9281edf045fab62a69d21b18N.exe 86 PID 4312 wrote to memory of 2908 4312 cmd.exe 90 PID 4312 wrote to memory of 2908 4312 cmd.exe 90 PID 4312 wrote to memory of 2908 4312 cmd.exe 90 PID 3252 wrote to memory of 1732 3252 dc28d366c8aedaacdef334d27e73ac401bcd939b9281edf045fab62a69d21b18N.exe 91 PID 3252 wrote to memory of 1732 3252 dc28d366c8aedaacdef334d27e73ac401bcd939b9281edf045fab62a69d21b18N.exe 91 PID 3252 wrote to memory of 1732 3252 dc28d366c8aedaacdef334d27e73ac401bcd939b9281edf045fab62a69d21b18N.exe 91 PID 1732 wrote to memory of 4280 1732 csrsll.exe 100 PID 1732 wrote to memory of 4280 1732 csrsll.exe 100 PID 1732 wrote to memory of 4280 1732 csrsll.exe 100 PID 1732 wrote to memory of 4280 1732 csrsll.exe 100 PID 1732 wrote to memory of 4280 1732 csrsll.exe 100 PID 1732 wrote to memory of 4280 1732 csrsll.exe 100 PID 1732 wrote to memory of 4280 1732 csrsll.exe 100 PID 1732 wrote to memory of 4280 1732 csrsll.exe 100 PID 1732 wrote to memory of 1464 1732 csrsll.exe 101 PID 1732 wrote to memory of 1464 1732 csrsll.exe 101 PID 1732 wrote to memory of 1464 1732 csrsll.exe 101 PID 1732 wrote to memory of 1464 1732 csrsll.exe 101 PID 1732 wrote to memory of 1464 1732 csrsll.exe 101 PID 1732 wrote to memory of 1464 1732 csrsll.exe 101 PID 1732 wrote to memory of 1464 1732 csrsll.exe 101 PID 1732 wrote to memory of 1464 1732 csrsll.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc28d366c8aedaacdef334d27e73ac401bcd939b9281edf045fab62a69d21b18N.exe"C:\Users\Admin\AppData\Local\Temp\dc28d366c8aedaacdef334d27e73ac401bcd939b9281edf045fab62a69d21b18N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\dc28d366c8aedaacdef334d27e73ac401bcd939b9281edf045fab62a69d21b18N.exe"C:\Users\Admin\AppData\Local\Temp\dc28d366c8aedaacdef334d27e73ac401bcd939b9281edf045fab62a69d21b18N.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\GMRDB.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Win Pdf" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2908
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4280
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1464
-
-
-
Network
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Request172.210.232.199.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request228.249.119.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request167.173.78.104.in-addr.arpaIN PTRResponse167.173.78.104.in-addr.arpaIN PTRa104-78-173-167deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Requestbillabong4102.no-ip.bizIN AResponse
-
Remote address:8.8.8.8:53Request149.220.183.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestbillabong4102.no-ip.bizIN AResponse
-
Remote address:8.8.8.8:53Requestbillabong4102.no-ip.bizIN AResponse
-
Remote address:8.8.8.8:53Request197.87.175.4.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request241.42.69.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestbillabong4102.no-ip.bizIN AResponse
-
Remote address:8.8.8.8:53Request172.190.18.2.in-addr.arpaIN PTRResponse172.190.18.2.in-addr.arpaIN PTRa2-18-190-172deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Requestbillabong4102.no-ip.bizIN AResponse
-
Remote address:8.8.8.8:53Requestbillabong4102.no-ip.bizIN AResponse
-
Remote address:8.8.8.8:53Requestbillabong4102.no-ip.bizIN AResponse
-
Remote address:8.8.8.8:53Requestbillabong4102.no-ip.bizIN AResponse
-
Remote address:8.8.8.8:53Requestbillabong4102.no-ip.bizIN AResponse
-
Remote address:8.8.8.8:53Requestbillabong4102.no-ip.bizIN AResponse
