Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2024, 01:35
Static task
static1
Behavioral task
behavioral1
Sample
8f9f6cd053f0c10c4247aaa9dc82820b121a57a0b05827f256b649b54540b132.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8f9f6cd053f0c10c4247aaa9dc82820b121a57a0b05827f256b649b54540b132.exe
Resource
win10v2004-20240802-en
General
-
Target
8f9f6cd053f0c10c4247aaa9dc82820b121a57a0b05827f256b649b54540b132.exe
-
Size
1.1MB
-
MD5
9bf4b16cb6e8a17c00ef2bc7b6c47269
-
SHA1
9eb7c483bf6a6af6374c05a945f8a1ed76390c62
-
SHA256
8f9f6cd053f0c10c4247aaa9dc82820b121a57a0b05827f256b649b54540b132
-
SHA512
9e3e56e760a1c0d3082b383ae3001031635ad64638d2d7b7144bfc524563c2a071b4149cc161af930973347f1a6033701f44bae905075ff1c2b2f6a5140676ad
-
SSDEEP
24576:uV8a2ewVv2R5+vgKNA2tBq3BT6nbvNox4vrY1rbpps8G:u6jY2XsBT6nbVols8G
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 61 IoCs
resource yara_rule behavioral2/memory/4596-3-0x00000000029A0000-0x00000000039A0000-memory.dmp modiloader_stage2 behavioral2/memory/4596-7-0x00000000029A0000-0x00000000039A0000-memory.dmp modiloader_stage2 behavioral2/memory/4596-9-0x00000000029A0000-0x00000000039A0000-memory.dmp modiloader_stage2 behavioral2/memory/4596-17-0x00000000029A0000-0x00000000039A0000-memory.dmp modiloader_stage2 behavioral2/memory/4596-16-0x00000000029A0000-0x00000000039A0000-memory.dmp modiloader_stage2 behavioral2/memory/4596-30-0x00000000029A0000-0x00000000039A0000-memory.dmp modiloader_stage2 behavioral2/memory/4596-29-0x00000000029A0000-0x00000000039A0000-memory.dmp modiloader_stage2 behavioral2/memory/4596-28-0x00000000029A0000-0x00000000039A0000-memory.dmp modiloader_stage2 behavioral2/memory/4596-15-0x00000000029A0000-0x00000000039A0000-memory.dmp modiloader_stage2 behavioral2/memory/4596-27-0x00000000029A0000-0x00000000039A0000-memory.dmp modiloader_stage2 behavioral2/memory/4596-26-0x00000000029A0000-0x00000000039A0000-memory.dmp modiloader_stage2 behavioral2/memory/4596-25-0x00000000029A0000-0x00000000039A0000-memory.dmp modiloader_stage2 behavioral2/memory/4596-14-0x00000000029A0000-0x00000000039A0000-memory.dmp modiloader_stage2 behavioral2/memory/4596-13-0x00000000029A0000-0x00000000039A0000-memory.dmp modiloader_stage2 behavioral2/memory/4596-22-0x00000000029A0000-0x00000000039A0000-memory.dmp modiloader_stage2 behavioral2/memory/4596-21-0x00000000029A0000-0x00000000039A0000-memory.dmp modiloader_stage2 behavioral2/memory/4596-12-0x00000000029A0000-0x00000000039A0000-memory.dmp modiloader_stage2 behavioral2/memory/4596-11-0x00000000029A0000-0x00000000039A0000-memory.dmp modiloader_stage2 behavioral2/memory/4596-10-0x00000000029A0000-0x00000000039A0000-memory.dmp modiloader_stage2 behavioral2/memory/4596-8-0x00000000029A0000-0x00000000039A0000-memory.dmp modiloader_stage2 