Analysis
-
max time kernel
142s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
04/09/2024, 05:45
Static task
static1
Behavioral task
behavioral1
Sample
040920240104Specifications00815943.bat
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
040920240104Specifications00815943.bat
Resource
win10v2004-20240802-en
General
-
Target
040920240104Specifications00815943.bat
-
Size
7.1MB
-
MD5
587adc623cd2ec918e72410537cff0d2
-
SHA1
e5aac4e6a607b0bcf4bbf1cbc5a4562252970396
-
SHA256
bad5893610d16654a1ab3e51e192df321ab33c94c93638d10f39b1a16a6826b5
-
SHA512
c00db34e77b3883020eb9e5c7b24c2f8e02d6e1b460842270ac9ebbb5347b7635c218d4788660e682a40f4b7023af8b251daf385a5455e05907eaf9687aa5139
-
SSDEEP
49152:zZPkpvgL5KZVQISxOmzA29oKMXdcVa4vctfVBsav4vur5SGGKhqYcZYEZtqCYSVp:z
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 62 IoCs
resource yara_rule behavioral1/memory/2824-32-0x0000000002FB0000-0x0000000003FB0000-memory.dmp modiloader_stage2 behavioral1/memory/2824-40-0x0000000002FB0000-0x0000000003FB0000-memory.dmp modiloader_stage2 behavioral1/memory/2824-41-0x0000000002FB0000-0x0000000003FB0000-memory.dmp modiloader_stage2 behavioral1/memory/2824-96-0x0000000002FB0000-0x0000000003FB0000-memory.dmp modiloader_stage2 behavioral1/memory/2824-94-0x0000000002FB0000-0x0000000003FB0000-memory.dmp modiloader_stage2 behavioral1/memory/2824-93-0x0000000002FB0000-0x0000000003FB0000-memory.dmp modiloader_stage2 behavioral1/memory/2824-91-0x0000000002FB0000-0x0000000003FB0000-memory.dmp modiloader_stage2 behavioral1/memory/2824-90-0x0000000002FB0000-0x0000000003FB0000-memory.dmp modiloader_stage2 behavioral1/memory/2824-89-0x0000000002FB0000-0x0000000003FB0000-memory.dmp modiloader_stage2 behavioral1/memory/2824-87-0x0000000002FB0000-0x0000000003FB0000-memory.dmp modiloader_stage2 behavioral1/memory/2824-86-0x0000000002FB0000-0x0000000003FB0000-memory.dmp modiloader_stage2 behavioral1/memory/2824-84-0x0000000002FB0000-0x0000000003FB0000-memory.dmp modiloader_stage2 behavioral1/memory/2824-83-0x0000000002FB0000-0x0000000003FB0000-memory.dmp modiloader_stage2 behavioral1/memory/2824-82-0x0000000002FB0000-0x0000000003FB0000-memory.dmp modiloader_stage2 behavioral1/memory/2824-80-0x0000000002FB0000-0x0000000003FB0000-memory.dmp modiloader_stage2 behavioral1/memory/2824-78-0x0000000002FB0000-0x0000000003FB0000-memory.dmp modiloader_stage2 behavioral1/memory/2824-76-0x0000000002FB0000-0x0000000003FB0000-memory.dmp modiloader_stage2 behavioral1/memory/2824-74-0x0000000002FB0000-0x0000000003FB0000-memory.dmp modiloader_stage2 behavioral1/memory/2824-73-0x0000000002FB0000-0x0000000003FB0000-memory.dmp modiloader_stage2 behavioral1/memory/2824-71-0x0000000002FB0000-0x0000000003FB0000-memory.dmp modiloader_stage2 behavioral1/memory/2824-69-0x0000000002FB0000-0x0000000003FB0000-memory.dmp modiloader_stage2 behavioral1/memory/2824-68-0x0000000002FB0000-0x0000000003FB0000-memory.dmp modiloader_stage2 behavioral1/memory/2824-66-0x0000000002FB0000-0x0000000003FB0000-memory.dmp