Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01-10-2024 09:07
Behavioral task
behavioral1
Sample
1ca88cf821aa16865bf354c9e3ba23e239ef529dcf879c97098b031fc2f34dbbN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1ca88cf821aa16865bf354c9e3ba23e239ef529dcf879c97098b031fc2f34dbbN.exe
Resource
win10v2004-20240802-en
General
-
Target
1ca88cf821aa16865bf354c9e3ba23e239ef529dcf879c97098b031fc2f34dbbN.exe
-
Size
130KB
-
MD5
7aa9e512c692be61cfe9fe993d513190
-
SHA1
829a54d17074edf5b60f9a0220c9cfd59f551118
-
SHA256
1ca88cf821aa16865bf354c9e3ba23e239ef529dcf879c97098b031fc2f34dbb
-
SHA512
c36414ba7cf7c746432cf32bee3b013b9db001ed59b94ae76432e26e5c74d73a7a254e57314272b85124754e80a5e7fed92f524735395cc8856e6fbc5b54572a
-
SSDEEP
1536:eH1ZaQvR1KiX3NK6I+hZhYrt/w5Q6G6IpiRYzz9qJHhhnm0yG5aP/5UROXTmZ3:SKQJcinxphkG5Q6GdpIOkJHhKRyOXKR
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 6 IoCs
resource yara_rule behavioral2/memory/4288-51-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral2/memory/4288-53-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral2/memory/4288-54-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral2/memory/4288-60-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral2/memory/4288-58-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral2/memory/4288-65-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation 1ca88cf821aa16865bf354c9e3ba23e239ef529dcf879c97098b031fc2f34dbbN.exe -
Executes dropped EXE 3 IoCs
pid Process 4964 Flaseher.exe 4052 Flaseher.exe 4288 Flaseher.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\.Flasfh = "C:\\Users\\Admin\\AppData\\Roaming\\..Flash\\Flaseher.exe" reg.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3688 set thread context of 1924 3688 1ca88cf821aa16865bf354c9e3ba23e239ef529dcf879c97098b031fc2f34dbbN.exe 94 PID 4964 set thread context of 4052 4964 Flaseher.exe 103 PID 4964 set thread context of 4288 4964 Flaseher.exe 104 -
resource yara_rule behavioral2/memory/3688-0-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/3688-7-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/1924-10-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/1924-12-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3688-13-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/1924-15-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/1924-14-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/files/0x0007000000023623-31.dat upx behavioral2/memory/4964-38-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/1924-43-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4964-42-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/4964-44-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/4964-45-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/4964-57-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/1924-61-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4052-63-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Flaseher.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Flaseher.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1ca88cf821aa16865bf354c9e3ba23e239ef529dcf879c97098b031fc2f34dbbN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1ca88cf821aa16865bf354c9e3ba23e239ef529dcf879c97098b031fc2f34dbbN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Flaseher.