Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    30/03/2025, 18:00 UTC

General

  • Target

    52d73b10e3d202672951b5764b749f5a.exe

  • Size

    1.7MB

  • MD5

    52d73b10e3d202672951b5764b749f5a

  • SHA1

    643576d6f8f11b8af6d579f6d9c6bf37b64b4fbd

  • SHA256

    282b395665a37f7421ece5f5de9d6f844e980fd76bb614232c957384885a04eb

  • SHA512

    6180780ede1cfa28f57e2b8f1b0aa8cbf30d6391a73a7ce75058389b80285f80b528abf4802c881bc2914f7f257a0cd275066953f5765c4203b15210c0b0b62f

  • SSDEEP

    24576:RMu29SclxV3SzHlPsHguSIxR/mx433cmbTt5BAMr+hF6cZAfs4tFvDgIF:R+z3SmAuT3sm/WMrCF60Afs4tFvDpF

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 62 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Modifies registry class 5 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of FindShellTrayWindow 28 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\52d73b10e3d202672951b5764b749f5a.exe
    "C:\Users\Admin\AppData\Local\Temp\52d73b10e3d202672951b5764b749f5a.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2616
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\\Users\\All Users\\6789.cmd""
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2332
      • C:\Windows\SysWOW64\esentutl.exe
        C:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\cmd.exe /d C:\\Users\\Public\\alpha.pif /o
        3⤵
          PID:2044
        • C:\Users\Public\alpha.pif
          C:\\Users\\Public\\alpha.pif /c mkdir "\\?\C:\Windows "
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:956
        • C:\Users\Public\alpha.pif
          C:\\Users\\Public\\alpha.pif /c mkdir "\\?\C:\Windows \SysWOW64"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2736
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\\Users\\All Users\\4284.cmd""
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:968
        • C:\Windows\SysWOW64\PING.EXE
          ping 127.0.0.1 -n 10
          3⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:1680
      • C:\Users\Admin\Links\hfnxnrbX.pif
        C:\\Users\\Admin\\Links\hfnxnrbX.pif
        2⤵
        • Executes dropped EXE
        PID:2168
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2772

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\4284.cmd

      Filesize

      2KB

      MD5

      9a020804eba1ffac2928d7c795144bbf

      SHA1

      61fdc4135afdc99e106912aeafeac9c8a967becc

      SHA256

      a86c6c7a2bf9e12c45275a5e7ebebd5e6d2ba302fe0a12600b7c9fdf283d9e63

      SHA512

      42f6d754f1bdbeb6e4cc7aeb57ff4c4d126944f950d260a0839911e576ad16002c16122f81c1d39fa529432dca0a48c9acfbb18804ca9044425c8e424a5518be

    • C:\Users\Admin\Links\hfnxnrbX.pif

      Filesize

      66KB

      MD5

      c116d3604ceafe7057d77ff27552c215

      SHA1

      452b14432fb5758b46f2897aeccd89f7c82a727d

      SHA256

      7bcdc2e607abc65ef93afd009c3048970d9e8d1c2a18fc571562396b13ebb301

      SHA512

      9202a00eeaf4c5be94de32fd41bfea40fc32d368955d49b7bad2b5c23c4ebc92dccb37d99f5a14e53ad674b63f1baa6efb1feb27225c86693ead3262a26d66c6

    • C:\Users\All Users\6789.cmd

      Filesize

      19KB

      MD5

      1df650cca01129127d30063634ab5c03

      SHA1

      bc7172dec0b12b05f2247bd5e17751eb33474d4e

      SHA256

      edd4094e7a82a6ff8be65d6b075e9513bd15a6b74f8032b5c10ce18f7191fa60

      SHA512

      0bddf9ecaaedb0c30103a1fbfb644d6d4f7608bd596403307ed89b2390568c3a29e2cf55d10e2eadbfc407ede52eaf9a4f2321ba5f37e358a1039f73c7688fbd

