Analysis
-
max time kernel
1s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
31-05-2024 22:24
Static task
static1
Behavioral task
behavioral1
Sample
6140cbc7a6112ce11ae6a95c7a13b85d91ef942a087eca635c196c9d4b5587d4.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6140cbc7a6112ce11ae6a95c7a13b85d91ef942a087eca635c196c9d4b5587d4.exe
Resource
win10v2004-20240508-en
General
-
Target
6140cbc7a6112ce11ae6a95c7a13b85d91ef942a087eca635c196c9d4b5587d4.exe
-
Size
112KB
-
MD5
4306bcba85d7eab4fc890c91c35bd310
-
SHA1
7c3d7fe5bbdc9578ca244147969ad921f649fd65
-
SHA256
6140cbc7a6112ce11ae6a95c7a13b85d91ef942a087eca635c196c9d4b5587d4
-
SHA512
19f3750dd9baeda2809943a3182e79a28a373ce0a27f1cd699d581185a2c534453002980742126a6842b3cd3a0ee2dfa2a68f5b1d10d4edf9c2e091a7063c86d
-
SSDEEP
1536:t2ovIa47CqIf2f3w41p7sDcX7juR/JSJw8EeNshUDGXJ:tVIr7zI+fAceoGxSKKo5
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Detects Windows executables referencing non-Windows User-Agents 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1108-281-0x0000000000400000-0x0000000000414000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral1/memory/1108-295-0x0000000000400000-0x0000000000414000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA -
ModiLoader Second Stage 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1108-281-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 behavioral1/memory/1108-295-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 -
UPX dump on OEP (original entry point) 12 IoCs
Processes:
resource yara_rule behavioral1/memory/2480-95-0x0000000000400000-0x000000000040C000-memory.dmp UPX behavioral1/memory/2480-101-0x0000000000400000-0x000000000040C000-memory.dmp UPX behavioral1/memory/2480-93-0x0000000000400000-0x000000000040C000-memory.dmp UPX behavioral1/memory/2480-124-0x0000000000400000-0x000000000040C000-memory.dmp UPX behavioral1/memory/1188-123-0x0000000000400000-0x000000000040B000-memory.dmp UPX behavioral1/memory/2480-97-0x0000000000400000-0x000000000040C000-memory.dmp UPX behavioral1/memory/1188-127-0x0000000000400000-0x000000000040B000-memory.dmp UPX behavioral1/memory/1108-281-0x0000000000400000-0x0000000000414000-memory.dmp UPX behavioral1/memory/1188-286-0x0000000000400000-0x000000000040B000-memory.dmp UPX behavioral1/memory/2480-291-0x0000000000400000-0x000000000040C000-memory.dmp UPX behavioral1/memory/1108-295-0x0000000000400000-0x0000000000414000-memory.dmp UPX behavioral1/memory/852-294-0x0000000000400000-0x000000000040B000-memory.dmp UPX -
Processes:
resource yara_rule behavioral1/memory/1188-123-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1188-127-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1108-281-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/1188-286-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1108-295-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/852-294-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Suspicious use of SetThreadContext 2 IoCs
Processes:
6140cbc7a6112ce11ae6a95c7a13b85d91ef942a087eca635c196c9d4b5587d4.exedescription pid process target process PID 1612 set thread context of 2480 1612 6140cbc7a6112ce11ae6a95c7a13b85d91ef942a087eca635c196c9d4b5587d4.exe svchost.exe PID 1612 set thread context of 1188 1612 6140cbc7a6112ce11ae6a95c7a13b85d91ef942a087eca635c196c9d4b5587d4.exe 6140cbc7a6112ce11ae6a95c7a13b85d91ef942a087eca635c196c9d4b5587d4.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
svchost.exepid process 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
6140cbc7a6112ce11ae6a95c7a13b85d91ef942a087eca635c196c9d4b5587d4.exesvchost.exe6140cbc7a6112ce11ae6a95c7a13b85d91ef942a087eca635c196c9d4b5587d4.exepid process 1612 6140cbc7a6112ce11ae6a95c7a13b85d91ef942a087eca635c196c9d4b5587d4.exe 2480 svchost.exe 1188 6140cbc7a6112ce11ae6a95c7a13b85d91ef942a087eca635c196c9d4b5587d4.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