modiloader_stage2 behavioral1/memory/2824-65-0x0000000002FB0000-0x0000000003FB0000-memory.dmp modiloader_stage2 behavioral1/memory/2824-63-0x0000000002FB0000-0x0000000003FB0000-memory.dmp modiloader_stage2 behavioral1/memory/2824-62-0x0000000002FB0000-0x0000000003FB0000-memory.dmp modiloader_stage2 behavioral1/memory/2824-60-0x0000000002FB0000-0x0000000003FB0000-memory.dmp modiloader_stage2 behavioral1/memory/2824-59-0x0000000002FB0000-0x0000000003FB0000-memory.dmp modiloader_stage2 behavioral1/memory/2824-57-0x0000000002FB0000-0x0000000003FB0000-memory.dmp modiloader_stage2 behavioral1/memory/2824-56-0x0000000002FB0000-0x0000000003FB0000-memory.dmp modiloader_stage2 behavioral1/memory/2824-54-0x0000000002FB0000-0x0000000003FB0000-memory.dmp modiloader_stage2 behavioral1/memory/2824-53-0x0000000002FB0000-0x0000000003FB0000-memory.dmp modiloader_stage2 behavioral1/memory/2824-51-0x0000000002FB0000-0x0000000003FB0000-memory.dmp modiloader_stage2 behavioral1/memory/2824-50-0x0000000002FB0000-0x0000000003FB0000-memory.dmp modiloader_stage2 behavioral1/memory/2824-48-0x0000000002FB0000-0x0000000003FB0000-memory.dmp modiloader_stage2 behavioral1/memory/2824-47-0x0000000002FB0000-0x0000000003FB0000-memory.dmp modiloader_stage2 behavioral1/memory/2824-45-0x0000000002FB0000-0x0000000003FB0000-memory.dmp modiloader_stage2 behavioral1/memory/2824-44-0x0000000002FB0000-0x0000000003FB0000-memory.dmp modiloader_stage2 behavioral1/memory/2824-43-0x0000000002FB0000-0x0000000003FB0000-memory.dmp modiloader_stage2 behavioral1/memory/2824-39-0x0000000002FB0000-0x0000000003FB0000-memory.dmp modiloader_stage2 behavioral1/memory/2824-95-0x0000000002FB0000-0x0000000003FB0000-memory.dmp modiloader_stage2 behavioral1/memory/2824-92-0x0000000002FB0000-0x0000000003FB0000-memory.dmp modiloader_stage2 behavioral1/memory/2824-88-0x0000000002FB0000-0x0000000003FB0000-memory.dmp modiloader_stage2 behavioral1/memory/2824-85-0x0000000002FB0000-0x0000000003FB0000-memory.dmp modiloader_stage2 behavioral1/memory/2824-81-0x0000000002FB0000-0x0000000003FB0000-memory.dmp modiloader_stage2 behavioral1/memory/2824-79-0x0000000002FB0000-0x0000000003FB0000-memory.dmp modiloader_stage2 behavioral1/memory/2824-77-0x0000000002FB0000-0x0000000003FB0000-memory.dmp modiloader_stage2 behavioral1/memory/2824-75-0x0000000002FB0000-0x0000000003FB0000-memory.dmp modiloader_stage2 behavioral1/memory/2824-72-0x0000000002FB0000-0x0000000003FB0000-memory.dmp modiloader_stage2 behavioral1/memory/2824-70-0x0000000002FB0000-0x0000000003FB0000-memory.dmp modiloader_stage2 behavioral1/memory/2824-67-0x0000000002FB0000-0x0000000003FB0000-memory.dmp modiloader_stage2 behavioral1/memory/2824-64-0x0000000002FB0000-0x0000000003FB0000-memory.dmp modiloader_stage2 behavioral1/memory/2824-61-0x0000000002FB0000-0x0000000003FB0000-memory.dmp modiloader_stage2 behavioral1/memory/2824-58-0x0000000002FB0000-0x0000000003FB0000-memory.dmp modiloader_stage2 behavioral1/memory/2824-55-0x0000000002FB0000-0x0000000003FB0000-memory.dmp