Analysis
-
max time kernel
4s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-11-2024 06:37
Static task
static1
Behavioral task
behavioral1
Sample
a083b734ccec25830f50e811b259757d4f7bca988532e4692844e5c52dd423b6.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a083b734ccec25830f50e811b259757d4f7bca988532e4692844e5c52dd423b6.exe
Resource
win10v2004-20241007-en
General
-
Target
a083b734ccec25830f50e811b259757d4f7bca988532e4692844e5c52dd423b6.exe
-
Size
112KB
-
MD5
dfbbd746d85a4a0e49b2080b0086a13a
-
SHA1
0af9f2ccda1422d64c7f7089eda5caaf4acbc8ca
-
SHA256
a083b734ccec25830f50e811b259757d4f7bca988532e4692844e5c52dd423b6
-
SHA512
7eafba786e452ca42437b0a7a1b9ef47807842b32c945eb2b1c96c24834e0c7608d44b5c9d8967282e1a7cb39ab02194f48d863c5b391369317642623db78e92
-
SSDEEP
1536:t2ovIa47CqIf2f3w41p7sDcX7juR/JSJw8EeNshUDGXJp:tVIr7zI+fAceoGxSKKo5p
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 4 IoCs
Processes:
resource yara_rule behavioral2/memory/4816-70-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 behavioral2/memory/4816-69-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 behavioral2/memory/4816-71-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 behavioral2/memory/4816-81-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
a083b734ccec25830f50e811b259757d4f7bca988532e4692844e5c52dd423b6.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation a083b734ccec25830f50e811b259757d4f7bca988532e4692844e5c52dd423b6.exe -
Executes dropped EXE 3 IoCs
Processes:
WAMain.exeWAMain.exeWAMain.exepid process 1708 WAMain.exe 3100 WAMain.exe 4816 WAMain.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows WA = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\WAMain.exe" reg.exe -
Suspicious use of SetThreadContext 5 IoCs
Processes:
a083b734ccec25830f50e811b259757d4f7bca988532e4692844e5c52dd423b6.exeWAMain.exedescription pid process target process PID 2252 set thread context of 4700 2252 a083b734ccec25830f50e811b259757d4f7bca988532e4692844e5c52dd423b6.exe svchost.exe PID 2252 set thread context of 2288 2252 a083b734ccec25830f50e811b259757d4f7bca988532e4692844e5c52dd423b6.exe a083b734ccec25830f50e811b259757d4f7bca988532e4692844e5c52dd423b6.exe PID 1708 set thread context of 2276 1708 WAMain.exe svchost.exe PID 1708 set thread context of 3100 1708 WAMain.exe WAMain.exe PID 1708 set thread context of 4816 1708 WAMain.exe WAMain.exe -
Processes:
resource yara_rule behavioral2/memory/2288-20-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/2288-22-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/2288-17-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/2288-52-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4816-70-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/4816-69-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/4816-68-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/4816-66-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/4816-71-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/2288-75-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3100-77-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4816-81-0x0000000000400000-0x0000000000414000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
a083b734ccec25830f50e811b259757d4f7bca988532e4692844e5c52dd423b6.execmd.exeWAMain.exesvchost.exeWAMain.exesvchost.exereg.exeWAMain.exea083b734ccec25830f50e811b259757d4f7bca988532e4692844e5c52dd423b6.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a083b734ccec25830f50e811b259757d4f7bca988532e4692844e5c52dd423b6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WAMain.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WAMain.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WAMain.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a083b734ccec25830f50e811b259757d4f7bca988532e4692844e5c52dd423b6.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