behavioral2/memory/4596-63-0x00000000029A0000-0x00000000039A0000-memory.dmp modiloader_stage2 behavioral2/memory/4596-65-0x00000000029A0000-0x00000000039A0000-memory.dmp modiloader_stage2 behavioral2/memory/4596-66-0x00000000029A0000-0x00000000039A0000-memory.dmp modiloader_stage2 behavioral2/memory/4596-64-0x00000000029A0000-0x00000000039A0000-memory.dmp modiloader_stage2 behavioral2/memory/4596-62-0x00000000029A0000-0x00000000039A0000-memory.dmp modiloader_stage2 behavioral2/memory/4596-61-0x00000000029A0000-0x00000000039A0000-memory.dmp modiloader_stage2 behavioral2/memory/4596-60-0x00000000029A0000-0x00000000039A0000-memory.dmp modiloader_stage2 behavioral2/memory/4596-58-0x00000000029A0000-0x00000000039A0000-memory.dmp modiloader_stage2 behavioral2/memory/4596-56-0x00000000029A0000-0x00000000039A0000-memory.dmp modiloader_stage2 behavioral2/memory/4596-55-0x00000000029A0000-0x00000000039A0000-memory.dmp modiloader_stage2 behavioral2/memory/4596-53-0x00000000029A0000-0x00000000039A0000-memory.dmp modiloader_stage2 behavioral2/memory/4596-52-0x00000000029A0000-0x00000000039A0000-memory.dmp modiloader_stage2 behavioral2/memory/4596-50-0x00000000029A0000-0x00000000039A0000-memory.dmp modiloader_stage2 behavioral2/memory/4596-49-0x00000000029A0000-0x00000000039A0000-memory.dmp modiloader_stage2 behavioral2/memory/4596-48-0x00000000029A0000-0x00000000039A0000-memory.dmp modiloader_stage2 behavioral2/memory/4596-47-0x00000000029A0000-0x00000000039A0000-memory.dmp modiloader_stage2 behavioral2/memory/4596-45-0x00000000029A0000-0x00000000039A0000-memory.dmp modiloader_stage2 behavioral2/memory/4596-44-0x00000000029A0000-0x00000000039A0000-memory.dmp modiloader_stage2 behavioral2/memory/4596-43-0x00000000029A0000-0x00000000039A0000-memory.dmp modiloader_stage2 behavioral2/memory/4596-41-0x00000000029A0000-0x00000000039A0000-memory.dmp modiloader_stage2 behavioral2/memory/4596-40-0x00000000029A0000-0x00000000039A0000-memory.dmp modiloader_stage2 behavioral2/memory/4596-38-0x00000000029A0000-0x00000000039A0000-memory.dmp modiloader_stage2 behavioral2/memory/4596-39-0x00000000029A0000-0x00000000039A0000-memory.dmp modiloader_stage2 behavioral2/memory/4596-37-0x00000000029A0000-0x00000000039A0000-memory.dmp modiloader_stage2 behavioral2/memory/4596-36-0x00000000029A0000-0x00000000039A0000-memory.dmp modiloader_stage2 behavioral2/memory/4596-33-0x00000000029A0000-0x00000000039A0000-memory.dmp modiloader_stage2 behavioral2/memory/4596-67-0x00000000029A0000-0x00000000039A0000-memory.dmp modiloader_stage2 behavioral2/memory/4596-32-0x00000000029A0000-0x00000000039A0000-memory.dmp modiloader_stage2 behavioral2/memory/4596-31-0x00000000029A0000-0x00000000039A0000-memory.dmp modiloader_stage2 behavioral2/memory/4596-59-0x00000000029A0000-0x00000000039A0000-memory.dmp