Overview
overview
10Static
static
10access.dll
windows7-x64
1access.dll
windows10-2004-x64
1l2c.exe
windows7-x64
10l2c.exe
windows10-2004-x64
10l2cserv.exe
windows7-x64
10l2cserv.exe
windows10-2004-x64
10l2net.exe
windows7-x64
10l2net.exe
windows10-2004-x64
10l2update.exe
windows7-x64
7l2update.exe
windows10-2004-x64
7proc.dll
windows7-x64
1proc.dll
windows10-2004-x64
3Analysis
-
max time kernel
141s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
04-06-2024 08:36
Behavioral task
behavioral1
Sample
access.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
access.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
l2c.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
l2c.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
l2cserv.exe
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
l2cserv.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
l2net.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
l2net.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
l2update.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
l2update.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
proc.dll
Resource
win7-20240419-en
Behavioral task
behavioral12
Sample
proc.dll
Resource
win10v2004-20240508-en
General
-
Target
l2cserv.exe
-
Size
259KB
-
MD5
732f7f538e489b35dd7cc423e92734f5
-
SHA1
4520009153dfddf4c5c6ba5a0770e7209ecf5ed1
-
SHA256
ca729340425501bc860d94fea586836205ff2aa5ab8d045a3c14c6b53c80f869
-
SHA512
9f09ca5372b304ec693d7ae7965da9729cdd81c6925256a108d82b6e9fdc5396438c0d9d6b49f40cf57671880a098bc2c1d6a0dcdbf89ff7cfe610862cd60995
-
SSDEEP
6144:/+XxGlvGkOlsAmNUrwG1xB9Yko6Nv9fJvAcc:/+haO3g+rw8c6NvbYc
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader First Stage 1 IoCs
Processes:
resource yara_rule behavioral6/memory/1108-2-0x0000000000400000-0x00000000004B7000-memory.dmp modiloader_stage1 -
Processes:
resource yara_rule behavioral6/memory/1108-0-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral6/memory/1108-2-0x0000000000400000-0x00000000004B7000-memory.dmp upx -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
l2cserv.exepid process 1108 l2cserv.exe 1108 l2cserv.exe 1108 l2cserv.exe -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
l2cserv.exepid process 1108 l2cserv.exe 1108 l2cserv.exe 1108 l2cserv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\l2cserv.exe"C:\Users\Admin\AppData\Local\Temp\l2cserv.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4160 --field-trial-handle=3084,i,4016110471176367543,14287608422419064331,262144 --variations-seed-version /prefetch:81⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1108-0-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/1108-1-0x0000000000AC0000-0x0000000000AC1000-memory.dmpFilesize
4KB
-
memory/1108-2-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/1108-4-0x0000000000AC0000-0x0000000000AC1000-memory.dmpFilesize
4KB