Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
31-05-2024 00:31
Behavioral task
behavioral1
Sample
9087b832d680e7d6fbff11594b719ecf32c5bbe0c667a61832ce665f4df13e99.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9087b832d680e7d6fbff11594b719ecf32c5bbe0c667a61832ce665f4df13e99.exe
Resource
win10v2004-20240426-en
General
-
Target
9087b832d680e7d6fbff11594b719ecf32c5bbe0c667a61832ce665f4df13e99.exe
-
Size
130KB
-
MD5
a5f9a6cc66f6bbe2507647f737d1d8af
-
SHA1
48fdcc999118453847fc98a5e9a77a509f177813
-
SHA256
9087b832d680e7d6fbff11594b719ecf32c5bbe0c667a61832ce665f4df13e99
-
SHA512
8b87ef64dcc3dc08fef4d08282f69960224e46147b67d2f9b2209d44709d1097299dbe04873ae2b10e4a5704942cc662ac5df0623e5c3ea96645cb0e9557a210
-
SSDEEP
1536:eH1ZaQvR1KiX3NK6I+hZhYrt/w5Q6G6IpiRYzz9qJHhhnm0yG5aP/5UROXTmZ:SKQJcinxphkG5Q6GdpIOkJHhKRyOXK
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Detects Windows executables referencing non-Windows User-Agents 6 IoCs
Processes:
resource yara_rule behavioral2/memory/1956-51-0x0000000000400000-0x0000000000411000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/1956-49-0x0000000000400000-0x0000000000411000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/1956-56-0x0000000000400000-0x0000000000411000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/1956-53-0x0000000000400000-0x0000000000411000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/1956-52-0x0000000000400000-0x0000000000411000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/1956-61-0x0000000000400000-0x0000000000411000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA -
ModiLoader Second Stage 6 IoCs
Processes:
resource yara_rule behavioral2/memory/1956-51-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral2/memory/1956-49-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral2/memory/1956-56-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral2/memory/1956-53-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral2/memory/1956-52-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral2/memory/1956-61-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 -
UPX dump on OEP (original entry point) 13 IoCs
Processes:
resource yara_rule behavioral2/memory/2688-0-0x0000000000400000-0x0000000000423000-memory.dmp UPX behavioral2/memory/4684-8-0x0000000000400000-0x000000000040B000-memory.dmp UPX behavioral2/memory/4684-10-0x0000000000400000-0x000000000040B000-memory.dmp UPX behavioral2/memory/4684-13-0x0000000000400000-0x000000000040B000-memory.dmp UPX behavioral2/memory/2688-15-0x0000000000400000-0x0000000000423000-memory.dmp UPX C:\Users\Admin\AppData\Roaming\..Flash\Flaseher.exe UPX behavioral2/memory/4776-37-0x0000000000400000-0x0000000000423000-memory.dmp UPX behavioral2/memory/4776-41-0x0000000000400000-0x0000000000423000-memory.dmp UPX behavioral2/memory/4776-42-0x0000000000400000-0x0000000000423000-memory.dmp UPX behavioral2/memory/4776-43-0x0000000000400000-0x0000000000423000-memory.dmp UPX behavioral2/memory/4776-57-0x0000000000400000-0x0000000000423000-memory.dmp UPX behavioral2/memory/4684-58-0x0000000000400000-0x000000000040B000-memory.dmp UPX behavioral2/memory/3300-60-0x0000000000400000-0x000000000040B000-memory.dmp UPX -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
9087b832d680e7d6fbff11594b719ecf32c5bbe0c667a61832ce665f4df13e99.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation 9087b832d680e7d6fbff11594b719ecf32c5bbe0c667a61832ce665f4df13e99.exe -
Executes dropped EXE 3 IoCs
