Analysis
-
max time kernel
133s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-11-2024 02:59
Behavioral task
behavioral1
Sample
DM脚本.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
DM脚本.exe
Resource
win10v2004-20241007-en
General
-
Target
DM脚本.exe
-
Size
686KB
-
MD5
fc5d63ed44a6f5d5c150427e2baf1ceb
-
SHA1
75a24a64a56a25bb86cd11efdd07e1e55e5a42f2
-
SHA256
7fde9a39ce09de7dca1acab9c3166722dd15ff6760fee4c35bc6f130799d6381
-
SHA512
3b91bfab663c2ba585d167e071a115612acf6265bc9ff41ce26f264fd1005c3995abae2c28a5c98a9dfd5e774f50076438b601d43627ddaadfbd832ef725fe79
-
SSDEEP
12288:U09I+tyyYFM1K/NKqWb99alnunF/MNHb7Tq/:1VyVFM1ClWmUnF/yb7Tq/
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3932-2-0x0000000000400000-0x00000000004C0000-memory.dmp modiloader_stage2 -
Drops file in Program Files directory 1 IoCs
Processes:
DM脚本.exedescription ioc Process File created C:\PROGRA~1\COMMON~1\MICROS~1\MSInfo\2010.txt DM脚本.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
DM脚本.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DM脚本.exe