Analysis

  • max time kernel
    147s
  • max time network
    151s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240611-en
  • resource tags

    arch:x64arch:x86image:win11-20240611-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    02-07-2024 05:35

General

  • Target

    68a27b558777a677920f88a3c34226e7efb0b87c90c9ff9143c992c98848f38f.exe

  • Size

    821KB

  • MD5

    2f6f4f9674c6721b5ea8319ed90a8f20

  • SHA1

    154e852c206379e4a6a02d4981f2c4d8be1319c5

  • SHA256

    68a27b558777a677920f88a3c34226e7efb0b87c90c9ff9143c992c98848f38f

  • SHA512

    3240e8f0321f2afcca7485a4a3658c88518145c803a445361302f64e2f5e24078f1f2633d8e4d2850b0e987f782510dcd14e201d981e542e83f7475025adea9d

  • SSDEEP

    12288:UpJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9j9DXMS9:QJ39LyjbJkQFMhmC+6GD9j1n9

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • ModiLoader Second Stage 8 IoCs
  • Executes dropped EXE 6 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 3 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\68a27b558777a677920f88a3c34226e7efb0b87c90c9ff9143c992c98848f38f.exe
    "C:\Users\Admin\AppData\Local\Temp\68a27b558777a677920f88a3c34226e7efb0b87c90c9ff9143c992c98848f38f.exe"
    1⤵
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3432
    • C:\Users\Admin\AppData\Local\Temp\3582-490\68a27b558777a677920f88a3c34226e7efb0b87c90c9ff9143c992c98848f38f.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\68a27b558777a677920f88a3c34226e7efb0b87c90c9ff9143c992c98848f38f.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2068
      • C:\Users\Admin\AppData\Local\Temp\._cache_68a27b558777a677920f88a3c34226e7efb0b87c90c9ff9143c992c98848f38f.exe
        "C:\Users\Admin\AppData\Local\Temp\._cache_68a27b558777a677920f88a3c34226e7efb0b87c90c9ff9143c992c98848f38f.exe"
        3⤵
        • Executes dropped EXE
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2396
        • C:\Windows\svchost.com
          "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Roaming\AdobeART.exe"
          4⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of WriteProcessMemory
          PID:2224
          • C:\Users\Admin\AppData\Roaming\AdobeART.exe
            C:\Users\Admin\AppData\Roaming\AdobeART.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            PID:1392
      • C:\ProgramData\Synaptics\Synaptics.exe
        "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
        3⤵
        • Executes dropped EXE
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:4920
        • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
          "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          PID:2208
  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3508

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Event Triggered Execution

1
T1546

Change Default File Association

1
T1546.001

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Event Triggered Execution

1
T1546

Change Default File Association

1
T1546.001

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

2
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe
    Filesize

    9.4MB

    MD5

    124147ede15f97b47224628152110ce2

    SHA1

    4530fee9b1199777693073414b82420a7c88a042

    SHA256

    3e815d583236b9cecd912fcc949a301d1e51b609cbb53a2285d08feea305edcd

    SHA512

    f4c2825380d1bb9ca889d5c5684f13aa0cacb0d6511f6409ca0972a7191195a0175e00c995407848bf09ea03cff05c7395952bf2ffd2af2015b8939f75a8e627

  • C:\Users\Admin\AppData\Local\Temp\._cache_68a27b558777a677920f88a3c34226e7efb0b87c90c9ff9143c992c98848f38f.exe
    Filesize

    36KB

    MD5

    0fd492912e95d20941f96a49d493da9c

    SHA1

    3336bf0f29bde762b36b876488ddf3c562174462

    SHA256

    81d622108a3bd126a2ac9f101dcb37bc160141585e3f9e1e1ab7905ee6bc5e07

    SHA512

    831cd4319d607c5b030503ccde7f3fabc38d74c73b38228557495c3c611ae482e73a43f6c94267beb84b41b3b0e5c4f0a0f5202c6e59744657bff48de33d4745

  • C:\Users\Admin\AppData\Local\Temp\3582-490\68a27b558777a677920f88a3c34226e7efb0b87c90c9ff9143c992c98848f38f.exe
    Filesize