Processes:
Flaseher.exeFlaseher.exeFlaseher.exepid process 4776 Flaseher.exe 3300 Flaseher.exe 1956 Flaseher.exe -
Processes:
resource yara_rule behavioral2/memory/2688-0-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/4684-8-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4684-10-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4684-13-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/2688-15-0x0000000000400000-0x0000000000423000-memory.dmp upx C:\Users\Admin\AppData\Roaming\..Flash\Flaseher.exe upx behavioral2/memory/4776-37-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/4776-41-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/4776-42-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/4776-43-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/4776-57-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/4684-58-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3300-60-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\.Flasfh = "C:\\Users\\Admin\\AppData\\Roaming\\..Flash\\Flaseher.exe" reg.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
9087b832d680e7d6fbff11594b719ecf32c5bbe0c667a61832ce665f4df13e99.exeFlaseher.exedescription pid process target process PID 2688 set thread context of 4684 2688 9087b832d680e7d6fbff11594b719ecf32c5bbe0c667a61832ce665f4df13e99.exe 9087b832d680e7d6fbff11594b719ecf32c5bbe0c667a61832ce665f4df13e99.exe PID 4776 set thread context of 3300 4776 Flaseher.exe Flaseher.exe PID 4776 set thread context of 1956 4776 Flaseher.exe Flaseher.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
Flaseher.exedescription pid process Token: SeDebugPrivilege 3300 Flaseher.exe Token: SeDebugPrivilege 3300 Flaseher.exe Token: SeDebugPrivilege 3300 Flaseher.exe Token: SeDebugPrivilege 3300 Flaseher.exe Token: SeDebugPrivilege 3300 Flaseher.exe Token: SeDebugPrivilege 3300 Flaseher.exe Token: SeDebugPrivilege 3300 Flaseher.exe Token: SeDebugPrivilege 3300 Flaseher.exe Token: SeDebugPrivilege 3300 Flaseher.exe Token: SeDebugPrivilege 3300 Flaseher.exe Token: SeDebugPrivilege 3300 Flaseher.exe Token: SeDebugPrivilege 3300 Flaseher.exe Token: SeDebugPrivilege 3300 Flaseher.exe Token: SeDebugPrivilege 3300 Flaseher.exe Token: SeDebugPrivilege 3300 Flaseher.exe Token: SeDebugPrivilege 3300 Flaseher.exe Token: SeDebugPrivilege 3300 Flaseher.exe Token: SeDebugPrivilege 3300 Flaseher.exe Token: SeDebugPrivilege 3300 Flaseher.exe Token: SeDebugPrivilege 3300 Flaseher.exe Token: SeDebugPrivilege 3300 Flaseher.exe Token: SeDebugPrivilege 3300 Flaseher.exe Token: SeDebugPrivilege 3300 Flaseher.exe Token: SeDebugPrivilege 3300 Flaseher.exe Token: SeDebugPrivilege 3300 Flaseher.exe Token: SeDebugPrivilege 3300 Flaseher.exe Token: SeDebugPrivilege 3300 Flaseher.exe Token: SeDebugPrivilege 3300 Flaseher.exe Token: SeDebugPrivilege 3300 Flaseher.exe Token: SeDebugPrivilege 3300 Flaseher.exe Token: SeDebugPrivilege 3300 Flaseher.exe Token: SeDebugPrivilege 3300 Flaseher.exe Token: SeDebugPrivilege 3300 Flaseher.exe Token: SeDebugPrivilege 3300 Flaseher.exe Token: SeDebugPrivilege 3300 Flaseher.exe Token: SeDebugPrivilege 3300 Flaseher.exe Token: SeDebugPrivilege 3300 Flaseher.exe Token: SeDebugPrivilege 3300 Flaseher.exe Token: SeDebugPrivilege 3300 Flaseher.exe Token: SeDebugPrivilege 3300 Flaseher.exe Token: SeDebugPrivilege 3300 Flaseher.exe Token: SeDebugPrivilege 3300 Flaseher.exe Token: SeDebugPrivilege 3300 Flaseher.exe Token: SeDebugPrivilege 