Analysis

  • max time kernel
    100s
  • max time network
    119s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-09-2024 06:12

General

  • Target

    59bfae2e8aec4a4b8f7afc3f597d8fc23b7240e86968c1b85cb77c092a6d6060N.exe

  • Size

    112KB

  • MD5

    6a31c8c1ee8ed4d57c1b8f9ed6a800a0

  • SHA1

    e533439cd2def070405375ee79ed5b3f9d307dd5

  • SHA256

    59bfae2e8aec4a4b8f7afc3f597d8fc23b7240e86968c1b85cb77c092a6d6060

  • SHA512

    a0c15d0cfd68d817a07cfd7876af6b4e629702a3d5e2ad2aa6296bf17cfbb606fb545e1072621299e077af95a76fe3098815cde1e7e572156b62a44300c190ea

  • SSDEEP

    1536:t2ovIa47CqIf2f3w41p7sDcX7juR/JSJw8EeNshUDGXJ:tVIr7zI+fAceoGxSKKo5

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 4 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • UPX packed file 12 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 63 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\59bfae2e8aec4a4b8f7afc3f597d8fc23b7240e86968c1b85cb77c092a6d6060N.exe
    "C:\Users\Admin\AppData\Local\Temp\59bfae2e8aec4a4b8f7afc3f597d8fc23b7240e86968c1b85cb77c092a6d6060N.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1808
    • C:\Windows\SysWOW64\svchost.exe
      "C:\Windows\system32\svchost.exe"
      2⤵
        PID:3584
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3584 -s 92
          3⤵
          • Program crash
          PID:3908
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3584 -s 112
          3⤵
          • Program crash
          PID:4700
      • C:\Users\Admin\AppData\Local\Temp\59bfae2e8aec4a4b8f7afc3f597d8fc23b7240e86968c1b85cb77c092a6d6060N.exe
        "C:\Users\Admin\AppData\Local\Temp\59bfae2e8aec4a4b8f7afc3f597d8fc23b7240e86968c1b85cb77c092a6d6060N.exe"
        2⤵
        • Checks computer location settings
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1464
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\YUIUG.bat" "
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4800
          • C:\Windows\SysWOW64\reg.exe
            REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows WA" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe" /f
            4⤵
            • Adds Run key to start application
            • System Location Discovery: System Language Discovery
            PID:1112
        • C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3808
          • C:\Windows\SysWOW64\svchost.exe
            "C:\Windows\system32\svchost.exe"
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of SetWindowsHookEx
            PID:2116
          • C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:3676
          • C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:720
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3584 -ip 3584
      1⤵
        PID:3140
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3584 -ip 3584
        1⤵
          PID:1608
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4316,i,10065386245627775856,6567048529106473151,262144 --variations-seed-version --mojo-platform-channel-handle=4276 /prefetch:8
          1⤵
            PID:5000

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\YUIUG.txt

            Filesize

            148B

            MD5

            3a4614705555abb049c3298e61170b7f

            SHA1

            c8686410756f346d9551256a5b878b04770950ba

            SHA256

            cff0663c8cfadf83b80583a871c313ffc5d950cb503809cb4a482f400c5d846b

            SHA512

            65ce6fec00e6934f21635e7ccd74757f31ed4b0ddb52bd80d3ea9abeba56340128d23151ef7d9f5daacb5d61e4a4cca50dbb3a43132e350522311ee06e829007

          • C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe

            Filesize

            112KB

            MD5

            a916f554e3029b005923657100cbd012

            SHA1

            ed914d79fab432681323ce9c8de8eb3e67555c41

            SHA256

            66e9306b8bf7fa5f97f2e036325798e6f1761320e0be5e0734f263eaa625e789

            SHA512

            d86624ea40f42a3681567cd0a09af537267fd69ad9dc9954e0e74de40295b291e93d8079ecdb976b84ae850b85daa7846484cc37eba3e686bdd57cd9476af9e5

          • memory/720-70-0x0000000000400000-0x0000000000414000-memory.dmp

            Filesize

            80KB

          • memory/720-59-0x0000000000400000-0x0000000000414000-memory.dmp

            Filesize

            80KB

          • memory/720-60-0x0000000000400000-0x0000000000414000-memory.dmp

            Filesize

            80KB

          • memory/720-64-0x0000000000400000-0x0000000000414000-memory.dmp

            Filesize

            80KB

          • memory/720-61-0x0000000000400000-0x0000000000414000-memory.dmp

            Filesize

            80KB

          • memory/720-53-0x0000000000400000-0x0000000000414000-memory.dmp

            Filesize

            80KB

          • memory/1464-41-0x0000000000400000-0x000000000040B000-memory.dmp

            Filesize

            44KB

          • memory/1464-10-0x0000000000400000-0x000000000040B000-memory.dmp

            Filesize

            44KB

          • memory/1464-67-0x0000000000400000-0x000000000040B000-memory.dmp

            Filesize

            44KB

          • memory/1464-12-0x0000000000400000-0x000000000040B000-memory.dmp

            Filesize

            44KB

          • memory/1464-7-0x0000000000400000-0x000000000040B000-memory.dmp

            Filesize

            44KB

          • memory/1808-4-0x0000000002B50000-0x0000000002B52000-memory.dmp

            Filesize

            8KB

          • memory/1808-6-0x0000000002D20000-0x0000000002D22000-memory.dmp

            Filesize

            8KB

          • memory/1808-2-0x0000000002B10000-0x0000000002B12000-memory.dmp

            Filesize

            8KB

          • memory/1808-9-0x0000000002B10000-0x0000000002B12000-memory.dmp

            Filesize

            8KB

          • memory/1808-3-0x0000000002B20000-0x0000000002B22000-memory.dmp

            Filesize

            8KB

          • memory/1808-5-0x0000000002BA0000-0x0000000002BA2000-memory.dmp

            Filesize

            8KB

          • memory/2116-46-0x0000000000400000-0x000000000040C000-memory.dmp

            Filesize

            48KB

          • memory/2116-52-0x0000000000400000-0x000000000040C000-memory.dmp

            Filesize

            48KB

          • memory/2116-43-0x0000000000400000-0x000000000040C000-memory.dmp

            Filesize

            48KB

          • memory/2116-69-0x0000000000400000-0x000000000040C000-memory.dmp

            Filesize

            48KB

          • memory/3676-68-0x0000000000400000-0x000000000040B000-memory.dmp

            Filesize

            44KB

          • memory/3808-58-0x0000000000400000-0x000000000041F000-memory.dmp

            Filesize

            124KB

          • memory/3808-39-0x0000000000400000-0x000000000041F000-memory.dmp

            Filesize

            124KB

          • memory/3808-40-0x0000000000400000-0x000000000041F000-memory.dmp

            Filesize

            124KB

          • memory/3808-38-0x0000000000400000-0x000000000041F000-memory.dmp

            Filesize

            124KB

          • memory/3808-42-0x0000000000400000-0x000000000041F000-memory.dmp

            Filesize

            124KB