svchost.exepid process 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
a083b734ccec25830f50e811b259757d4f7bca988532e4692844e5c52dd423b6.exesvchost.exea083b734ccec25830f50e811b259757d4f7bca988532e4692844e5c52dd423b6.exeWAMain.exesvchost.exeWAMain.exepid process 2252 a083b734ccec25830f50e811b259757d4f7bca988532e4692844e5c52dd423b6.exe 4700 svchost.exe 2288 a083b734ccec25830f50e811b259757d4f7bca988532e4692844e5c52dd423b6.exe 1708 WAMain.exe 2276 svchost.exe 3100 WAMain.exe -
Suspicious use of WriteProcessMemory 51 IoCs
Processes:
a083b734ccec25830f50e811b259757d4f7bca988532e4692844e5c52dd423b6.exea083b734ccec25830f50e811b259757d4f7bca988532e4692844e5c52dd423b6.execmd.exeWAMain.exedescription pid process target process PID 2252 wrote to memory of 4700 2252 a083b734ccec25830f50e811b259757d4f7bca988532e4692844e5c52dd423b6.exe svchost.exe PID 2252 wrote to memory of 4700 2252 a083b734ccec25830f50e811b259757d4f7bca988532e4692844e5c52dd423b6.exe svchost.exe PID 2252 wrote to memory of 4700 2252 a083b734ccec25830f50e811b259757d4f7bca988532e4692844e5c52dd423b6.exe svchost.exe PID 2252 wrote to memory of 4700 2252 a083b734ccec25830f50e811b259757d4f7bca988532e4692844e5c52dd423b6.exe svchost.exe PID 2252 wrote to memory of 4700 2252 a083b734ccec25830f50e811b259757d4f7bca988532e4692844e5c52dd423b6.exe svchost.exe PID 2252 wrote to memory of 4700 2252 a083b734ccec25830f50e811b259757d4f7bca988532e4692844e5c52dd423b6.exe svchost.exe PID 2252 wrote to memory of 4700 2252 a083b734ccec25830f50e811b259757d4f7bca988532e4692844e5c52dd423b6.exe svchost.exe PID 2252 wrote to memory of 4700 2252 a083b734ccec25830f50e811b259757d4f7bca988532e4692844e5c52dd423b6.exe svchost.exe PID 2252 wrote to memory of 4700 2252 a083b734ccec25830f50e811b259757d4f7bca988532e4692844e5c52dd423b6.exe svchost.exe PID 2252 wrote to memory of 2288 2252 a083b734ccec25830f50e811b259757d4f7bca988532e4692844e5c52dd423b6.exe a083b734ccec25830f50e811b259757d4f7bca988532e4692844e5c52dd423b6.exe PID 2252 wrote to memory of 2288 2252 a083b734ccec25830f50e811b259757d4f7bca988532e4692844e5c52dd423b6.exe a083b734ccec25830f50e811b259757d4f7bca988532e4692844e5c52dd423b6.exe PID 2252 wrote to memory of 2288 2252 a083b734ccec25830f50e811b259757d4f7bca988532e4692844e5c52dd423b6.exe a083b734ccec25830f50e811b259757d4f7bca988532e4692844e5c52dd423b6.exe PID 2252 wrote to memory of 2288 2252 a083b734ccec25830f50e811b259757d4f7bca988532e4692844e5c52dd423b6.exe a083b734ccec25830f50e811b259757d4f7bca988532e4692844e5c52dd423b6.exe PID 2252 wrote to memory of 2288 2252 a083b734ccec25830f50e811b259757d4f7bca988532e4692844e5c52dd423b6.exe a083b734ccec25830f50e811b259757d4f7bca988532e4692844e5c52dd423b6.exe PID 2252 wrote to memory of 2288 2252 a083b734ccec25830f50e811b259757d4f7bca988532e4692844e5c52dd423b6.exe a083b734ccec25830f50e811b259757d4f7bca988532e4692844e5c52dd423b6.exe PID 2252 wrote to memory of 2288 2252 a083b734ccec25830f50e811b259757d4f7bca988532e4692844e5c52dd423b6.exe a083b734ccec25830f50e811b259757d4f7bca988532e4692844e5c52dd423b6.exe PID 2252 wrote to memory of 2288 2252 a083b734ccec25830f50e811b259757d4f7bca988532e4692844e5c52dd423b6.exe a083b734ccec25830f50e811b259757d4f7bca988532e4692844e5c52dd423b6.exe PID 2288 wrote to memory of 748 2288 a083b734ccec25830f50e811b259757d4f7bca988532e4692844e5c52dd423b6.exe cmd.exe PID 2288 wrote to memory of 748 2288 a083b734ccec25830f50e811b259757d4f7bca988532e4692844e5c52dd423b6.exe