3300 Flaseher.exe Token: SeDebugPrivilege 3300 Flaseher.exe Token: SeDebugPrivilege 3300 Flaseher.exe Token: SeDebugPrivilege 3300 Flaseher.exe Token: SeDebugPrivilege 3300 Flaseher.exe Token: SeDebugPrivilege 3300 Flaseher.exe Token: SeDebugPrivilege 3300 Flaseher.exe Token: SeDebugPrivilege 3300 Flaseher.exe Token: SeDebugPrivilege 3300 Flaseher.exe Token: SeDebugPrivilege 3300 Flaseher.exe Token: SeDebugPrivilege 3300 Flaseher.exe Token: SeDebugPrivilege 3300 Flaseher.exe Token: SeDebugPrivilege 3300 Flaseher.exe Token: SeDebugPrivilege 3300 Flaseher.exe Token: SeDebugPrivilege 3300 Flaseher.exe Token: SeDebugPrivilege 3300 Flaseher.exe Token: SeDebugPrivilege 3300 Flaseher.exe Token: SeDebugPrivilege 3300 Flaseher.exe Token: SeDebugPrivilege 3300 Flaseher.exe Token: SeDebugPrivilege 3300 Flaseher.exe Token: SeDebugPrivilege 3300 Flaseher.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
9087b832d680e7d6fbff11594b719ecf32c5bbe0c667a61832ce665f4df13e99.exe9087b832d680e7d6fbff11594b719ecf32c5bbe0c667a61832ce665f4df13e99.exeFlaseher.exeFlaseher.exepid process 2688 9087b832d680e7d6fbff11594b719ecf32c5bbe0c667a61832ce665f4df13e99.exe 4684 9087b832d680e7d6fbff11594b719ecf32c5bbe0c667a61832ce665f4df13e99.exe 4776 Flaseher.exe 3300 Flaseher.exe -
Suspicious use of WriteProcessMemory 38 IoCs
Processes:
9087b832d680e7d6fbff11594b719ecf32c5bbe0c667a61832ce665f4df13e99.exe9087b832d680e7d6fbff11594b719ecf32c5bbe0c667a61832ce665f4df13e99.execmd.exeFlaseher.exedescription pid process target process PID 2688 wrote to memory of 4684 2688 9087b832d680e7d6fbff11594b719ecf32c5bbe0c667a61832ce665f4df13e99.exe 9087b832d680e7d6fbff11594b719ecf32c5bbe0c667a61832ce665f4df13e99.exe PID 2688 wrote to memory of 4684 2688 9087b832d680e7d6fbff11594b719ecf32c5bbe0c667a61832ce665f4df13e99.exe 9087b832d680e7d6fbff11594b719ecf32c5bbe0c667a61832ce665f4df13e99.exe PID 2688 wrote to memory of 4684 2688 9087b832d680e7d6fbff11594b719ecf32c5bbe0c667a61832ce665f4df13e99.exe 9087b832d680e7d6fbff11594b719ecf32c5bbe0c667a61832ce665f4df13e99.exe PID 2688 wrote to memory of 4684 2688 9087b832d680e7d6fbff11594b719ecf32c5bbe0c667a61832ce665f4df13e99.exe 9087b832d680e7d6fbff11594b719ecf32c5bbe0c667a61832ce665f4df13e99.exe PID 2688 wrote to memory of 4684 2688 9087b832d680e7d6fbff11594b719ecf32c5bbe0c667a61832ce665f4df13e99.exe 9087b832d680e7d6fbff11594b719ecf32c5bbe0c667a61832ce665f4df13e99.exe PID 2688 wrote to memory of 4684 2688 9087b832d680e7d6fbff11594b719ecf32c5bbe0c667a61832ce665f4df13e99.exe 9087b832d680e7d6fbff11594b719ecf32c5bbe0c667a61832ce665f4df13e99.exe PID 2688 wrote to memory of 4684 2688 9087b832d680e7d6fbff11594b719ecf32c5bbe0c667a61832ce665f4df13e99.exe 9087b832d680e7d6fbff11594b719ecf32c5bbe0c667a61832ce665f4df13e99.exe PID 2688 wrote to memory of 4684 2688 9087b832d680e7d6fbff11594b719ecf32c5bbe0c667a61832ce665f4df13e99.exe 9087b832d680e7d6fbff11594b719ecf32c5bbe0c667a61832ce665f4df13e99.exe PID 4684 wrote to memory of 3736 4684 9087b832d680e7d6fbff11594b719ecf32c5bbe0c667a61832ce665f4df13e99.exe cmd.exe PID 4684 wrote to memory of 3736 4684 9087b832d680e7d6fbff11594b719ecf32c5bbe0c667a61832ce665f4df13e99.exe cmd.exe PID 4684 wrote to memory of 3736 4684 9087b832d680e7d6fbff11594b719ecf32c5bbe0c667a61832ce665f4df13e99.exe cmd.exe PID 3736 wrote to memory of 4364 3736 cmd.exe reg.exe PID 3736 wrote to memory of 4364 3736 cmd.exe reg.exe PID 3736 wrote to memory of 4364 3736 cmd.exe reg.exe PID 4684 wrote to memory of 4776 4684 