modiloader_stage2 behavioral2/memory/4596-57-0x00000000029A0000-0x00000000039A0000-memory.dmp modiloader_stage2 behavioral2/memory/4596-54-0x00000000029A0000-0x00000000039A0000-memory.dmp modiloader_stage2 behavioral2/memory/4596-51-0x00000000029A0000-0x00000000039A0000-memory.dmp modiloader_stage2 behavioral2/memory/4596-24-0x00000000029A0000-0x00000000039A0000-memory.dmp modiloader_stage2 behavioral2/memory/4596-46-0x00000000029A0000-0x00000000039A0000-memory.dmp modiloader_stage2 behavioral2/memory/4596-23-0x00000000029A0000-0x00000000039A0000-memory.dmp modiloader_stage2 behavioral2/memory/4596-42-0x00000000029A0000-0x00000000039A0000-memory.dmp modiloader_stage2 behavioral2/memory/4596-20-0x00000000029A0000-0x00000000039A0000-memory.dmp modiloader_stage2 behavioral2/memory/4596-19-0x00000000029A0000-0x00000000039A0000-memory.dmp modiloader_stage2 behavioral2/memory/4596-35-0x00000000029A0000-0x00000000039A0000-memory.dmp modiloader_stage2 behavioral2/memory/4596-18-0x00000000029A0000-0x00000000039A0000-memory.dmp modiloader_stage2 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8f9f6cd053f0c10c4247aaa9dc82820b121a57a0b05827f256b649b54540b132.exe -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 21 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 25 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process PID 4596 wrote to memory of 0 4596 8f9f6cd053f0c10c4247aaa9dc82820b121a57a0b05827f256b649b54540b132.exe PID 4596 wrote to memory of 0 4596 8f9f6cd053f0c10c4247aaa9dc82820b121a57a0b05827f256b649b54540b132.exe PID 4596 wrote to memory of 0 4596 8f9f6cd053f0c10c4247aaa9dc82820b121a57a0b05827f256b649b54540b132.exe PID 4596 wrote to memory of 0 4596 8f9f6cd053f0c10c4247aaa9dc82820b121a57a0b05827f256b649b54540b132.exe PID 4596 wrote to memory of 0 4596 8f9f6cd053f0c10c4247aaa9dc82820b121a57a0b05827f256b649b54540b132.exe PID 4596 wrote to memory of 0 4596 8f9f6cd053f0c10c4247aaa9dc82820b121a57a0b05827f256b649b54540b132.exe PID 4596 wrote to memory of 0 4596 8f9f6cd053f0c10c4247aaa9dc82820b121a57a0b05827f256b649b54540b132.exe PID 4596 wrote to memory of 0 4596 8f9f6cd053f0c10c4247aaa9dc82820b121a57a0b05827f256b649b54540b132.exe PID 4596 wrote to memory of 0 4596 8f9f6cd053f0c10c4247aaa9dc82820b121a57a0b05827f256b649b54540b132.exe PID 4596 wrote to memory of 0 4596 8f9f6cd053f0c10c4247aaa9dc82820b121a57a0b05827f256b649b54540b132.exe PID 4596 wrote to memory of 0 4596 8f9f6cd053f0c10c4247aaa9dc82820b121a57a0b05827f256b649b54540b132.exe PID 4596 wrote to memory of 0 4596 8f9f6cd053f0c10c4247aaa9dc82820b121a57a0b05827f256b649b54540b132.exe PID 4596 wrote to memory of 0 4596 8f9f6cd053f0c10c4247aaa9dc82820b121a57a0b05827f256b649b54540b132.exe PID 4596 wrote to memory of 0 4596 