Analysis
-
max time kernel
131s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
11/01/2024, 00:26
Static task
static1
Behavioral task
behavioral1
Sample
520b1f650949ea16a462b06385aef99d.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
520b1f650949ea16a462b06385aef99d.exe
Resource
win10v2004-20231222-en
General
-
Target
520b1f650949ea16a462b06385aef99d.exe
-
Size
488KB
-
MD5
520b1f650949ea16a462b06385aef99d
-
SHA1
4e30d11e555d908a7ed00862d692e10f9df537e3
-
SHA256
5cf1c028e3aa841f275fa03093c3e877dc5e1119d8e1e8916b43f3574aa005b4
-
SHA512
ebcbf83491b4b1c4d7652a225eb41ae4ccd2228ea3dc8d6e5e474d499f18606f6f5e0d9c25603813b3384fed0f4eee0c31900e11a73d742d58d837d152876197
-
SSDEEP
12288:4MsLABOwJLkfWF3Z4mxxWBkMy90UHKFz87F0Zq4:VZOwJLxQmXWtE0CgzDZq4
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral1/memory/2508-278-0x0000000010410000-0x000000001046D000-memory.dmp modiloader_stage2 behavioral1/memory/2508-282-0x0000000010410000-0x000000001046D000-memory.dmp modiloader_stage2 -
Deletes itself 1 IoCs
pid Process 2740 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2624 netservice.exe -
resource yara_rule behavioral1/memory/2508-278-0x0000000010410000-0x000000001046D000-memory.dmp upx behavioral1/memory/2508-282-0x0000000010410000-0x000000001046D000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1936 520b1f650949ea16a462b06385aef99d.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2624 netservice.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1936 wrote to memory of 2740 1936 520b1f650949ea16a462b06385aef99d.exe 29 PID 1936 wrote to memory of 2740 1936 520b1f650949ea16a462b06385aef99d.exe 29 PID 1936 wrote to memory of 2740 1936 520b1f650949ea16a462b06385aef99d.exe 29 PID 1936 wrote to memory of 2740 1936 520b1f650949ea16a462b06385aef99d.exe 29 PID 2624 wrote to memory of 2508 2624 netservice.exe 31 PID 2624 wrote to memory of 2508 2624 netservice.exe 31 PID 2624 wrote to memory of 2508 2624 netservice.exe 31 PID 2624 wrote to memory of 2508 2624 netservice.exe 31 PID 2624 wrote to memory of 2508 2624 netservice.exe 31 PID 2624 wrote to memory of 2508 2624 netservice.exe 31 PID 2624 wrote to memory of 2508 2624 netservice.exe 31 PID 2624 wrote to memory of 2508 2624 netservice.exe 31 PID 2624 wrote to memory of 2508 2624 netservice.exe 31 PID 2624 wrote to memory of 2508 2624 netservice.exe 31 PID 2624 wrote to memory of 2508 2624 netservice.exe 31 PID 2624 wrote to memory of 2508 2624 netservice.exe 31 PID 2624 wrote to memory of 2508 2624 netservice.exe 31 PID 2624 wrote to memory of 2508 2624 netservice.exe 31 PID 2624 wrote to memory of 2508 2624 netservice.exe 31 PID 2624 wrote to memory of 2508 2624 netservice.exe 31 PID 2624 wrote to memory of 2508 2624 netservice.exe 31 PID 2624 wrote to memory of 2508 2624 netservice.exe 31 PID 2624 wrote to memory of 2508 2624 netservice.exe 31 PID 2624 wrote to memory of 2508 2624 netservice.exe 31 PID 2624 wrote to memory of 2508 2624 netservice.exe 31 PID 2624 wrote to memory of 2508 2624 netservice.exe 31 PID 2624 wrote to memory of 2508 2624 netservice.exe 31 PID 2624 wrote to memory