9087b832d680e7d6fbff11594b719ecf32c5bbe0c667a61832ce665f4df13e99.exe Flaseher.exe PID 4684 wrote to memory of 4776 4684 9087b832d680e7d6fbff11594b719ecf32c5bbe0c667a61832ce665f4df13e99.exe Flaseher.exe PID 4684 wrote to memory of 4776 4684 9087b832d680e7d6fbff11594b719ecf32c5bbe0c667a61832ce665f4df13e99.exe Flaseher.exe PID 4776 wrote to memory of 3300 4776 Flaseher.exe Flaseher.exe PID 4776 wrote to memory of 3300 4776 Flaseher.exe Flaseher.exe PID 4776 wrote to memory of 3300 4776 Flaseher.exe Flaseher.exe PID 4776 wrote to memory of 3300 4776 Flaseher.exe Flaseher.exe PID 4776 wrote to memory of 3300 4776 Flaseher.exe Flaseher.exe PID 4776 wrote to memory of 3300 4776 Flaseher.exe Flaseher.exe PID 4776 wrote to memory of 3300 4776 Flaseher.exe Flaseher.exe PID 4776 wrote to memory of 3300 4776 Flaseher.exe Flaseher.exe PID 4776 wrote to memory of 1956 4776 Flaseher.exe Flaseher.exe PID 4776 wrote to memory of 1956 4776 Flaseher.exe Flaseher.exe PID 4776 wrote to memory of 1956 4776 Flaseher.exe Flaseher.exe PID 4776 wrote to memory of 1956 4776 Flaseher.exe Flaseher.exe PID 4776 wrote to memory of 1956 4776 Flaseher.exe Flaseher.exe PID 4776 wrote to memory of 1956 4776 Flaseher.exe Flaseher.exe PID 4776 wrote to memory of 1956 4776 Flaseher.exe Flaseher.exe PID 4776 wrote to memory of 1956 4776 Flaseher.exe Flaseher.exe PID 4776 wrote to memory of 1956 4776 Flaseher.exe Flaseher.exe PID 4776 wrote to memory of 1956 4776 Flaseher.exe Flaseher.exe PID 4776 wrote to memory of 1956 4776 Flaseher.exe Flaseher.exe PID 4776 wrote to memory of 1956 4776 Flaseher.exe Flaseher.exe PID 4776 wrote to memory of 1956 4776 Flaseher.exe Flaseher.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9087b832d680e7d6fbff11594b719ecf32c5bbe0c667a61832ce665f4df13e99.exe"C:\Users\Admin\AppData\Local\Temp\9087b832d680e7d6fbff11594b719ecf32c5bbe0c667a61832ce665f4df13e99.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\9087b832d680e7d6fbff11594b719ecf32c5bbe0c667a61832ce665f4df13e99.exe"C:\Users\Admin\AppData\Local\Temp\9087b832d680e7d6fbff11594b719ecf32c5bbe0c667a61832ce665f4df13e99.exe"2⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\OBFBP.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v ".Flasfh" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\..Flash\Flaseher.exe" /f4⤵
- Adds Run key to start application
PID:4364
-
-
-
C:\Users\Admin\AppData\Roaming\..Flash\Flaseher.exe"C:\Users\Admin\AppData\Roaming\..Flash\Flaseher.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Users\Admin\AppData\Roaming\..Flash\Flaseher.exe"C:\Users\Admin\AppData\Roaming\..Flash\Flaseher.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3300
-
-
C:\Users\Admin\AppData\Roaming\..Flash\Flaseher.exe"C:\Users\Admin\AppData\Roaming\..Flash\Flaseher.exe"4⤵
- Executes dropped EXE
PID:1956
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
145B
MD5da0cbe87b720a79b294147ed6a4b98be
SHA1ebf0dc9efd7a12cb192e355cda87546acb4ab360
SHA2567ccfeff356fdccc9145bd1e263aa1c56360ca7b6552ed5a5665c596d02a627ed
SHA512f55c4a3d24d2f11db5eda3c816d1cd3b8804a171a7bf715b13d60788247fbb352eafaa5bd4e0a8086c1013396be0a48c7bdb904ab0f974fa0c75e81e3d365acc
-
Filesize
130KB
MD51610d11054307add287652d81d539d54
SHA16bc8c750f7920c17cdc76fb73b92fcdd987378e4
SHA256605d24bbbdd8d129558ea894f594fb61bc3a3b5caaf8c9e1ace6e64714400e4b
SHA51207f1aced2d479a282e467ae5fbce3f1642c2842bebddce6add194400c0eae208e1e4a8938a2a1bc5902755f2479c92463128b4469b514b43c94e2809784e6bd9