cmd.exe PID 2288 wrote to memory of 748 2288 a083b734ccec25830f50e811b259757d4f7bca988532e4692844e5c52dd423b6.exe cmd.exe PID 748 wrote to memory of 3324 748 cmd.exe reg.exe PID 748 wrote to memory of 3324 748 cmd.exe reg.exe PID 748 wrote to memory of 3324 748 cmd.exe reg.exe PID 2288 wrote to memory of 1708 2288 a083b734ccec25830f50e811b259757d4f7bca988532e4692844e5c52dd423b6.exe WAMain.exe PID 2288 wrote to memory of 1708 2288 a083b734ccec25830f50e811b259757d4f7bca988532e4692844e5c52dd423b6.exe WAMain.exe PID 2288 wrote to memory of 1708 2288 a083b734ccec25830f50e811b259757d4f7bca988532e4692844e5c52dd423b6.exe WAMain.exe PID 1708 wrote to memory of 2276 1708 WAMain.exe svchost.exe PID 1708 wrote to memory of 2276 1708 WAMain.exe svchost.exe PID 1708 wrote to memory of 2276 1708 WAMain.exe svchost.exe PID 1708 wrote to memory of 2276 1708 WAMain.exe svchost.exe PID 1708 wrote to memory of 2276 1708 WAMain.exe svchost.exe PID 1708 wrote to memory of 2276 1708 WAMain.exe svchost.exe PID 1708 wrote to memory of 2276 1708 WAMain.exe svchost.exe PID 1708 wrote to memory of 2276 1708 WAMain.exe svchost.exe PID 1708 wrote to memory of 2276 1708 WAMain.exe svchost.exe PID 1708 wrote to memory of 3100 1708 WAMain.exe WAMain.exe PID 1708 wrote to memory of 3100 1708 WAMain.exe WAMain.exe PID 1708 wrote to memory of 3100 1708 WAMain.exe WAMain.exe PID 1708 wrote to memory of 3100 1708 WAMain.exe WAMain.exe PID 1708 wrote to memory of 3100 1708 WAMain.exe WAMain.exe PID 1708 wrote to memory of 3100 1708 WAMain.exe WAMain.exe PID 1708 wrote to memory of 3100 1708 WAMain.exe WAMain.exe PID 1708 wrote to memory of 3100 1708 WAMain.exe WAMain.exe PID 1708 wrote to memory of 4816 1708 WAMain.exe WAMain.exe PID 1708 wrote to memory of 4816 1708 WAMain.exe WAMain.exe PID 1708 wrote to memory of 4816 1708 WAMain.exe WAMain.exe PID 1708 wrote to memory of 4816 1708 WAMain.exe WAMain.exe PID 1708 wrote to memory of 4816 1708 WAMain.exe WAMain.exe PID 1708 wrote to memory of 4816 1708 WAMain.exe WAMain.exe PID 1708 wrote to memory of 4816 1708 WAMain.exe WAMain.exe PID 1708 wrote to memory of 4816 1708 WAMain.exe WAMain.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a083b734ccec25830f50e811b259757d4f7bca988532e4692844e5c52dd423b6.exe"C:\Users\Admin\AppData\Local\Temp\a083b734ccec25830f50e811b259757d4f7bca988532e4692844e5c52dd423b6.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4700
-
-
C:\Users\Admin\AppData\Local\Temp\a083b734ccec25830f50e811b259757d4f7bca988532e4692844e5c52dd423b6.exe"C:\Users\Admin\AppData\Local\Temp\a083b734ccec25830f50e811b259757d4f7bca988532e4692844e5c52dd423b6.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\WMNKT.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows WA" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3324
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2276
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3100
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4816
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148B
MD53a4614705555abb049c3298e61170b7f
SHA1c8686410756f346d9551256a5b878b04770950ba
SHA256cff0663c8cfadf83b80583a871c313ffc5d950cb503809cb4a482f400c5d846b
SHA51265ce6fec00e6934f21635e7ccd74757f31ed4b0ddb52bd80d3ea9abeba56340128d23151ef7d9f5daacb5d61e4a4cca50dbb3a43132e350522311ee06e829007
-
Filesize
112KB
MD592d8711a780590e75017aa97d8b0f78b
SHA1134335fcea10c48f7b10c5a941184477da6a862c
SHA256ff2fda27dcb39edd7c5cfdb63f31da2f701d35866af53a8cb4864ee82cd1b712
SHA512630f1ff1c2be7d9b67f3202d8a900babc8da05941be39ebca8d68bf0c951ca026f7175a3c60a84b2c050c602befef2d771f0d5bbaa913ab74eb338071a2b8148