Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 08:20
Static task
static1
Behavioral task
behavioral1
Sample
0cf9c23889403841c57502186fa298eed863d4cb55d089256b699c8913de3581N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0cf9c23889403841c57502186fa298eed863d4cb55d089256b699c8913de3581N.exe
Resource
win10v2004-20240802-en
General
-
Target
0cf9c23889403841c57502186fa298eed863d4cb55d089256b699c8913de3581N.exe
-
Size
666KB
-
MD5
e4adecdfb24eba846689b4affcca8b30
-
SHA1
4151ca803516cd9560b0d26fdab8e0312d669e4e
-
SHA256
0cf9c23889403841c57502186fa298eed863d4cb55d089256b699c8913de3581
-
SHA512
0676eda6a371877d354e583f911c2ed9fbfc981f2aa62d5ae042bd1d82c796ca0232f4168877985be18c6bdc35416dc71dad5ee570e1e37bfd3dc3d2d135aecd
-
SSDEEP
12288:Uf1Ks4SjTyICxkawPKCkJ+4rP9tVo4DbF3Z4mxxeoEtlK+kt9T2MVuSE:U9KsH5sXwPp2+UPx5QmXXGhF
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral1/memory/2800-80-0x0000000000400000-0x00000000004BC000-memory.dmp modiloader_stage2 behavioral1/memory/1860-88-0x0000000000400000-0x00000000004BC000-memory.dmp modiloader_stage2 -
Executes dropped EXE 2 IoCs
pid Process 1860 1.exe 2800 win26.exe -
Loads dropped DLL 4 IoCs
pid Process 576 0cf9c23889403841c57502186fa298eed863d4cb55d089256b699c8913de3581N.exe 576 0cf9c23889403841c57502186fa298eed863d4cb55d089256b699c8913de3581N.exe 1860 1.exe 1860 1.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\win26.exe 1.exe File opened for modification C:\Windows\SysWOW64\win26.exe win26.exe File created C:\Windows\SysWOW64\SetupDel.bat 1.exe File created C:\Windows\SysWOW64\win26.exe 1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language win26.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0cf9c23889403841c57502186fa298eed863d4cb55d089256b699c8913de3581N.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 576 wrote to memory of 1860 576 0cf9c23889403841c57502186fa298eed863d4cb55d089256b699c8913de3581N.exe 31 PID 576 wrote to memory of 1860 576 0cf9c23889403841c57502186fa298eed863d4cb55d089256b699c8913de3581N.exe 31 PID 576 wrote to memory of 1860 576 0cf9c23889403841c57502186fa298eed863d4cb55d089256b699c8913de3581N.exe 31 PID 576 wrote to memory of 1860 576 0cf9c23889403841c57502186fa298eed863d4cb55d089256b699c8913de3581N.exe 31 PID 1860 wrote to memory of 2800 1860 1.exe 32 PID 1860 wrote to memory of 2800 1860 1.exe 32 PID 1860 wrote to memory of 2800 1860 1.exe 32 PID 1860 wrote to memory of 2800 1860 1.exe 32 PID 1860 wrote to memory of 2556 1860 1.exe 33 PID 1860 wrote to memory of 2556 1860 1.exe 33 PID 1860 wrote to memory of 2556 1860 1.exe 33 PID 1860 wrote to memory of 2556 1860 1.exe 33 PID 1860 wrote to memory of 2556 1860 1.exe 33 PID 1860 wrote to memory of 2556 1860 1.exe 33 PID 1860 wrote to memory of 2556 1860 1.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\0cf9c23889403841c57502186fa298eed863d4cb55d089256b699c8913de3581N.exe"C:\Users\Admin\AppData\Local\Temp\0cf9c23889403841c57502186fa298eed863d4cb55d089256b699c8913de3581N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Windows\SysWOW64\win26.exeC:\Windows\system32\win26.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2800
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\SetupDel.bat3⤵
- System Location Discovery: System Language Discovery
PID:2556
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
122B
MD5d15f7378cdf005521f5e4089d5aaa8f2
SHA126f89a668c5b5942fdb53edfeb4c6654d1a64197
SHA256c40b64dbde2d7a5ca1d04cd91b3974efb87ea126f1d9085c207b114fd1b74338
SHA51249f280c5246cc3919129ef661f7e06830f37fcc6f324c1f8faa7156489001e33acbc0aa87df9a65eaa5751538feea708373b818c501c7afe2cad189834305137
-
Filesize
352KB
MD50fd10ec30b16d6bd64d7d73d9af8ff1e
SHA1b24257dc6be322da960934ec1fde9be1aa44a527
SHA2569376122b43ab5fc856b934a17d3b92f84423f8cc0c722940b9aa3fd2e50dbbcc
SHA512ad9e6361515110d1f9763d9ccc1aabc8b9016b82ab00e4d285c5589fadeb51e260fed58afce70165e6205eed627d2beae5fb33d9c5980a2b8766f94c3df119e0