8f9f6cd053f0c10c4247aaa9dc82820b121a57a0b05827f256b649b54540b132.exe PID 4596 wrote to memory of 0 4596 8f9f6cd053f0c10c4247aaa9dc82820b121a57a0b05827f256b649b54540b132.exe PID 4596 wrote to memory of 0 4596 8f9f6cd053f0c10c4247aaa9dc82820b121a57a0b05827f256b649b54540b132.exe PID 4596 wrote to memory of 0 4596 8f9f6cd053f0c10c4247aaa9dc82820b121a57a0b05827f256b649b54540b132.exe PID 4596 wrote to memory of 0 4596 8f9f6cd053f0c10c4247aaa9dc82820b121a57a0b05827f256b649b54540b132.exe PID 4596 wrote to memory of 0 4596 8f9f6cd053f0c10c4247aaa9dc82820b121a57a0b05827f256b649b54540b132.exe PID 4596 wrote to memory of 0 4596 8f9f6cd053f0c10c4247aaa9dc82820b121a57a0b05827f256b649b54540b132.exe PID 4596 wrote to memory of 0 4596 8f9f6cd053f0c10c4247aaa9dc82820b121a57a0b05827f256b649b54540b132.exe PID 4596 wrote to memory of 0 4596 8f9f6cd053f0c10c4247aaa9dc82820b121a57a0b05827f256b649b54540b132.exe PID 4596 wrote to memory of 0 4596 8f9f6cd053f0c10c4247aaa9dc82820b121a57a0b05827f256b649b54540b132.exe PID 4596 wrote to memory of 0 4596 8f9f6cd053f0c10c4247aaa9dc82820b121a57a0b05827f256b649b54540b132.exe PID 4596 wrote to memory of 0 4596 8f9f6cd053f0c10c4247aaa9dc82820b121a57a0b05827f256b649b54540b132.exe PID 4596 wrote to memory of 0 4596 8f9f6cd053f0c10c4247aaa9dc82820b121a57a0b05827f256b649b54540b132.exe PID 4596 wrote to memory of 0 4596 8f9f6cd053f0c10c4247aaa9dc82820b121a57a0b05827f256b649b54540b132.exe PID 4596 wrote to memory of 0 4596 8f9f6cd053f0c10c4247aaa9dc82820b121a57a0b05827f256b649b54540b132.exe PID 4596 wrote to memory of 0 4596 8f9f6cd053f0c10c4247aaa9dc82820b121a57a0b05827f256b649b54540b132.exe PID 4596 wrote to memory of 0 4596 8f9f6cd053f0c10c4247aaa9dc82820b121a57a0b05827f256b649b54540b132.exe PID 4596 wrote to memory of 0 4596 8f9f6cd053f0c10c4247aaa9dc82820b121a57a0b05827f256b649b54540b132.exe PID 4596 wrote to memory of 0 4596 8f9f6cd053f0c10c4247aaa9dc82820b121a57a0b05827f256b649b54540b132.exe PID 4596 wrote to memory of 0 4596 8f9f6cd053f0c10c4247aaa9dc82820b121a57a0b05827f256b649b54540b132.exe PID 4596 wrote to memory of 0 4596 8f9f6cd053f0c10c4247aaa9dc82820b121a57a0b05827f256b649b54540b132.exe PID 4596 wrote to memory of 0 4596 8f9f6cd053f0c10c4247aaa9dc82820b121a57a0b05827f256b649b54540b132.exe PID 4596 wrote to memory of 0 4596 8f9f6cd053f0c10c4247aaa9dc82820b121a57a0b05827f256b649b54540b132.exe PID 4596 wrote to memory of 0 4596 8f9f6cd053f0c10c4247aaa9dc82820b121a57a0b05827f256b649b54540b132.exe PID 4596 wrote to memory of 0 4596 8f9f6cd053f0c10c4247aaa9dc82820b121a57a0b05827f256b649b54540b132.exe PID 4596 wrote to memory of 0 4596 8f9f6cd053f0c10c4247aaa9dc82820b121a57a0b05827f256b649b54540b132.exe PID 4596 wrote to memory of 0 4596 8f9f6cd053f0c10c4247aaa9dc82820b121a57a0b05827f256b649b54540b132.exe