    • C:\Users\Public\alpha.pif

      Filesize

      295KB

      MD5

      ad7b9c14083b52bc532fba5948342b98

      SHA1

      ee8cbf12d87c4d388f09b4f69bed2e91682920b5

      SHA256

      17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae

      SHA512

      e12aad20c824187b39edb3c7943709290b5ddbf1b4032988db46f2e86da3cf7e7783f78c82e4dc5da232f666b8f9799a260a1f8e2694eb4d0cdaf78da710fde1

    • memory/2616-0-0x00000000001B0000-0x00000000001B1000-memory.dmp

      Filesize

      4KB

    • memory/2616-1-0x0000000003970000-0x0000000004970000-memory.dmp

      Filesize

      16.0MB

    • memory/2616-2-0x0000000003970000-0x0000000004970000-memory.dmp

      Filesize

      16.0MB

    • memory/2616-5-0x0000000003970000-0x0000000004970000-memory.dmp

      Filesize

      16.0MB

    • memory/2616-16-0x0000000003970000-0x0000000004970000-memory.dmp

      Filesize

      16.0MB

    • memory/2616-45-0x0000000003970000-0x0000000004970000-memory.dmp

      Filesize

      16.0MB

    • memory/2616-42-0x0000000003970000-0x0000000004970000-memory.dmp

      Filesize

      16.0MB

    • memory/2616-39-0x0000000003970000-0x0000000004970000-memory.dmp

      Filesize

      16.0MB

    • memory/2616-35-0x0000000003970000-0x0000000004970000-memory.dmp

      Filesize

      16.0MB

    • memory/2616-32-0x0000000003970000-0x0000000004970000-memory.dmp

      Filesize

      16.0MB

    • memory/2616-28-0x0000000003970000-0x0000000004970000-memory.dmp

      Filesize

      16.0MB

    • memory/2616-26-0x0000000003970000-0x0000000004970000-memory.dmp

      Filesize

      16.0MB

    • memory/2616-24-0x0000000003970000-0x0000000004970000-memory.dmp

      Filesize

      16.0MB

    • memory/2616-22-0x0000000003970000-0x0000000004970000-memory.dmp

      Filesize

      16.0MB

    • memory/2616-20-0x0000000003970000-0x0000000004970000-memory.dmp

      Filesize

      16.0MB

    • memory/2616-19-0x0000000003970000-0x0000000004970000-memory.dmp

      Filesize

      16.0MB

    • memory/2616-18-0x0000000003970000-0x0000000004970000-memory.dmp

      Filesize

      16.0MB

    • memory/2616-15-0x0000000003970000-0x0000000004970000-memory.dmp

      Filesize

      16.0MB

    • memory/2616-82-0x0000000003970000-0x0000000004970000-memory.dmp

      Filesize

      16.0MB

    • memory/2616-80-0x0000000003970000-0x0000000004970000-memory.dmp

      Filesize

      16.0MB

    • memory/2616-77-0x0000000003970000-0x0000000004970000-memory.dmp

      Filesize

      16.0MB

    • memory/2616-76-0x0000000003970000-0x0000000004970000-memory.dmp

      Filesize

      16.0MB

    • memory/2616-74-0x0000000003970000-0x0000000004970000-memory.dmp

      Filesize

      16.0MB

    • memory/2616-72-0x0000000003970000-0x0000000004970000-memory.dmp

      Filesize

      16.0MB

    • memory/2616-70-0x0000000003970000-0x0000000004970000-memory.dmp

      Filesize

      16.0MB

    • memory/2616-13-0x0000000003970000-0x0000000004970000-memory.dmp

      Filesize

      16.0MB

    • memory/2616-12-0x0000000003970000-0x0000000004970000-memory.dmp

      Filesize

      16.0MB

    • memory/2616-67-0x0000000003970000-0x0000000004970000-memory.dmp

      Filesize

      16.0MB

    • memory/2616-66-0x0000000003970000-0x0000000004970000-memory.dmp

      Filesize

      16.0MB

    • memory/2616-64-0x0000000003970000-0x0000000004970000-memory.dmp

      Filesize

      16.0MB