modiloader_stage2 behavioral1/memory/2824-52-0x0000000002FB0000-0x0000000003FB0000-memory.dmp modiloader_stage2 behavioral1/memory/2824-49-0x0000000002FB0000-0x0000000003FB0000-memory.dmp modiloader_stage2 behavioral1/memory/2824-46-0x0000000002FB0000-0x0000000003FB0000-memory.dmp modiloader_stage2 behavioral1/memory/2824-42-0x0000000002FB0000-0x0000000003FB0000-memory.dmp modiloader_stage2 behavioral1/memory/2824-38-0x0000000002FB0000-0x0000000003FB0000-memory.dmp modiloader_stage2 behavioral1/memory/2824-37-0x0000000002FB0000-0x0000000003FB0000-memory.dmp modiloader_stage2 behavioral1/memory/2824-36-0x0000000002FB0000-0x0000000003FB0000-memory.dmp modiloader_stage2 -
Executes dropped EXE 8 IoCs
pid Process 2748 alpha.exe 2920 alpha.exe 2772 kn.exe 2624 alpha.exe 2316 kn.exe 2824 Host.COM 2928 alpha.exe 2620 alpha.exe -
Loads dropped DLL 7 IoCs
pid Process 2276 cmd.exe 2276 cmd.exe 2920 alpha.exe 2276 cmd.exe 2624 alpha.exe 2420 WerFault.exe 2420 WerFault.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2420 2824 WerFault.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Host.COM -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 2824 Host.COM -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 2276 wrote to memory of 2160 2276 cmd.exe 31 PID 2276 wrote to memory of 2160 2276 cmd.exe 31 PID 2276 wrote to memory of 2160 2276 cmd.exe 31 PID 2276 wrote to memory of 2748 2276 cmd.exe 32 PID 2276 wrote to memory of 2748 2276 cmd.exe 32 PID 2276 wrote to memory of 2748 2276 cmd.exe 32 PID 2748 wrote to memory of 2848 2748 alpha.exe 33 PID 2748 wrote to memory of 2848 2748 alpha.exe 33 PID 2748 wrote to memory of 2848 2748 alpha.exe 33 PID 2276 wrote to memory of 2920 2276 cmd.exe 34 PID 2276 wrote to memory of 2920 2276 cmd.exe 34 PID 2276 wrote to memory of 2920 2276 cmd.exe 34 PID 2920 wrote to memory of 2772 2920 alpha.exe 35 PID 2920 wrote to memory of 2772 2920 alpha.exe 35 PID 2920 wrote to memory of 2772 2920 alpha.exe 35 PID 2276 wrote to memory of 2624 2276 cmd.exe 36 PID 2276 wrote to memory of 2624 2276 cmd.exe 36 PID 2276 wrote to memory of 2624 2276 cmd.exe 36 PID 2624 wrote to memory of 2316 2624 alpha.exe 37 PID 2624 wrote to memory of 2316 2624 alpha.exe 37 PID 2624 wrote to memory of 2316 2624 alpha.exe 37 PID 2276 wrote to memory of 2824 2276 cmd.exe 38 PID 2276 wrote to memory of 2824 2276 cmd.exe 38 PID 2276 wrote to memory of 2824 2276 cmd.exe 38 PID 2276 wrote to memory of 2824 2276 cmd.exe 38 PID 2276 wrote to memory of 2928 2276 cmd.exe 39 PID 2276 wrote to memory of 2928 2276 cmd.exe 39 PID 2276 wrote to memory of 2928 2276 cmd.exe 39 PID 2276 wrote to memory of 2620 2276 cmd.exe 40 PID 2276 wrote to memory of 2620 2276 cmd.exe 40 PID 2276 wrote to memory of 2620 2276 cmd.exe 40 PID 2824 wrote to memory of 2420 2824 Host.COM 41 PID 2824 wrote to memory of 2420 2824 Host.COM 41 PID 2824 wrote to memory of 2420 2824 Host.COM 41 PID 2824 wrote to memory of 2420 2824 Host.COM 41
