Analysis
-
max time kernel
29s -
max time network
37s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 12:52
Behavioral task
behavioral1
Sample
1fedfc97d52dc13ed6cebde7519bf7a8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1fedfc97d52dc13ed6cebde7519bf7a8.exe
Resource
win10v2004-20231215-en
General
-
Target
1fedfc97d52dc13ed6cebde7519bf7a8.exe
-
Size
730KB
-
MD5
1fedfc97d52dc13ed6cebde7519bf7a8
-
SHA1
a5586c63c2e4eb65ce4c3f1a3070e7e01fbba470
-
SHA256
4851611ebb2a33698be0ed454cbaf495d86925ef472c6cdc5b799e259c573b3c
-
SHA512
aa67f72731ff7045ae899d4ba2cf861149c8524c92e38de2eee0bb707745a87bff6a0c7210abdf3a3ebfb49e3d34edec4588f3ba167368c8a8b64a311aaa829e
-
SSDEEP
12288:Y9nTQAiVtuiwlF4w+dGnS0LzPgm8cryDYTS7b9ihfJEdp86nH3UqCILs9:Y9nNMmlyeS0LzgsryuS7b9ihz6Ox
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 35 IoCs
resource yara_rule behavioral2/files/0x000700000002321a-5.dat modiloader_stage2 behavioral2/memory/2796-35-0x0000000000400000-0x00000000004BD000-memory.dmp modiloader_stage2 behavioral2/files/0x000700000002321a-36.dat modiloader_stage2 behavioral2/memory/3740-37-0x0000000000400000-0x00000000004BD000-memory.dmp modiloader_stage2 behavioral2/memory/4496-40-0x0000000000400000-0x00000000004BD000-memory.dmp modiloader_stage2 behavioral2/memory/3488-43-0x0000000000400000-0x00000000004BD000-memory.dmp modiloader_stage2 behavioral2/files/0x000700000002321a-42.dat modiloader_stage2 behavioral2/memory/2352-46-0x0000000000400000-0x00000000004BD000-memory.dmp modiloader_stage2 behavioral2/memory/552-49-0x0000000000400000-0x00000000004BD000-memory.dmp modiloader_stage2 behavioral2/files/0x000700000002321a-48.dat modiloader_stage2 behavioral2/memory/5012-53-0x0000000000400000-0x00000000004BD000-memory.dmp modiloader_stage2 behavioral2/memory/2124-56-0x0000000000400000-0x00000000004BD000-memory.dmp modiloader_stage2 behavioral2/memory/4288-59-0x0000000000400000-0x00000000004BD000-memory.dmp modiloader_stage2 behavioral2/memory/460-62-0x0000000000400000-0x00000000004BD000-memory.dmp modiloader_stage2 behavioral2/memory/3428-66-0x0000000000400000-0x00000000004BD000-memory.dmp modiloader_stage2 behavioral2/memory/3552-69-0x0000000000400000-0x00000000004BD000-memory.dmp modiloader_stage2 behavioral2/memory/2408-74-0x0000000000400000-0x00000000004BD000-memory.dmp modiloader_stage2 behavioral2/memory/4460-77-0x0000000000400000-0x00000000004BD000-memory.dmp modiloader_stage2 behavioral2/memory/2660-80-0x0000000000400000-0x00000000004BD000-memory.dmp modiloader_stage2 behavioral2/memory/316-83-0x0000000000400000-0x00000000004BD000-memory.dmp modiloader_stage2 behavioral2/memory/1576-86-0x0000000000400000-0x00000000004BD000-memory.dmp modiloader_stage2 behavioral2/memory/3092-89-0x0000000000400000-0x00000000004BD000-memory.dmp modiloader_stage2 behavioral2/memory/1532-93-0x0000000000400000-0x00000000004BD000-memory.dmp modiloader_stage2 behavioral2/memory/4964-96-0x0000000000400000-0x00000000004BD000-memory.dmp modiloader_stage2 behavioral2/memory/5068-100-0x0000000000400000-0x00000000004BD000-memory.dmp modiloader_stage2 behavioral2/memory/1012-103-0x0000000000400000-0x00000000004BD000-memory.dmp modiloader_stage2 behavioral2/memory/756-106-0x0000000000400000-0x00000000004BD000-memory.dmp modiloader_stage2 behavioral2/memory/2748-109-0x0000000000400000-0x00000000004BD000-memory.dmp modiloader_stage2 behavioral2/memory/1068-112-0x0000000000400000-0x00000000004BD000-memory.dmp modiloader_stage2 behavioral2/memory/4408-116-0x0000000000400000-0x00000000004BD000-memory.dmp modiloader_stage2 behavioral2/memory/4016-119-0x0000000000400000-0x00000000004BD000-memory.dmp modiloader_stage2 behavioral2/memory/3472-122-0x0000000000400000-0x00000000004BD000-memory.dmp modiloader_stage2 behavioral2/memory/2240-126-0x0000000000400000-0x00000000004BD000-memory.dmp modiloader_stage2 behavioral2/memory/4468-129-0x0000000000400000-0x00000000004BD000-memory.dmp modiloader_stage2 behavioral2/memory/1392-133-0x0000000000400000-0x00000000004BD000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Control Panel\International\Geo\Nation 1fedfc97d52dc13ed6cebde7519bf7a8.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" 1fedfc97d52dc13ed6cebde7519bf7a8.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\vssms32.exe 1fedfc97d52dc13ed6cebde7519bf7a8.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe 1fedfc97d52dc13ed6cebde7519bf7a8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 1fedfc97d52dc13ed6cebde7519bf7a8.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1fedfc97d52dc13ed6cebde7519bf7a8.exe"C:\Users\Admin\AppData\Local\Temp\1fedfc97d52dc13ed6cebde7519bf7a8.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
