Analysis
-
max time kernel
120s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15-09-2024 10:04
Static task
static1
Behavioral task
behavioral1
Sample
71f49042859a510a846a10fe2d5f7910N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
71f49042859a510a846a10fe2d5f7910N.exe
Resource
win10v2004-20240802-en
General
-
Target
71f49042859a510a846a10fe2d5f7910N.exe
-
Size
112KB
-
MD5
71f49042859a510a846a10fe2d5f7910
-
SHA1
0fce317b953bf5785ed466398c125578e9a199ae
-
SHA256
40011d852e2c2fa22ee9b3cd1595441231c31fd78a9fa05352d1d61beb3faa02
-
SHA512
704fa4974aa265c279b10a5826fdeb087e2ef921a2478c166a5baf8544e54e3725164701548fb4e18d11dd4c0f468e9bdf4461147bcee03ff7a307412cb15aa3
-
SSDEEP
1536:t2ovIa47CqIf2f3w41p7sDcX7juR/JSJw8EeNshUDGXJ:tVIr7zI+fAceoGxSKKo5
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 3 IoCs
resource yara_rule behavioral2/memory/3236-64-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 behavioral2/memory/3236-63-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 behavioral2/memory/3236-73-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation 71f49042859a510a846a10fe2d5f7910N.exe -
Executes dropped EXE 3 IoCs
pid Process 4536 WAMain.exe 2676 WAMain.exe 3236 WAMain.exe -
resource yara_rule behavioral2/memory/2476-9-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/2476-11-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/2476-15-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/2476-44-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3236-58-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/3236-62-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/3236-64-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/3236-63-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/2476-68-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/2676-69-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3236-73-0x0000000000400000-0x0000000000414000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows WA = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\WAMain.exe" reg.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 1812 set thread context of 8 1812 71f49042859a510a846a10fe2d5f7910N.exe 86 PID 1812 set thread context of 2476 1812 71f49042859a510a846a10fe2d5f7910N.exe 87 PID 4536 set thread context of 2164 4536 WAMain.exe 96 PID 4536 set thread context of 2676 4536 WAMain.exe 97 PID 4536 set thread context of 3236 4536 WAMain.exe 98 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 396 8 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WAMain.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WAMain.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WAMain.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 71f49042859a510a846a10fe2d5f7910N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 71f49042859a510a846a10fe2d5f7910N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2164 svchost.exe 2164 svchost.exe 2164 svchost.exe 2164 svchost.exe 2164 svchost.exe 2164 svchost.exe 2164 svchost.exe 2164 svchost.exe 2164 svchost.exe 2164 svchost.exe 2164 svchost.exe 2164 svchost.exe 2164 svchost.exe 2164 svchost.exe 2164 svchost.exe 2164 svchost.exe 2164 svchost.exe 2164 svchost.exe 2164 svchost.exe 2164 svchost.exe 2164 svchost.exe 2164 svchost.exe 2164 svchost.exe 2164 svchost.exe 2164 svchost.exe 2164 svchost.exe 2164 svchost.exe 2164 svchost.exe 2164 svchost.exe 2164 svchost.exe 2164 svchost.exe 2164 svchost.exe 2164 svchost.exe 2164 svchost.exe 2164 svchost.exe 2164 svchost.exe 2164 svchost.exe 2164 svchost.exe 2164 svchost.exe 2164 svchost.exe 2164 svchost.exe 2164 svchost.exe 2164 svchost.exe 2164 svchost.exe 2164 svchost.exe 2164 svchost.exe 2164 svchost.exe 2164 svchost.exe 2164 svchost.exe 2164 svchost.exe 2164 svchost.exe 2164 svchost.exe 2164 svchost.exe 2164 svchost.exe 2164 svchost.exe 2164 svchost.exe 2164 svchost.exe 2164 svchost.exe 2164 svchost.exe 2164 svchost.exe 2164 svchost.exe 2164 svchost.exe 2164 svchost.exe 2164 svchost.