Analysis

  • max time kernel
    150s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/01/2025, 10:29

General

  • Target

    Swift_Bank_Usd.exe

  • Size

    1.3MB

  • MD5

    e1c02c1d4632b25e53d62d7c93ec6888

  • SHA1

    f0818dbc450af307a2e353d7de6a5b42c95264d7

  • SHA256

    a3d49aa02f3249b3a41dae94f3b181a205b954e8ad7e4acc1bccf7de535b8c6f

  • SHA512

    a20c7d5615cbad44151d76f35e6d38f55095ee77be2ccbdcdfde0544f83ecaa15b274676158526fbc6cadd1b7dece9b23f0dea161cceb9cbb4fdfc650c714240

  • SSDEEP

    24576:JUWe1lsIh7u57Mhl0Siz+h4dYEXvVzlFjG31di:JClztlpiz+adRvVR2D

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 61 IoCs
  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Script User-Agent 2 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Swift_Bank_Usd.exe
    "C:\Users\Admin\AppData\Local\Temp\Swift_Bank_Usd.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2176
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Public\JpeicqlpF.cmd" "
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1644
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Public\Libraries\FX.cmd
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:384
      • C:\Windows \SysWOW64\svchost.pif
        "C:\Windows \SysWOW64\svchost.pif"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2172
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Public\Libraries\NEO.cmd
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:312
          • C:\Windows\system32\extrac32.exe
            extrac32 /C /Y C:\\Windows\\System32\\cmd.exe C:\\Users\\Public\\alpha.pif
            5⤵
              PID:2864
            • C:\Windows\system32\extrac32.exe
              extrac32 /C /Y C:\\Windows\\System32\\sc.exe C:\\Users\\Public\\Upha.pif
              5⤵
                PID:4488
              • C:\Windows\system32\extrac32.exe
                extrac32 /C /Y C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe C:\\Users\\Public\\aken.pif
                5⤵
                  PID:2324
                • C:\Users\Public\alpha.pif
                  C:\\Users\\Public\\alpha.pif /c C:\\Users\\Public\\Upha.pif create TrueSight binPath="C:\Windows \SysWOW64\truesight.sys" type= kernel start= auto
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of WriteProcessMemory
                  PID:2292
                  • C:\Users\Public\Upha.pif
                    C:\\Users\\Public\\Upha.pif create TrueSight binPath="C:\Windows \SysWOW64\truesight.sys" type= kernel start= auto
                    6⤵
                    • Executes dropped EXE
                    PID:1360
                • C:\Users\Public\alpha.pif
                  C:\\Users\\Public\\alpha.pif /c C:\\Users\\Public\\Upha.pif start TrueSight
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of WriteProcessMemory
                  PID:2672
                  • C:\Users\Public\Upha.pif
                    C:\\Users\\Public\\Upha.pif start TrueSight
                    6⤵
                    • Executes dropped EXE
                    PID:3232
                • C:\Users\Public\alpha.pif
                  C:\\Users\\Public\\alpha.pif /c C:\\Users\\Public\\aken.pif -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath 'C:\'"
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of WriteProcessMemory
                  PID:2748
                  • C:\Users\Public\aken.pif
                    C:\\Users\\Public\\aken.pif -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath 'C:\'"
                    6⤵
                    • Executes dropped EXE
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2148
          • C:\Users\Public\Libraries\plqciepJ.pif
            C:\Users\Public\Libraries\plqciepJ.pif
            2⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2752

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_cjpd00we.u0f.ps1

          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • C:\Users\Public\JpeicqlpF.cmd

          Filesize

          11KB

          MD5

          f82aeb3b12f33250e404df6ec873dd1d

          SHA1

          bcf538f64457e8d19da89229479cafa9c4cce12f

          SHA256

          23b7417b47c7efb96fb7ce395e325dc831ab2ee03eadda59058d31bdbe9c1ea6

          SHA512

          6f9d6daeed78f45f0f83310b95f47cc0a96d1db1d7f6c2e2485d7a8ecb04fee9865eec3599fee2d67f3332f68a70059f1a6a40050b93ef44d55632c24d108977