PID:2796 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"2⤵PID:3740
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"3⤵PID:4496
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"4⤵PID:3488
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"5⤵PID:2352
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"6⤵PID:552
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"7⤵PID:5012
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"8⤵PID:2124
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"9⤵PID:4288
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"10⤵PID:460
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"11⤵PID:3428
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"12⤵PID:3552
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"13⤵PID:2408
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"14⤵PID:4460
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"15⤵PID:2660
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"16⤵PID:316
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"17⤵PID:1576
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"18⤵PID:3092
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"19⤵PID:1532
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"20⤵PID:4964
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"21⤵PID:5068
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"22⤵PID:1012
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"23⤵PID:756
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"24⤵PID:2748
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"25⤵PID:1068
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"26⤵PID:4408
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"27⤵PID:4016
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"28⤵PID:3472
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"29⤵PID:2240
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"30⤵PID:4468
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"31⤵PID:1392
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"32⤵PID:4348
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"33⤵PID:4984
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"34⤵PID:2428
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"35⤵PID:1516
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"36⤵PID:1268
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"37⤵PID:2928
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"38⤵PID:4760
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"39⤵PID:2884
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"40⤵PID:5100
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192KB
MD54040200ab608ec1bdd655b7d93f0d590
SHA1e9eddb0f73c55e24072a5db657b892e7389fcc80
SHA25691f1de13f74e6e9888d2e5e1107d420a0faa9a89c19bd298230a16a5d9233081
SHA51221fe819b78dd0c3e02e52626bd95b3ebc732af8b51beaa009ca6b1ce0accc6899d7feb91f4d53a0d42efb33a88ab63fe609f3511c50f85dc313383ea1ae31449
-
Filesize
381KB
MD5718c7b4ff3e8aa530f2fde3be8707e44
SHA1a2bbb72de713eda64bda4b7006e395a8f7057f33
SHA2569ad0bb5cb00d8e07d614f15a376869c2bdd3ce8cf21e122639c6a27529ed92a7
SHA51201aa5c4d0232218a5246c94937bf1a8041ca6a9cfccdbe856f5091af87d238673bf7510f86fe39c45400c03720707a71a292d864530cf21c3eb226cd9cd7ae40
-
Filesize
92KB
MD55677cd42f71be632e9bbe96b07db10f4
SHA1f99ffdd8f979a6c92fb2b29682bfbba4e1261f1e
SHA256b67b6920e1bb372471da5648c5c279fb0c98522245b4a9bda38a74df0d86d4f4
SHA5128489d9d3888d0276c5cec4fe1a2acf6353d4d83355ac15c4c56a6622b2682fd39c4df31779872e5871040409df05a82f39fdf90b371645132a0c0a24822e1464
-
Filesize
730KB
MD51fedfc97d52dc13ed6cebde7519bf7a8
SHA1a5586c63c2e4eb65ce4c3f1a3070e7e01fbba470
SHA2564851611ebb2a33698be0ed454cbaf495d86925ef472c6cdc5b799e259c573b3c
SHA512aa67f72731ff7045ae899d4ba2cf861149c8524c92e38de2eee0bb707745a87bff6a0c7210abdf3a3ebfb49e3d34edec4588f3ba167368c8a8b64a311aaa829e