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2676 WAMain.exe Token: SeDebugPrivilege 2676 WAMain.exe Token: SeDebugPrivilege 2676 WAMain.exe Token: SeDebugPrivilege 2676 WAMain.exe Token: SeDebugPrivilege 2676 WAMain.exe Token: SeDebugPrivilege 2676 WAMain.exe Token: SeDebugPrivilege 2676 WAMain.exe Token: SeDebugPrivilege 2676 WAMain.exe Token: SeDebugPrivilege 2676 WAMain.exe Token: SeDebugPrivilege 2676 WAMain.exe Token: SeDebugPrivilege 2676 WAMain.exe Token: SeDebugPrivilege 2676 WAMain.exe Token: SeDebugPrivilege 2676 WAMain.exe Token: SeDebugPrivilege 2676 WAMain.exe Token: SeDebugPrivilege 2676 WAMain.exe Token: SeDebugPrivilege 2676 WAMain.exe Token: SeDebugPrivilege 2676 WAMain.exe Token: SeDebugPrivilege 2676 WAMain.exe Token: SeDebugPrivilege 2676 WAMain.exe Token: SeDebugPrivilege 2676 WAMain.exe Token: SeDebugPrivilege 2676 WAMain.exe Token: SeDebugPrivilege 2676 WAMain.exe Token: SeDebugPrivilege 2676 WAMain.exe Token: SeDebugPrivilege 2676 WAMain.exe Token: SeDebugPrivilege 2676 WAMain.exe Token: SeDebugPrivilege 2676 WAMain.exe Token: SeDebugPrivilege 2676 WAMain.exe Token: SeDebugPrivilege 2676 WAMain.exe Token: SeDebugPrivilege 2676 WAMain.exe Token: SeDebugPrivilege 2676 WAMain.exe Token: SeDebugPrivilege 2676 WAMain.exe Token: SeDebugPrivilege 2676 WAMain.exe Token: SeDebugPrivilege 2676 WAMain.exe Token: SeDebugPrivilege 2676 WAMain.exe Token: SeDebugPrivilege 2676 WAMain.exe Token: SeDebugPrivilege 2676 WAMain.exe Token: SeDebugPrivilege 2676 WAMain.exe Token: SeDebugPrivilege 2676 WAMain.exe Token: SeDebugPrivilege 2676 WAMain.exe Token: SeDebugPrivilege 2676 WAMain.exe Token: SeDebugPrivilege 2676 WAMain.exe Token: SeDebugPrivilege 2676 WAMain.exe Token: SeDebugPrivilege 2676 WAMain.exe Token: SeDebugPrivilege 2676 WAMain.exe Token: SeDebugPrivilege 2676 WAMain.exe Token: SeDebugPrivilege 2676 WAMain.exe Token: SeDebugPrivilege 2676 WAMain.exe Token: SeDebugPrivilege 2676 WAMain.exe Token: SeDebugPrivilege 2676 WAMain.exe Token: SeDebugPrivilege 2676 WAMain.exe Token: SeDebugPrivilege 2676 WAMain.exe Token: SeDebugPrivilege 2676 WAMain.exe Token: SeDebugPrivilege 2676 WAMain.exe Token: SeDebugPrivilege 2676 WAMain.exe Token: SeDebugPrivilege 2676 WAMain.exe Token: SeDebugPrivilege 2676 WAMain.exe Token: SeDebugPrivilege 2676 WAMain.exe Token: SeDebugPrivilege 2676 WAMain.exe Token: SeDebugPrivilege 2676 WAMain.exe Token: SeDebugPrivilege 2676 WAMain.exe Token: SeDebugPrivilege 2676 WAMain.exe Token: SeDebugPrivilege 2676 WAMain.exe Token: SeDebugPrivilege 2676 WAMain.exe Token: SeDebugPrivilege 2676 WAMain.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1812 71f49042859a510a846a10fe2d5f7910N.exe 2476 71f49042859a510a846a10fe2d5f7910N.exe 4536 WAMain.exe 2164 svchost.exe 2676 WAMain.exe -
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 1812 wrote to memory of 8 1812 71f49042859a510a846a10fe2d5f7910N.exe 86 PID 1812 wrote to memory of 8 1812 71f49042859a510a846a10fe2d5f7910N.exe 86 PID 1812 wrote to memory of 8 1812 71f49042859a510a846a10fe2d5f7910N.exe 86 PID 1812 wrote to memory of 8 1812 71f49042859a510a846a10fe2d5f7910N.exe 86 PID 1812 wrote to memory of 2476 1812 71f49042859a510a846a10fe2d5f7910N.exe 87 PID 1812 wrote to memory of 2476 1812 71f49042859a510a846a10fe2d5f7910N.exe 87 PID 1812 wrote to memory of 2476 1812 71f49042859a510a846a10fe2d5f7910N.exe 87 PID 1812 wrote to memory of 2476 1812 71f49042859a510a846a10fe2d5f7910N.exe 87 PID 1812 wrote to memory of 