Static task
static1
Behavioral task
behavioral1
Sample
ModiacFactory.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ModiacFactory.exe
Resource
win10v2004-20240426-en
General
-
Target
ModiacFactory.exe
-
Size
146KB
-
MD5
09ac0abdc81dc91035545dbbd882ac55
-
SHA1
4bc1b383a2462d09aefc867530ebb4c73c821226
-
SHA256
2ad0a230bcfe9db163990ce0d5b0604e95b0c6e12196a91abca3838c2adb1e56
-
SHA512
73a2aca25b204e57227b806d4c7b87e17a753e83e6d87dd31747a638cd5f166ad19edee21a783011c6c8bb87f1fb302422bb6ec80cc85406f656bc590bbcc54d
-
SSDEEP
3072:ZnhvrOlDEOynqzK7uE4cVagZll61yZe78rlM9ReJQb+P20:Z5rOlDEOyqzgpaMl61y8z
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ModiacFactory.exe
Files
-
ModiacFactory.exe.exe windows:5 windows x86 arch:x86
2f53cf0d0686a154180a944c455e894c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
qtcore4
??1QMutexLocker@@QAE@XZ
??0QMutexLocker@@QAE@PAVQMutex@@@Z
??0QMutex@@QAE@W4RecursionMode@0@@Z
?continueFreeData@QMapData@@QAEXH@Z
?begin@QListData@@QBEPAPAXXZ
?end@QListData@@QBEPAPAXXZ
?qFree@@YAXPAX@Z
??8QBasicAtomicInt@@QBE_NH@Z
?node_delete@QMapData@@QAEXQAPAUNode@1@HPAU21@@Z
?node_create@QMapData@@QAEPAUNode@1@QAPAU21@HH@Z
?deref@QBasicAtomicInt@@QAE_NXZ
?detach3@QListData@@QAEPAUData@1@XZ
?createData@QMapData@@SAPAU1@H@Z
??9QBasicAtomicInt@@QBE_NH@Z
?append@QListData@@QAEPAPAXXZ
??0QByteArray@@QAE@XZ
??0QByteArray@@QAE@PBD@Z
??4QByteArray@@QAEAAV0@ABV0@@Z
??4QByteArray@@QAEAAV0@PBD@Z
??1QMutex@@QAE@XZ
??0QFile@@QAE@XZ
??1QFile@@UAE@XZ
??0QByteArray@@QAE@ABV0@@Z
?shared_null@QMapData@@2U1@A
?shared_null@QListData@@2UData@1@A
?ref@QBasicAtomicInt@@QAE_NXZ
??1QByteArray@@QAE@XZ
?qstrcmp@@YAHABVQByteArray@@0@Z
??0QObject@@QAE@PAV0@@Z
?instance@QCoreApplication@@SAPAV1@XZ
?thread@QObject@@QBEPAVQThread@@XZ
?moveToThread@QObject@@QAEXPAVQThread@@@Z
?disconnectNotify@QObject@@MAEXPBD@Z
?connectNotify@QObject@@MAEXPBD@Z
?customEvent@QObject@@MAEXPAVQEvent@@@Z
?timerEvent@QObject@@MAEXPAVQTimerEvent@@@Z
?childEvent@QObject@@MAEXPAVQChildEvent@@@Z
?eventFilter@QObject@@UAE_NPAV1@PAVQEvent@@@Z
?event@QObject@@UAE_NPAVQEvent@@@Z
?qt_metacall@QObject@@UAEHW4Call@QMetaObject@@HPAPAX@Z
?qt_metacast@QObject@@UAEPAXPBD@Z
?metaObject@QObject@@UBEPBUQMetaObject@@XZ
??1QObject@@UAE@XZ
?free@QVectorData@@SAXPAU1@H@Z
?qBadAlloc@@YAXXZ
?allocate@QVectorData@@SAPAU1@HH@Z
?qMemSet@@YAPAXPAXHI@Z
?reallocate@QVectorData@@SAPAU1@PAU1@HHH@Z
?qWinMain@@YAXPAUHINSTANCE__@@0PADHAAHAAV?$QVector@PAD@@@Z
?detach@QByteArray@@QAEXXZ
?free@QString@@CAXPAUData@1@@Z
?toLocal8Bit@QString@@QBE?AVQByteArray@@XZ
?fromWCharArray@QString@@SA?AV1@PBGH@Z
msvcr90
_controlfp_s
_except_handler4_common
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
?terminate@@YAXXZ
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
_decode_pointer
_onexit
_lock
_encode_pointer
__dllonexit
_unlock
memcpy
??2@YAPAXI@Z
_CxxThrowException
__CxxFrameHandler3
??3@YAXPAX@Z
_invoke_watson
kernel32
GetCommandLineW
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetStartupInfoA
InterlockedCompareExchange
Sleep
InterlockedExchange
LoadLibraryA
GetProcAddress
Sections
.text Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 131KB - Virtual size: 130KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