    • memory/2616-61-0x0000000003970000-0x0000000004970000-memory.dmp

      Filesize

      16.0MB

    • memory/2616-59-0x0000000003970000-0x0000000004970000-memory.dmp

      Filesize

      16.0MB

    • memory/2616-10-0x0000000003970000-0x0000000004970000-memory.dmp

      Filesize

      16.0MB

    • memory/2616-56-0x0000000003970000-0x0000000004970000-memory.dmp

      Filesize

      16.0MB

    • memory/2616-54-0x0000000003970000-0x0000000004970000-memory.dmp

      Filesize

      16.0MB

    • memory/2616-52-0x0000000003970000-0x0000000004970000-memory.dmp

      Filesize

      16.0MB

    • memory/2616-49-0x0000000003970000-0x0000000004970000-memory.dmp

      Filesize

      16.0MB

    • memory/2616-50-0x0000000003970000-0x0000000004970000-memory.dmp

      Filesize

      16.0MB

    • memory/2616-47-0x0000000003970000-0x0000000004970000-memory.dmp

      Filesize

      16.0MB

    • memory/2616-9-0x0000000003970000-0x0000000004970000-memory.dmp

      Filesize

      16.0MB

    • memory/2616-46-0x0000000003970000-0x0000000004970000-memory.dmp

      Filesize

      16.0MB

    • memory/2616-44-0x0000000003970000-0x0000000004970000-memory.dmp

      Filesize

      16.0MB

    • memory/2616-43-0x0000000003970000-0x0000000004970000-memory.dmp

      Filesize

      16.0MB

    • memory/2616-40-0x0000000003970000-0x0000000004970000-memory.dmp

      Filesize

      16.0MB

    • memory/2616-41-0x0000000003970000-0x0000000004970000-memory.dmp

      Filesize

      16.0MB

    • memory/2616-38-0x0000000003970000-0x0000000004970000-memory.dmp

      Filesize

      16.0MB

    • memory/2616-37-0x0000000003970000-0x0000000004970000-memory.dmp

      Filesize

      16.0MB

    • memory/2616-36-0x0000000003970000-0x0000000004970000-memory.dmp

      Filesize

      16.0MB

    • memory/2616-34-0x0000000003970000-0x0000000004970000-memory.dmp

      Filesize

      16.0MB

    • memory/2616-7-0x0000000003970000-0x0000000004970000-memory.dmp

      Filesize

      16.0MB

    • memory/2616-33-0x0000000003970000-0x0000000004970000-memory.dmp

      Filesize

      16.0MB

    • memory/2616-30-0x0000000003970000-0x0000000004970000-memory.dmp

      Filesize

      16.0MB

    • memory/2616-31-0x0000000003970000-0x0000000004970000-memory.dmp

      Filesize

      16.0MB

    • memory/2616-29-0x0000000003970000-0x0000000004970000-memory.dmp

      Filesize

      16.0MB

    • memory/2616-27-0x0000000003970000-0x0000000004970000-memory.dmp

      Filesize

      16.0MB

    • memory/2616-25-0x0000000003970000-0x0000000004970000-memory.dmp

      Filesize

      16.0MB

    • memory/2616-23-0x0000000003970000-0x0000000004970000-memory.dmp

      Filesize

      16.0MB

    • memory/2616-21-0x0000000003970000-0x0000000004970000-memory.dmp

      Filesize

      16.0MB

    • memory/2616-17-0x0000000003970000-0x0000000004970000-memory.dmp

      Filesize

      16.0MB

    • memory/2616-14-0x0000000003970000-0x0000000004970000-memory.dmp

      Filesize

      16.0MB

    • memory/2616-11-0x0000000003970000-0x0000000004970000-memory.dmp

      Filesize

      16.0MB

    • memory/2616-8-0x0000000003970000-0x0000000004970000-memory.dmp

      Filesize

      16.0MB

    • memory/2616-6-0x0000000003970000-0x0000000004970000-memory.dmp

      Filesize

      16.0MB

    • memory/2616-4-0x0000000003970000-0x0000000004970000-memory.dmp

      Filesize

      16.0MB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.