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\040920240104Specifications00815943.bat"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\System32\extrac32.exeC:\\Windows\\System32\\extrac32 /C /Y C:\\Windows\\System32\\cmd.exe "C:\\Users\\Public\\alpha.exe"2⤵PID:2160
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c extrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\system32\extrac32.exeextrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe3⤵PID:2848
-
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c C:\\Users\\Public\\kn -decodehex -F "C:\Users\Admin\AppData\Local\Temp\040920240104Specifications00815943.bat" "C:\\Users\\Public\\Host.GIF" 32⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Users\Public\kn.exeC:\\Users\\Public\\kn -decodehex -F "C:\Users\Admin\AppData\Local\Temp\040920240104Specifications00815943.bat" "C:\\Users\\Public\\Host.GIF" 33⤵
- Executes dropped EXE
PID:2772
-
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c C:\\Users\\Public\\kn -decodehex -F "C:\\Users\\Public\\Host.GIF" "C:\\Users\\Public\\Libraries\\Host.COM" 102⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Users\Public\kn.exeC:\\Users\\Public\\kn -decodehex -F "C:\\Users\\Public\\Host.GIF" "C:\\Users\\Public\\Libraries\\Host.COM" 103⤵
- Executes dropped EXE
PID:2316
-
-
-
C:\Users\Public\Libraries\Host.COMC:\Users\Public\Libraries\Host.COM2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2824 -s 7523⤵
- Loads dropped DLL
- Program crash
PID:2420
-
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c del /q "C:\Users\Public\kn.exe" / A / F / Q / S2⤵
- Executes dropped EXE
PID:2928
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c del /q "C:\Users\Public\Host.GIF" / A / F / Q / S2⤵
- Executes dropped EXE
PID:2620
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.0MB
MD596c31123e7d91d23f52dd282d373d4cb
SHA14419e44317991a4f6d928eca8f35443aa201dbcd
SHA2569a57a32072f277fb9835190c3020fff320984fb11070f232a8f5ddd3c39c48ba
SHA512c7318fedfe2f9e135e7156e96c77e8c8511e62fb26239825cc64116724508a297d709ec3fd9d1265a084c6d264ac8b69f808ed902b31cd0044c99c4f567d1351
-
Filesize
1.4MB
MD5836686f8d895ac8d4707128ba178105a
SHA1581d18b17ff6b8ed9c4ca171ec78686fe7fc0b95
SHA256f0c7e5d55175d1ad37e338ac39e2dda6e5a02e3584acd894dd7aceb0a8aea18b
SHA512b0f5bd02d8a9b15c5441980d78dd38d99ea16523a6a515dfe5c9e24b8bc8baab1c335ce9b34b5298238777f8f2c4aba71f2b030d891ec2e18e71306d0f1b61a8
-
Filesize
337KB
MD55746bd7e255dd6a8afa06f7c42c1ba41
SHA10f3c4ff28f354aede202d54e9d1c5529a3bf87d8
SHA256db06c3534964e3fc79d2763144ba53742d7fa250ca336f4a0fe724b75aaff386
SHA5123a968356d7b94cc014f78ca37a3c03f354c3970c9e027ed4ccb8e59f0f9f2a32bfa22e7d6b127d44631d715ea41bf8ace91f0b4d69d1714d55552b064ffeb69e
-
Filesize
1.1MB
MD5ec1fd3050dbc40ec7e87ab99c7ca0b03
SHA1ae7fdfc29f4ef31e38ebf381e61b503038b5cb35
SHA2561e19c5a26215b62de1babd5633853344420c1e673bb83e8a89213085e17e16e3
SHA5124e47331f2fdce77b01d86cf8e21cd7d6df13536f09b70c53e5a6b82f66512faa10e38645884c696b47a27ea6bddc6c1fdb905ee78684dca98cbda5f39fbafcc2