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4052 Flaseher.exe Token: SeDebugPrivilege 4052 Flaseher.exe Token: SeDebugPrivilege 4052 Flaseher.exe Token: SeDebugPrivilege 4052 Flaseher.exe Token: SeDebugPrivilege 4052 Flaseher.exe Token: SeDebugPrivilege 4052 Flaseher.exe Token: SeDebugPrivilege 4052 Flaseher.exe Token: SeDebugPrivilege 4052 Flaseher.exe Token: SeDebugPrivilege 4052 Flaseher.exe Token: SeDebugPrivilege 4052 Flaseher.exe Token: SeDebugPrivilege 4052 Flaseher.exe Token: SeDebugPrivilege 4052 Flaseher.exe Token: SeDebugPrivilege 4052 Flaseher.exe Token: SeDebugPrivilege 4052 Flaseher.exe Token: SeDebugPrivilege 4052 Flaseher.exe Token: SeDebugPrivilege 4052 Flaseher.exe Token: SeDebugPrivilege 4052 Flaseher.exe Token: SeDebugPrivilege 4052 Flaseher.exe Token: SeDebugPrivilege 4052 Flaseher.exe Token: SeDebugPrivilege 4052 Flaseher.exe Token: SeDebugPrivilege 4052 Flaseher.exe Token: SeDebugPrivilege 4052 Flaseher.exe Token: SeDebugPrivilege 4052 Flaseher.exe Token: SeDebugPrivilege 4052 Flaseher.exe Token: SeDebugPrivilege 4052 Flaseher.exe Token: SeDebugPrivilege 4052 Flaseher.exe Token: SeDebugPrivilege 4052 Flaseher.exe Token: SeDebugPrivilege 4052 Flaseher.exe Token: SeDebugPrivilege 4052 Flaseher.exe Token: SeDebugPrivilege 4052 Flaseher.exe Token: SeDebugPrivilege 4052 Flaseher.exe Token: SeDebugPrivilege 4052 Flaseher.exe Token: SeDebugPrivilege 4052 Flaseher.exe Token: SeDebugPrivilege 4052 Flaseher.exe Token: SeDebugPrivilege 4052 Flaseher.exe Token: SeDebugPrivilege 4052 Flaseher.exe Token: SeDebugPrivilege 4052 Flaseher.exe Token: SeDebugPrivilege 4052 Flaseher.exe Token: SeDebugPrivilege 4052 Flaseher.exe Token: SeDebugPrivilege 4052 Flaseher.exe Token: SeDebugPrivilege 4052 Flaseher.exe Token: SeDebugPrivilege 4052 Flaseher.exe Token: SeDebugPrivilege 4052 Flaseher.exe Token: SeDebugPrivilege 4052 Flaseher.exe Token: SeDebugPrivilege 4052 Flaseher.exe Token: SeDebugPrivilege 4052 Flaseher.exe Token: SeDebugPrivilege 4052 Flaseher.exe Token: SeDebugPrivilege 4052 Flaseher.exe Token: SeDebugPrivilege 4052 Flaseher.exe Token: SeDebugPrivilege 4052 Flaseher.exe Token: SeDebugPrivilege 4052 Flaseher.exe Token: SeDebugPrivilege 4052 Flaseher.exe Token: SeDebugPrivilege 4052 Flaseher.exe Token: SeDebugPrivilege 4052 Flaseher.exe Token: SeDebugPrivilege 4052 Flaseher.exe Token: SeDebugPrivilege 4052 Flaseher.exe Token: SeDebugPrivilege 4052 Flaseher.exe Token: SeDebugPrivilege 4052 Flaseher.exe Token: SeDebugPrivilege 4052 Flaseher.exe Token: SeDebugPrivilege 4052 Flaseher.exe Token: SeDebugPrivilege 4052 Flaseher.exe Token: SeDebugPrivilege 4052 Flaseher.exe Token: SeDebugPrivilege 4052 Flaseher.exe Token: SeDebugPrivilege 4052 Flaseher.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3688 1ca88cf821aa16865bf354c9e3ba23e239ef529dcf879c97098b031fc2f34dbbN.exe 1924 1ca88cf821aa16865bf354c9e3ba23e239ef529dcf879c97098b031fc2f34dbbN.exe 4964 Flaseher.exe 4052 Flaseher.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 3688 wrote to memory of 1924 3688 1ca88cf821aa16865bf354c9e3ba23e239ef529dcf879c97098b031fc2f34dbbN.exe 94 PID 3688 wrote to memory of 1924 3688 1ca88cf821aa16865bf354c9e3ba23e239ef529dcf879c97098b031fc2f34dbbN.exe 94 PID 3688 wrote to memory of 1924 3688 1ca88cf821aa16865bf354c9e3ba23e239ef529dcf879c97098b031fc2f34dbbN.exe 94 PID 3688 wrote to memory of 1924 3688 1ca88cf821aa16865bf354c9e3ba23e239ef529dcf879c97098b031fc2f34dbbN.exe 94 PID 3688 wrote to memory of 1924 3688 1ca88cf821aa16865bf354c9e3ba23e239ef529dcf879c97098b031fc2f34dbbN.exe 94 PID 3688 wrote to memory of 1924 3688 1ca88cf821aa16865bf354c9e3ba23e239ef529dcf879c97098b031fc2f34dbbN.exe 94 PID 3688 wrote to memory of 1924 3688 1ca88cf821aa16865bf354c9e3ba23e239ef529dcf879c97098b031fc2f34dbbN.exe 94 PID 3688 wrote to memory of 1924 3688 1ca88cf821aa16865bf354c9e3ba23e239ef529dcf879c97098b031fc2f34dbbN.exe 94 PID 1924 wrote to memory of 2944 1924 1ca88cf821aa16865bf354c9e3ba23e239ef529dcf879c97098b031fc2f34dbbN.exe 95 PID 1924 wrote to memory of 2944 1924 1ca88cf821aa16865bf354c9e3ba23e239ef529dcf879c97098b031fc2f34dbbN.exe 95 PID 1924 wrote to memory of 2944 1924 