PID 4596 wrote to memory of 0 4596 8f9f6cd053f0c10c4247aaa9dc82820b121a57a0b05827f256b649b54540b132.exe PID 4596 wrote to memory of 0 4596 8f9f6cd053f0c10c4247aaa9dc82820b121a57a0b05827f256b649b54540b132.exe PID 4596 wrote to memory of 0 4596 8f9f6cd053f0c10c4247aaa9dc82820b121a57a0b05827f256b649b54540b132.exe PID 4596 wrote to memory of 0 4596 8f9f6cd053f0c10c4247aaa9dc82820b121a57a0b05827f256b649b54540b132.exe PID 4596 wrote to memory of 0 4596 8f9f6cd053f0c10c4247aaa9dc82820b121a57a0b05827f256b649b54540b132.exe PID 4596 wrote to memory of 0 4596 8f9f6cd053f0c10c4247aaa9dc82820b121a57a0b05827f256b649b54540b132.exe PID 4596 wrote to memory of 0 4596 8f9f6cd053f0c10c4247aaa9dc82820b121a57a0b05827f256b649b54540b132.exe PID 4596 wrote to memory of 0 4596 8f9f6cd053f0c10c4247aaa9dc82820b121a57a0b05827f256b649b54540b132.exe PID 4596 wrote to memory of 0 4596 8f9f6cd053f0c10c4247aaa9dc82820b121a57a0b05827f256b649b54540b132.exe PID 4596 wrote to memory of 0 4596 8f9f6cd053f0c10c4247aaa9dc82820b121a57a0b05827f256b649b54540b132.exe PID 4596 wrote to memory of 0 4596 8f9f6cd053f0c10c4247aaa9dc82820b121a57a0b05827f256b649b54540b132.exe PID 4596 wrote to memory of 0 4596 8f9f6cd053f0c10c4247aaa9dc82820b121a57a0b05827f256b649b54540b132.exe PID 4596 wrote to memory of 0 4596 8f9f6cd053f0c10c4247aaa9dc82820b121a57a0b05827f256b649b54540b132.exe PID 4596 wrote to memory of 0 4596 8f9f6cd053f0c10c4247aaa9dc82820b121a57a0b05827f256b649b54540b132.exe PID 4596 wrote to memory of 0 4596 8f9f6cd053f0c10c4247aaa9dc82820b121a57a0b05827f256b649b54540b132.exe PID 4596 wrote to memory of 0 4596 8f9f6cd053f0c10c4247aaa9dc82820b121a57a0b05827f256b649b54540b132.exe PID 4596 wrote to memory of 0 4596 8f9f6cd053f0c10c4247aaa9dc82820b121a57a0b05827f256b649b54540b132.exe PID 4596 wrote to memory of 0 4596 8f9f6cd053f0c10c4247aaa9dc82820b121a57a0b05827f256b649b54540b132.exe PID 4596 wrote to memory of 0 4596 8f9f6cd053f0c10c4247aaa9dc82820b121a57a0b05827f256b649b54540b132.exe PID 4596 wrote to memory of 0 4596 8f9f6cd053f0c10c4247aaa9dc82820b121a57a0b05827f256b649b54540b132.exe PID 4596 wrote to memory of 0 4596 8f9f6cd053f0c10c4247aaa9dc82820b121a57a0b05827f256b649b54540b132.exe PID 4596 wrote to memory of 0 4596 8f9f6cd053f0c10c4247aaa9dc82820b121a57a0b05827f256b649b54540b132.exe PID 4596 wrote to memory of 0 4596 8f9f6cd053f0c10c4247aaa9dc82820b121a57a0b05827f256b649b54540b132.exe PID 4596 wrote to memory of 0 4596 8f9f6cd053f0c10c4247aaa9dc82820b121a57a0b05827f256b649b54540b132.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f9f6cd053f0c10c4247aaa9dc82820b121a57a0b05827f256b649b54540b132.exe"C:\Users\Admin\AppData\Local\Temp\8f9f6cd053f0c10c4247aaa9dc82820b121a57a0b05827f256b649b54540b132.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4596