-
Remote address:8.8.8.8:53Request102.168.16.2.in-addr.arpaIN PTRResponse102.168.16.2.in-addr.arpaIN PTRa2-16-168-102deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Requestbillabong4102.no-ip.bizIN AResponse
-
Remote address:8.8.8.8:53Requestbillabong4102.no-ip.bizIN AResponse
-
Remote address:8.8.8.8:53Requestbillabong4102.no-ip.bizIN AResponse
-
Remote address:8.8.8.8:53Requestbillabong4102.no-ip.bizIN AResponse
-
Remote address:8.8.8.8:53Requestbillabong4102.no-ip.bizIN AResponse
-
Remote address:8.8.8.8:53Requestbillabong4102.no-ip.bizIN AResponse
-
Remote address:8.8.8.8:53Request181.129.81.91.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request29.243.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestbillabong4102.no-ip.bizIN AResponse
-
Remote address:8.8.8.8:53Requestbillabong4102.no-ip.bizIN AResponse
-
Remote address:8.8.8.8:53Requestbillabong4102.no-ip.bizIN AResponse
-
Remote address:8.8.8.8:53Requestbillabong4102.no-ip.bizIN AResponse
-
Remote address:8.8.8.8:53Requestbillabong4102.no-ip.bizIN AResponse
-
66 B 90 B 1 1
DNS Request
8.8.8.8.in-addr.arpa
-
74 B 128 B 1 1
DNS Request
172.210.232.199.in-addr.arpa
-
73 B 159 B 1 1
DNS Request
228.249.119.40.in-addr.arpa
-
73 B 139 B 1 1
DNS Request
167.173.78.104.in-addr.arpa
-
69 B 129 B 1 1
DNS Request
billabong4102.no-ip.biz
-
73 B 147 B 1 1
DNS Request
149.220.183.52.in-addr.arpa
-
69 B 129 B 1 1
DNS Request
billabong4102.no-ip.biz
-
69 B 129 B 1 1
DNS Request
billabong4102.no-ip.biz
-
71 B 157 B 1 1
DNS Request
197.87.175.4.in-addr.arpa
-
71 B 145 B 1 1
DNS Request
241.42.69.40.in-addr.arpa
-
69 B 129 B 1 1
DNS Request
billabong4102.no-ip.biz
-
71 B 135 B 1 1
DNS Request
172.190.18.2.in-addr.arpa
-
69 B 129 B 1 1
DNS Request
billabong4102.no-ip.biz
-
69 B 129 B 1 1
DNS Request
billabong4102.no-ip.biz
-
69 B 129 B 1 1
DNS Request
billabong4102.no-ip.biz
-
69 B 129 B 1 1
DNS Request
billabong4102.no-ip.biz
-
69 B 129 B 1 1
DNS Request
billabong4102.no-ip.biz
-
69 B 129 B 1 1
DNS Request
billabong4102.no-ip.biz
-
71 B 135 B 1 1
DNS Request
102.168.16.2.in-addr.arpa
-
69 B 129 B 1 1
DNS Request
billabong4102.no-ip.biz
-
69 B 129 B 1 1
DNS Request
billabong4102.no-ip.biz
-
69 B 129 B 1 1
DNS Request
billabong4102.no-ip.biz
-
69 B 129 B 1 1
DNS Request
billabong4102.no-ip.biz
-
69 B 129 B 1 1
DNS Request
billabong4102.no-ip.biz
-
69 B 129 B 1 1
DNS Request
billabong4102.no-ip.biz
-
72 B 147 B 1 1
DNS Request
181.129.81.91.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
29.243.111.52.in-addr.arpa
-
69 B 129 B 1 1
DNS Request
billabong4102.no-ip.biz
-
69 B 129 B 1 1
DNS Request
billabong4102.no-ip.biz
-
69 B 129 B 1 1
DNS Request
billabong4102.no-ip.biz
-
69 B 129 B 1 1
DNS Request
billabong4102.no-ip.biz
-
69 B 129 B 1 1
DNS Request
billabong4102.no-ip.biz
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
145B
MD54eb61ec7816c34ec8c125acadc57ec1b
SHA1b0015cc865c0bb1a027be663027d3829401a31cc
SHA25608375cdb2e9819391f67f71e9718c15b48d3eaa452c54bd8fdd1f6a42e899aff
SHA512f289f01d996dd643560370be8cdf8894e9a676ca3813f706c01ef5d705b9b18246c6cadf10d96edd433a616637b8a78fbd23c5738e76f1c4e671977b6d0cb6c1
-
Filesize
90KB
MD559e9e38409a00adf04ac129e5cd11cda
SHA1f237e874bfcf45b2b3f970c75f4e8cd6510175fd
SHA25652a3f5b439e86c7b652270f7621d94695b4ad56cda824292939ce3825afa42c7
SHA51290d10759c17888c42baeeb8c1858f80bf684a8eb465d2929b2056bc00dd13c12eda0015dae111201f86b31f257b774b3660ace2a2e8d414ee5b1cab703e3ea10