        • C:\Users\Public\Libraries\FX.cmd

          Filesize

          8KB

          MD5

          7821e3de3812e791cf3b223500d73bc9

          SHA1

          5e211b634ce77e6fee83ce8a5b8c9a37c8b81e1d

          SHA256

          3daa7f9eee129f61f7a452f7150ee21a1c4141586a37f37842b9c3bb53152a74

          SHA512

          6eae270065401626df97b73a255578bf27b4f4dea480954843823046ad95e40cf706c1a767c8765ef3ab48ea3a18498375614317ec00a9ef29a4dd21edbc5f26

        • C:\Users\Public\Libraries\NEO.cmd

          Filesize

          55KB

          MD5

          3c755cf5a64b256c08f9bb552167975c

          SHA1

          8c81ca56b178ffd77b15f59c5332813416d976d7

          SHA256

          12e0795aa1408bea69bfd0a53bb74558598e71b33fc12ffec0e0ae38d39da490

          SHA512

          8cf0f1a368089e2e3021ce6aeb4984821429d4bb9de3d273a9d0f571a847bba3fc429b84a877afec6decf40e6b94a69d52e8eeea55e042aa9773d3540dbe6bfa

        • C:\Users\Public\Libraries\plqciepJ.pif

          Filesize

          171KB

          MD5

          22331abcc9472cc9dc6f37faf333aa2c

          SHA1

          2a001c30ba79a19ceaf6a09c3567c70311760aa4

          SHA256

          bdfa725ec2a2c8ea5861d9b4c2f608e631a183fca7916c1e07a28b656cc8ec0c

          SHA512

          c7f5baad732424b975a426867d3d8b5424aa830aa172ed0ff0ef630070bf2b4213750e123a36d8c5a741e22d3999ca1d7e77c62d4b77d6295b20a38114b7843c

        • C:\Users\Public\Upha.pif

          Filesize

          70KB

          MD5

          3fb5cf71f7e7eb49790cb0e663434d80

          SHA1

          b4979a9f970029889713d756c3f123643dde73da

          SHA256

          41f067c3a11b02fe39947f9eba68ae5c7cb5bd1872a6009a4cd1506554a9aba9

          SHA512

          2b59a6d0afef765c6ca80b5738202622cfe0dffcec2092d23ad8149156b0b1dca479e2e2c8562639c97e9f335429854cad12461f2fb277207c39d12e3e308ef5

        • C:\Users\Public\aken.pif

          Filesize

          442KB

          MD5

          04029e121a0cfa5991749937dd22a1d9

          SHA1

          f43d9bb316e30ae1a3494ac5b0624f6bea1bf054

          SHA256

          9f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f

          SHA512

          6a2fb055473033fd8fdb8868823442875b5b60c115031aaeda688a35a092f6278e8687e2ae2b8dc097f8f3f35d23959757bf0c408274a2ef5f40ddfa4b5c851b

        • C:\Users\Public\alpha.pif

          Filesize

          283KB

          MD5

          8a2122e8162dbef04694b9c3e0b6cdee

          SHA1

          f1efb0fddc156e4c61c5f78a54700e4e7984d55d

          SHA256

          b99d61d874728edc0918ca0eb10eab93d381e7367e377406e65963366c874450

          SHA512

          99e784141193275d4364ba1b8762b07cc150ca3cb7e9aa1d4386ba1fa87e073d0500e61572f8d1b071f2faa2a51bb123e12d9d07054b59a1a2fd768ad9f24397

        • C:\Windows \SysWOW64\NETUTILS.dll

          Filesize

          116KB

          MD5

          0f088756537e0d65627ed2ea392dcaae

          SHA1

          983eb3818223641c13464831a2baad9466c3750f

          SHA256

          abe2b86bc07d11050451906dc5c6955e16341912a1da191fc05b80c6e2f44ad6

          SHA512

          d7ec6126467fd2300f2562be48d302513a92cee328470bf0b25b67dcf646ba6c824cd6195ba056b543db9e2a445991fe31ebc2f89d9eff084907d6af1384720d

        • C:\Windows \SysWOW64\svchost.pif

          Filesize

          94KB

          MD5

          869640d0a3f838694ab4dfea9e2f544d

          SHA1

          bdc42b280446ba53624ff23f314aadb861566832

          SHA256

          0db4d3ffdb96d13cf3b427af8be66d985728c55ae254e4b67d287797e4c0b323

          SHA512

          6e775cfb350415434b18427d5ff79b930ed3b0b3fc3466bc195a796c95661d4696f2d662dd0e020c3a6c3419c2734468b1d7546712ecec868d2bbfd2bc2468a7