6140cbc7a6112ce11ae6a95c7a13b85d91ef942a087eca635c196c9d4b5587d4.exedescription pid process target process PID 1612 wrote to memory of 2480 1612 6140cbc7a6112ce11ae6a95c7a13b85d91ef942a087eca635c196c9d4b5587d4.exe svchost.exe PID 1612 wrote to memory of 2480 1612 6140cbc7a6112ce11ae6a95c7a13b85d91ef942a087eca635c196c9d4b5587d4.exe svchost.exe PID 1612 wrote to memory of 2480 1612 6140cbc7a6112ce11ae6a95c7a13b85d91ef942a087eca635c196c9d4b5587d4.exe svchost.exe PID 1612 wrote to memory of 2480 1612 6140cbc7a6112ce11ae6a95c7a13b85d91ef942a087eca635c196c9d4b5587d4.exe svchost.exe PID 1612 wrote to memory of 2480 1612 6140cbc7a6112ce11ae6a95c7a13b85d91ef942a087eca635c196c9d4b5587d4.exe svchost.exe PID 1612 wrote to memory of 2480 1612 6140cbc7a6112ce11ae6a95c7a13b85d91ef942a087eca635c196c9d4b5587d4.exe svchost.exe PID 1612 wrote to memory of 2480 1612 6140cbc7a6112ce11ae6a95c7a13b85d91ef942a087eca635c196c9d4b5587d4.exe svchost.exe PID 1612 wrote to memory of 2480 1612 6140cbc7a6112ce11ae6a95c7a13b85d91ef942a087eca635c196c9d4b5587d4.exe svchost.exe PID 1612 wrote to memory of 2480 1612 6140cbc7a6112ce11ae6a95c7a13b85d91ef942a087eca635c196c9d4b5587d4.exe svchost.exe PID 1612 wrote to memory of 2480 1612 6140cbc7a6112ce11ae6a95c7a13b85d91ef942a087eca635c196c9d4b5587d4.exe svchost.exe PID 1612 wrote to memory of 1188 1612 6140cbc7a6112ce11ae6a95c7a13b85d91ef942a087eca635c196c9d4b5587d4.exe 6140cbc7a6112ce11ae6a95c7a13b85d91ef942a087eca635c196c9d4b5587d4.exe PID 1612 wrote to memory of 1188 1612 6140cbc7a6112ce11ae6a95c7a13b85d91ef942a087eca635c196c9d4b5587d4.exe 6140cbc7a6112ce11ae6a95c7a13b85d91ef942a087eca635c196c9d4b5587d4.exe PID 1612 wrote to memory of 1188 1612 6140cbc7a6112ce11ae6a95c7a13b85d91ef942a087eca635c196c9d4b5587d4.exe 6140cbc7a6112ce11ae6a95c7a13b85d91ef942a087eca635c196c9d4b5587d4.exe PID 1612 wrote to memory of 1188 1612 6140cbc7a6112ce11ae6a95c7a13b85d91ef942a087eca635c196c9d4b5587d4.exe 6140cbc7a6112ce11ae6a95c7a13b85d91ef942a087eca635c196c9d4b5587d4.exe PID 1612 wrote to memory of 1188 1612 6140cbc7a6112ce11ae6a95c7a13b85d91ef942a087eca635c196c9d4b5587d4.exe 6140cbc7a6112ce11ae6a95c7a13b85d91ef942a087eca635c196c9d4b5587d4.exe PID 1612 wrote to memory of 1188 1612 6140cbc7a6112ce11ae6a95c7a13b85d91ef942a087eca635c196c9d4b5587d4.exe 6140cbc7a6112ce11ae6a95c7a13b85d91ef942a087eca635c196c9d4b5587d4.exe PID 1612 wrote to memory of 1188 1612 6140cbc7a6112ce11ae6a95c7a13b85d91ef942a087eca635c196c9d4b5587d4.exe 6140cbc7a6112ce11ae6a95c7a13b85d91ef942a087eca635c196c9d4b5587d4.exe PID 1612 wrote to memory of 1188 1612 6140cbc7a6112ce11ae6a95c7a13b85d91ef942a087eca635c196c9d4b5587d4.exe 6140cbc7a6112ce11ae6a95c7a13b85d91ef942a087eca635c196c9d4b5587d4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6140cbc7a6112ce11ae6a95c7a13b85d91ef942a087eca635c196c9d4b5587d4.exe"C:\Users\Admin\AppData\Local\Temp\6140cbc7a6112ce11ae6a95c7a13b85d91ef942a087eca635c196c9d4b5587d4.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2480
-
-
C:\Users\Admin\AppData\Local\Temp\6140cbc7a6112ce11ae6a95c7a13b85d91ef942a087eca635c196c9d4b5587d4.exe"C:\Users\Admin\AppData\Local\Temp\6140cbc7a6112ce11ae6a95c7a13b85d91ef942a087eca635c196c9d4b5587d4.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:1188 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\GYXTU.bat" "3⤵PID:880
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows WA" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe" /f4⤵PID:1744
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"3⤵PID:2764
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"4⤵PID:576
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"4⤵PID:852
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"4⤵PID:1108
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148B
MD53a4614705555abb049c3298e61170b7f
SHA1c8686410756f346d9551256a5b878b04770950ba
SHA256cff0663c8cfadf83b80583a871c313ffc5d950cb503809cb4a482f400c5d846b
SHA51265ce6fec00e6934f21635e7ccd74757f31ed4b0ddb52bd80d3ea9abeba56340128d23151ef7d9f5daacb5d61e4a4cca50dbb3a43132e350522311ee06e829007
-
Filesize
112KB
MD508b6c37b0e2eac9d40679a4adab78658
SHA174b3bafce16fd06b6ed02deeb5040f2090f9257c
SHA256897c2feee337a4470ed0d37726355695c32d6c06c3f96d5e37cc205090b8985d
SHA512709464213ba12d233a4dc5a83306cece302336cca2c19cadf27c3c1ef537310f180c53064a901c5a2e9e3594610d71cc7693c0960ef0b91c9ae8959b860d328d