Analysis
-
max time kernel
1441s -
max time network
1450s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-06-2024 05:48
Static task
static1
Behavioral task
behavioral1
Sample
ex2d.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
ex2d.exe
Resource
win10v2004-20240508-en
General
-
Target
ex2d.exe
-
Size
1.0MB
-
MD5
9c727dc787a39ab9b922995de8c1ad99
-
SHA1
1a0fab414c33759fdecbec52460a8d596c434a19
-
SHA256
1e414463710f5eee406e44815894e93a945289a50a2e8cfa9deef40d7c2e2de3
-
SHA512
c74691ca8821faed1a8cd2ab7112e91ba90326a24e01a3f7077ae179c8b458452784b0634b19242795ee2b025ae689f8e08d8b01f5d2552b9df2a9ae60536e35
-
SSDEEP
24576:rmoO8itEqfZBBoIroaajDce2wia6Gx9UtZmSx00MNFe32UkqD/XDuH+o:qvZrrZU56cc8NFe32UkC+f
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader First Stage 2 IoCs
resource yara_rule behavioral2/files/0x0007000000023404-10.dat modiloader_stage1 behavioral2/memory/3020-22-0x0000000000400000-0x0000000000700000-memory.dmp modiloader_stage1 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation ex2d.exe -
Executes dropped EXE 1 IoCs
pid Process 3020 pmwfr.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\pm = "C:\\Users\\Admin\\Music\\pmero.hta" pmwfr.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1752 wrote to memory of 3020 1752 ex2d.exe 81 PID 1752 wrote to memory of 3020 1752 ex2d.exe 81 PID 1752 wrote to memory of 3020 1752 ex2d.exe 81 PID 3020 wrote to memory of 4864 3020 pmwfr.exe 83 PID 3020 wrote to memory of 4864 3020 pmwfr.exe 83 PID 3020 wrote to memory of 4864 3020 pmwfr.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\ex2d.exe"C:\Users\Admin\AppData\Local\Temp\ex2d.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\pm.pngc\pmwfr.exe"C:\Users\Admin\AppData\Local\Temp\pm.pngc\pmwfr.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\TapiUnattend.exe"C:\Windows\System32\TapiUnattend.exe"3⤵PID:4864
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
570KB
MD58ad676dd7492a10768e8dbfdb25f5462
SHA122363d608e2e630e354f4d3dace5d15c2495b9c1
SHA256c4bd361e8127437a039f09036985262ac3041ae9085a1e99584ea8ce742a9269
SHA512f1946e789957d7ee625d168f636b1a624f58743fd357829d4b7ed5843345634b7c6571cc8b558734f811e6cdf354d8897b5c1d13c954894d7aa07313e113cd85
-
Filesize
886KB
MD57866de22baa38c927b53fc331fcde99e
SHA1ca899afd50fbb88da439ca8e492b2a992cebe948
SHA2560171e836f4a7ffbf66dea654f4bce360578ba8493032acd2a1b7c8d64cf4b79c
SHA512d3047dfab772a0c9db64d24aa1bc09e07056118e5b964fd09feacde040a7ad0d0c97299596b38b059271fa7ae71e3542ea02e2bfe41d88839ba400381b9b45c4