        • memory/2148-240-0x00000258EA250000-0x00000258EA272000-memory.dmp

          Filesize

          136KB

        • memory/2176-37-0x0000000002A70000-0x0000000003A70000-memory.dmp

          Filesize

          16.0MB

        • memory/2176-30-0x0000000002A70000-0x0000000003A70000-memory.dmp

          Filesize

          16.0MB

        • memory/2176-20-0x0000000002A70000-0x0000000003A70000-memory.dmp

          Filesize

          16.0MB

        • memory/2176-39-0x0000000002A70000-0x0000000003A70000-memory.dmp

          Filesize

          16.0MB

        • memory/2176-66-0x0000000002A70000-0x0000000003A70000-memory.dmp

          Filesize

          16.0MB

        • memory/2176-64-0x0000000002A70000-0x0000000003A70000-memory.dmp

          Filesize

          16.0MB

        • memory/2176-63-0x0000000002A70000-0x0000000003A70000-memory.dmp

          Filesize

          16.0MB

        • memory/2176-62-0x0000000002A70000-0x0000000003A70000-memory.dmp

          Filesize

          16.0MB

        • memory/2176-61-0x0000000002A70000-0x0000000003A70000-memory.dmp

          Filesize

          16.0MB

        • memory/2176-60-0x0000000002A70000-0x0000000003A70000-memory.dmp

          Filesize

          16.0MB

        • memory/2176-59-0x0000000002A70000-0x0000000003A70000-memory.dmp

          Filesize

          16.0MB

        • memory/2176-58-0x0000000002A70000-0x0000000003A70000-memory.dmp

          Filesize

          16.0MB

        • memory/2176-57-0x0000000002A70000-0x0000000003A70000-memory.dmp

          Filesize

          16.0MB

        • memory/2176-56-0x0000000002A70000-0x0000000003A70000-memory.dmp

          Filesize

          16.0MB

        • memory/2176-54-0x0000000002A70000-0x0000000003A70000-memory.dmp

          Filesize

          16.0MB

        • memory/2176-53-0x0000000002A70000-0x0000000003A70000-memory.dmp

          Filesize

          16.0MB

        • memory/2176-52-0x0000000002A70000-0x0000000003A70000-memory.dmp

          Filesize

          16.0MB

        • memory/2176-51-0x0000000002A70000-0x0000000003A70000-memory.dmp

          Filesize

          16.0MB

        • memory/2176-50-0x0000000002A70000-0x0000000003A70000-memory.dmp

          Filesize

          16.0MB

        • memory/2176-48-0x0000000002A70000-0x0000000003A70000-memory.dmp

          Filesize

          16.0MB

        • memory/2176-47-0x0000000002A70000-0x0000000003A70000-memory.dmp

          Filesize

          16.0MB

        • memory/2176-46-0x0000000002A70000-0x0000000003A70000-memory.dmp

          Filesize

          16.0MB

        • memory/2176-45-0x0000000002A70000-0x0000000003A70000-memory.dmp

          Filesize

          16.0MB

        • memory/2176-43-0x0000000002A70000-0x0000000003A70000-memory.dmp

          Filesize

          16.0MB

        • memory/2176-42-0x0000000002A70000-0x0000000003A70000-memory.dmp

          Filesize

          16.0MB

        • memory/2176-41-0x0000000002A70000-0x0000000003A70000-memory.dmp

          Filesize

          16.0MB

        • memory/2176-38-0x0000000002A70000-0x0000000003A70000-memory.dmp

          Filesize

          16.0MB

        • memory/2176-7-0x0000000002A70000-0x0000000003A70000-memory.dmp

          Filesize

          16.0MB

        • memory/2176-35-0x0000000002A70000-0x0000000003A70000-memory.dmp

          Filesize

          16.0MB

        • memory/2176-34-0x0000000002A70000-0x0000000003A70000-memory.dmp

          Filesize

          16.0MB

        • memory/2176-33-0x0000000002A70000-0x0000000003A70000-memory.dmp

          Filesize

          16.0MB

        • memory/2176-65-0x0000000002A70000-0x0000000003A70000-memory.dmp

          Filesize

          16.0MB