1ca88cf821aa16865bf354c9e3ba23e239ef529dcf879c97098b031fc2f34dbbN.exe 95 PID 2944 wrote to memory of 1708 2944 cmd.exe 98 PID 2944 wrote to memory of 1708 2944 cmd.exe 98 PID 2944 wrote to memory of 1708 2944 cmd.exe 98 PID 1924 wrote to memory of 4964 1924 1ca88cf821aa16865bf354c9e3ba23e239ef529dcf879c97098b031fc2f34dbbN.exe 99 PID 1924 wrote to memory of 4964 1924 1ca88cf821aa16865bf354c9e3ba23e239ef529dcf879c97098b031fc2f34dbbN.exe 99 PID 1924 wrote to memory of 4964 1924 1ca88cf821aa16865bf354c9e3ba23e239ef529dcf879c97098b031fc2f34dbbN.exe 99 PID 4964 wrote to memory of 4052 4964 Flaseher.exe 103 PID 4964 wrote to memory of 4052 4964 Flaseher.exe 103 PID 4964 wrote to memory of 4052 4964 Flaseher.exe 103 PID 4964 wrote to memory of 4052 4964 Flaseher.exe 103 PID 4964 wrote to memory of 4052 4964 Flaseher.exe 103 PID 4964 wrote to memory of 4052 4964 Flaseher.exe 103 PID 4964 wrote to memory of 4052 4964 Flaseher.exe 103 PID 4964 wrote to memory of 4052 4964 Flaseher.exe 103 PID 4964 wrote to memory of 4288 4964 Flaseher.exe 104 PID 4964 wrote to memory of 4288 4964 Flaseher.exe 104 PID 4964 wrote to memory of 4288 4964 Flaseher.exe 104 PID 4964 wrote to memory of 4288 4964 Flaseher.exe 104 PID 4964 wrote to memory of 4288 4964 Flaseher.exe 104 PID 4964 wrote to memory of 4288 4964 Flaseher.exe 104 PID 4964 wrote to memory of 4288 4964 Flaseher.exe 104 PID 4964 wrote to memory of 4288 4964 Flaseher.exe 104 PID 4964 wrote to memory of 4288 4964 Flaseher.exe 104 PID 4964 wrote to memory of 4288 4964 Flaseher.exe 104 PID 4964 wrote to memory of 4288 4964 Flaseher.exe 104 PID 4964 wrote to memory of 4288 4964 Flaseher.exe 104 PID 4964 wrote to memory of 4288 4964 Flaseher.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ca88cf821aa16865bf354c9e3ba23e239ef529dcf879c97098b031fc2f34dbbN.exe"C:\Users\Admin\AppData\Local\Temp\1ca88cf821aa16865bf354c9e3ba23e239ef529dcf879c97098b031fc2f34dbbN.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Users\Admin\AppData\Local\Temp\1ca88cf821aa16865bf354c9e3ba23e239ef529dcf879c97098b031fc2f34dbbN.exe"C:\Users\Admin\AppData\Local\Temp\1ca88cf821aa16865bf354c9e3ba23e239ef529dcf879c97098b031fc2f34dbbN.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\OLPKS.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v ".Flasfh" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\..Flash\Flaseher.exe" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1708
-
-
-
C:\Users\Admin\AppData\Roaming\..Flash\Flaseher.exe"C:\Users\Admin\AppData\Roaming\..Flash\Flaseher.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Users\Admin\AppData\Roaming\..Flash\Flaseher.exe"C:\Users\Admin\AppData\Roaming\..Flash\Flaseher.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4052
-
-
C:\Users\Admin\AppData\Roaming\..Flash\Flaseher.exe"C:\Users\Admin\AppData\Roaming\..Flash\Flaseher.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4288
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3852,i,2727319350781907497,7925939240893079607,262144 --variations-seed-version --mojo-platform-channel-handle=4240 /prefetch:81⤵PID:3172
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
145B
MD5da0cbe87b720a79b294147ed6a4b98be
SHA1ebf0dc9efd7a12cb192e355cda87546acb4ab360
SHA2567ccfeff356fdccc9145bd1e263aa1c56360ca7b6552ed5a5665c596d02a627ed
SHA512f55c4a3d24d2f11db5eda3c816d1cd3b8804a171a7bf715b13d60788247fbb352eafaa5bd4e0a8086c1013396be0a48c7bdb904ab0f974fa0c75e81e3d365acc
-
Filesize
130KB
MD554843c0b5a9600556247041dbb5bf47c
SHA108eff4072645487e29d36959d4fccb86e38766ee
SHA256fd934f6500c4620d0c0b7e90a745a3ba1a4776bdeda790a29e123dc08b54ba54
SHA51298d3f837a5f3a8b8bb2111973ee3bc3e0e7da3e9df7cd92e064b5a47ea9f27d39712adf90dad9b87a6e8407b0223447d5e9c1b88615321ad6b952de790e3a99a