2476 1812 71f49042859a510a846a10fe2d5f7910N.exe 87 PID 1812 wrote to memory of 2476 1812 71f49042859a510a846a10fe2d5f7910N.exe 87 PID 1812 wrote to memory of 2476 1812 71f49042859a510a846a10fe2d5f7910N.exe 87 PID 1812 wrote to memory of 2476 1812 71f49042859a510a846a10fe2d5f7910N.exe 87 PID 2476 wrote to memory of 1748 2476 71f49042859a510a846a10fe2d5f7910N.exe 91 PID 2476 wrote to memory of 1748 2476 71f49042859a510a846a10fe2d5f7910N.exe 91 PID 2476 wrote to memory of 1748 2476 71f49042859a510a846a10fe2d5f7910N.exe 91 PID 1748 wrote to memory of 2548 1748 cmd.exe 94 PID 1748 wrote to memory of 2548 1748 cmd.exe 94 PID 1748 wrote to memory of 2548 1748 cmd.exe 94 PID 2476 wrote to memory of 4536 2476 71f49042859a510a846a10fe2d5f7910N.exe 95 PID 2476 wrote to memory of 4536 2476 71f49042859a510a846a10fe2d5f7910N.exe 95 PID 2476 wrote to memory of 4536 2476 71f49042859a510a846a10fe2d5f7910N.exe 95 PID 4536 wrote to memory of 2164 4536 WAMain.exe 96 PID 4536 wrote to memory of 2164 4536 WAMain.exe 96 PID 4536 wrote to memory of 2164 4536 WAMain.exe 96 PID 4536 wrote to memory of 2164 4536 WAMain.exe 96 PID 4536 wrote to memory of 2164 4536 WAMain.exe 96 PID 4536 wrote to memory of 2164 4536 WAMain.exe 96 PID 4536 wrote to memory of 2164 4536 WAMain.exe 96 PID 4536 wrote to memory of 2164 4536 WAMain.exe 96 PID 4536 wrote to memory of 2164 4536 WAMain.exe 96 PID 4536 wrote to memory of 2676 4536 WAMain.exe 97 PID 4536 wrote to memory of 2676 4536 WAMain.exe 97 PID 4536 wrote to memory of 2676 4536 WAMain.exe 97 PID 4536 wrote to memory of 2676 4536 WAMain.exe 97 PID 4536 wrote to memory of 2676 4536 WAMain.exe 97 PID 4536 wrote to memory of 2676 4536 WAMain.exe 97 PID 4536 wrote to memory of 2676 4536 WAMain.exe 97 PID 4536 wrote to memory of 2676 4536 WAMain.exe 97 PID 4536 wrote to memory of 3236 4536 WAMain.exe 98 PID 4536 wrote to memory of 3236 4536 WAMain.exe 98 PID 4536 wrote to memory of 3236 4536 WAMain.exe 98 PID 4536 wrote to memory of 3236 4536 WAMain.exe 98 PID 4536 wrote to memory of 3236 4536 WAMain.exe 98 PID 4536 wrote to memory of 3236 4536 WAMain.exe 98 PID 4536 wrote to memory of 3236 4536 WAMain.exe 98 PID 4536 wrote to memory of 3236 4536 WAMain.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\71f49042859a510a846a10fe2d5f7910N.exe"C:\Users\Admin\AppData\Local\Temp\71f49042859a510a846a10fe2d5f7910N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"2⤵PID:8
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8 -s 843⤵
- Program crash
PID:396
-
-
-
C:\Users\Admin\AppData\Local\Temp\71f49042859a510a846a10fe2d5f7910N.exe"C:\Users\Admin\AppData\Local\Temp\71f49042859a510a846a10fe2d5f7910N.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\MLPCG.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows WA" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2548
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2164
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2676
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3236
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 8 -ip 81⤵PID:4124
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148B
MD53a4614705555abb049c3298e61170b7f
SHA1c8686410756f346d9551256a5b878b04770950ba
SHA256cff0663c8cfadf83b80583a871c313ffc5d950cb503809cb4a482f400c5d846b
SHA51265ce6fec00e6934f21635e7ccd74757f31ed4b0ddb52bd80d3ea9abeba56340128d23151ef7d9f5daacb5d61e4a4cca50dbb3a43132e350522311ee06e829007
-
Filesize
112KB
MD57b235a633828174dd9ba250dfc24d7a2
SHA1eda8ee3585be7eb1381133b72915ca24a567f2a7
SHA25662bc7dc9b7ae38f867a34a39cee50f076ddd6a90a2c041b8bcb9449583248874
SHA512b00a34ed6f6a5a48c04a052edbf4998ebc8000755d6e28e31e60a401206e4a116ed1bd2f8b77461f0681dbdf7f964be90d11d4efaffa99fdb07eecd836cfc495