of 2508 2624 netservice.exe 31 PID 2624 wrote to memory of 2508 2624 netservice.exe 31 PID 2624 wrote to memory of 2508 2624 netservice.exe 31 PID 2624 wrote to memory of 2508 2624 netservice.exe 31 PID 2624 wrote to memory of 2508 2624 netservice.exe 31 PID 2624 wrote to memory of 2508 2624 netservice.exe 31 PID 2624 wrote to memory of 2508 2624 netservice.exe 31 PID 2624 wrote to memory of 2508 2624 netservice.exe 31 PID 2624 wrote to memory of 2508 2624 netservice.exe 31 PID 2624 wrote to memory of 2508 2624 netservice.exe 31 PID 2624 wrote to memory of 2508 2624 netservice.exe 31 PID 2624 wrote to memory of 2508 2624 netservice.exe 31 PID 2624 wrote to memory of 2508 2624 netservice.exe 31 PID 2624 wrote to memory of 2508 2624 netservice.exe 31 PID 2624 wrote to memory of 2508 2624 netservice.exe 31 PID 2624 wrote to memory of 2508 2624 netservice.exe 31 PID 2624 wrote to memory of 2508 2624 netservice.exe 31 PID 2624 wrote to memory of 2508 2624 netservice.exe 31 PID 2624 wrote to memory of 2508 2624 netservice.exe 31 PID 2624 wrote to memory of 2508 2624 netservice.exe 31 PID 2624 wrote to memory of 2508 2624 netservice.exe 31 PID 2624 wrote to memory of 2508 2624 netservice.exe 31 PID 2624 wrote to memory of 2508 2624 netservice.exe 31 PID 2624 wrote to memory of 2508 2624 netservice.exe 31 PID 2624 wrote to memory of 2508 2624 netservice.exe 31 PID 2624 wrote to memory of 2508 2624 netservice.exe 31 PID 2624 wrote to memory of 2508 2624 netservice.exe 31 PID 2624 wrote to memory of 2508 2624 netservice.exe 31 PID 2624 wrote to memory of 2508 2624 netservice.exe 31 PID 2624 wrote to memory of 2508 2624 netservice.exe 31 PID 2624 wrote to memory of 2508 2624 netservice.exe 31 PID 2624 wrote to memory of 2508 2624 netservice.exe 31 PID 2624 wrote to memory of 2508 2624 netservice.exe 31 PID 2624 wrote to memory of 2508 2624 netservice.exe 31 PID 2624 wrote to memory of 2508 2624 netservice.exe 31 PID 2624 wrote to memory of 2508 2624 netservice.exe 31 PID 2624 wrote to memory of 2508 2624 netservice.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\520b1f650949ea16a462b06385aef99d.exe"C:\Users\Admin\AppData\Local\Temp\520b1f650949ea16a462b06385aef99d.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\520b1f650949ea16a462b06385aef99d.exe"2⤵
- Deletes itself
PID:2740
-
-
C:\Users\Admin\Favorites\netservice.exeC:\Users\Admin\Favorites\netservice.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵PID:2508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
98KB
MD52ab5fee467911e5c1c8b7cfb2054d297
SHA128e78935de67572fb800f23b7307fe11852b80e4
SHA256c70e018a61d0e6faed97715fe9e430703a9ed8e3b16a79e4afd83a777658a9e5
SHA51279db284e4b95aee124e69e1d79f47f064f6b235abaf6ed499f4febf23302c5e5ac82d41c55703cbafd119dadcb6ae17b6aa4dbf4ff83252e0106540a0dd20baa
-
Filesize
93KB
MD566929a9b1a573d78c2ae5ba093691f96
SHA1efb7f6118b3321ad62e6afaf00c434bdbc8768e6
SHA256299e2bfd25445283dc1b4625a1256bf84b75178f6e5b0c573daebc50debc18a7
SHA512df70094981024c1508f4c7856f5ea1e4445f6876449d608e218af4f194df26bec64c0193318d784c20de09799a2ea95db5ab5d81f0e1ad88b29b9af4f8ff46a7