        • memory/2176-31-0x0000000002A70000-0x0000000003A70000-memory.dmp

          Filesize

          16.0MB

        • memory/2176-13-0x0000000002A70000-0x0000000003A70000-memory.dmp

          Filesize

          16.0MB

        • memory/2176-29-0x0000000002A70000-0x0000000003A70000-memory.dmp

          Filesize

          16.0MB

        • memory/2176-55-0x0000000002A70000-0x0000000003A70000-memory.dmp

          Filesize

          16.0MB

        • memory/2176-27-0x0000000002A70000-0x0000000003A70000-memory.dmp

          Filesize

          16.0MB

        • memory/2176-26-0x0000000002A70000-0x0000000003A70000-memory.dmp

          Filesize

          16.0MB

        • memory/2176-49-0x0000000002A70000-0x0000000003A70000-memory.dmp

          Filesize

          16.0MB

        • memory/2176-25-0x0000000002A70000-0x0000000003A70000-memory.dmp

          Filesize

          16.0MB

        • memory/2176-44-0x0000000002A70000-0x0000000003A70000-memory.dmp

          Filesize

          16.0MB

        • memory/2176-22-0x0000000002A70000-0x0000000003A70000-memory.dmp

          Filesize

          16.0MB

        • memory/2176-40-0x0000000002A70000-0x0000000003A70000-memory.dmp

          Filesize

          16.0MB

        • memory/2176-36-0x0000000002A70000-0x0000000003A70000-memory.dmp

          Filesize

          16.0MB

        • memory/2176-19-0x0000000002A70000-0x0000000003A70000-memory.dmp

          Filesize

          16.0MB

        • memory/2176-18-0x0000000002A70000-0x0000000003A70000-memory.dmp

          Filesize

          16.0MB

        • memory/2176-32-0x0000000002A70000-0x0000000003A70000-memory.dmp

          Filesize

          16.0MB

        • memory/2176-17-0x0000000002A70000-0x0000000003A70000-memory.dmp

          Filesize

          16.0MB

        • memory/2176-16-0x0000000002A70000-0x0000000003A70000-memory.dmp

          Filesize

          16.0MB

        • memory/2176-28-0x0000000002A70000-0x0000000003A70000-memory.dmp

          Filesize

          16.0MB

        • memory/2176-15-0x0000000002A70000-0x0000000003A70000-memory.dmp

          Filesize

          16.0MB

        • memory/2176-14-0x0000000002A70000-0x0000000003A70000-memory.dmp

          Filesize

          16.0MB

        • memory/2176-24-0x0000000002A70000-0x0000000003A70000-memory.dmp

          Filesize

          16.0MB

        • memory/2176-23-0x0000000002A70000-0x0000000003A70000-memory.dmp

          Filesize

          16.0MB

        • memory/2176-21-0x0000000002A70000-0x0000000003A70000-memory.dmp

          Filesize

          16.0MB

        • memory/2176-8-0x0000000002A70000-0x0000000003A70000-memory.dmp

          Filesize

          16.0MB

        • memory/2176-4-0x0000000000400000-0x0000000000549000-memory.dmp

          Filesize

          1.3MB

        • memory/2176-5-0x00000000006F0000-0x00000000006F1000-memory.dmp

          Filesize

          4KB

        • memory/2176-2-0x0000000002A70000-0x0000000003A70000-memory.dmp

          Filesize

          16.0MB

        • memory/2176-1-0x0000000002A70000-0x0000000003A70000-memory.dmp

          Filesize

          16.0MB

        • memory/2176-0-0x00000000006F0000-0x00000000006F1000-memory.dmp

          Filesize

          4KB

        • memory/2176-12-0x0000000002A70000-0x0000000003A70000-memory.dmp

          Filesize

          16.0MB

        • memory/2176-11-0x0000000002A70000-0x0000000003A70000-memory.dmp

          Filesize

          16.0MB

        • memory/2176-10-0x0000000002A70000-0x0000000003A70000-memory.dmp

          Filesize

          16.0MB

        • memory/2176-9-0x0000000002A70000-0x0000000003A70000-memory.dmp

          Filesize

          16.0MB