    781KB

    MD5

    a8a7c72473da536ed5af5168b890ef51

    SHA1

    9f7793ca3ef966284c9621bcfb1b6b98cdf4f8dd

    SHA256

    78175d8bac0c2a60dcd011b294e4b3127677e134a3a60c154f509b6021ab1244

    SHA512

    0501058922d22b251a4ae9d59bb321bbf446632f1e633d4ebb478ce42b3d9e9513644884d73342356cbc61089084780616e770d964e95143729e1b11f5865cbc

  • C:\Users\Admin\AppData\Local\Temp\tmp5023.tmp
    Filesize

    8B

    MD5

    787b96a56c631860d9e584145e404ea7

    SHA1

    5943487a2858b6771e7868dc948d4acc1279b670

    SHA256

    d8be801bbfa4e507631c46b07e738f352d690976ebc8566b4f545d18a9092eb7

    SHA512

    703a5cc02546719da54164ae3fb17c26fa99c56c6e094aace68b813b90aa7d4be9f1a7d3b555e150c562396424dd358f095d44b3a28aeec573fa608ade9aa6e5

  • C:\Users\Admin\AppData\Local\Temp\xh2sxg8C.xlsm
    Filesize

    17KB

    MD5

    e566fc53051035e1e6fd0ed1823de0f9

    SHA1

    00bc96c48b98676ecd67e81a6f1d7754e4156044

    SHA256

    8e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15

    SHA512

    a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04

  • C:\Windows\svchost.com
    Filesize

    40KB

    MD5

    f7a0b431d559f3b49ca6e69ec1df344f

    SHA1

    716acdcc834ad512e175f2b87ec87409bd66cd92

    SHA256

    16e3fb784a474ccd787e669c3117baec169cd5d3e5e53acf6540889539b8abee

    SHA512

    7704ddfa53cfa078771c35acee7549d545a49b5d16d3952312e3baf5bbb69c9c4614560e5cac621fd70cb982a6b3c12829653a73b3f7d31a7ad9e30e25f76eec

  • memory/1392-312-0x0000000000400000-0x0000000000411000-memory.dmp
    Filesize

    68KB

  • memory/2068-13-0x00000000007A0000-0x00000000007A1000-memory.dmp
    Filesize

    4KB

  • memory/2068-114-0x0000000000400000-0x00000000004C9000-memory.dmp
    Filesize

    804KB

  • memory/2208-186-0x0000000000400000-0x0000000000411000-memory.dmp
    Filesize

    68KB

  • memory/2224-311-0x0000000000400000-0x000000000041B000-memory.dmp
    Filesize

    108KB

  • memory/2224-325-0x0000000000400000-0x000000000041B000-memory.dmp
    Filesize

    108KB

  • memory/2396-172-0x0000000000400000-0x0000000000411000-memory.dmp
    Filesize

    68KB

  • memory/3432-309-0x0000000000400000-0x000000000041B000-memory.dmp
    Filesize

    108KB

  • memory/3432-317-0x0000000000400000-0x000000000041B000-memory.dmp
    Filesize

    108KB

  • memory/3508-300-0x00007FFF3EEF0000-0x00007FFF3EF00000-memory.dmp
    Filesize

    64KB

  • memory/3508-296-0x00007FFF41110000-0x00007FFF41120000-memory.dmp
    Filesize

    64KB

  • memory/3508-297-0x00007FFF41110000-0x00007FFF41120000-memory.dmp
    Filesize

    64KB

  • memory/3508-294-0x00007FFF41110000-0x00007FFF41120000-memory.dmp
    Filesize

    64KB

  • memory/3508-299-0x00007FFF3EEF0000-0x00007FFF3EF00000-memory.dmp
    Filesize

    64KB

  • memory/3508-295-0x00007FFF41110000-0x00007FFF41120000-memory.dmp
    Filesize

    64KB

  • memory/3508-298-0x00007FFF41110000-0x00007FFF41120000-memory.dmp
    Filesize

    64KB

  • memory/4920-310-0x0000000000400000-0x00000000004C9000-memory.dmp
    Filesize

    804KB

  • memory/4920-352-0x0000000000400000-0x00000000004C9000-memory.dmp
    Filesize

    804KB