Analysis
-
max time kernel
141s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-11-2024 01:57
Static task
static1
Behavioral task
behavioral1
Sample
9612061996833737a29c719d52e4ef0997c3eaca5eec756c2e1c5e34a1b25970.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
9612061996833737a29c719d52e4ef0997c3eaca5eec756c2e1c5e34a1b25970.exe
Resource
win10v2004-20241007-en
General
-
Target
9612061996833737a29c719d52e4ef0997c3eaca5eec756c2e1c5e34a1b25970.exe
-
Size
1.2MB
-
MD5
866528728a73956daf4bf03094ed5074
-
SHA1
ec0bb7c75e71b46051f4833b219773b8ac57acc8
-
SHA256
9612061996833737a29c719d52e4ef0997c3eaca5eec756c2e1c5e34a1b25970
-
SHA512
923eea7ac402592de54b8923ae2ffa3f72668b0df89332f1eb2f382923dae4413ad014efbc35a0c801b38d15b8e9deacb9225ebcb9fa281837f963d0dd235bb9
-
SSDEEP
24576:mmRl2QwXqo4/93vtwsypzxl6jOuV02r37gX/LQxzbtHdnS:mrQwQQsypzxl6SuWMgPLQ5S
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 61 IoCs
Processes:
resource yara_rule behavioral2/memory/1708-2-0x0000000002E50000-0x0000000003E50000-memory.dmp modiloader_stage2 behavioral2/memory/1708-8-0x0000000002E50000-0x0000000003E50000-memory.dmp modiloader_stage2 behavioral2/memory/1708-13-0x0000000002E50000-0x0000000003E50000-memory.dmp modiloader_stage2 behavioral2/memory/1708-22-0x0000000002E50000-0x0000000003E50000-memory.dmp modiloader_stage2 behavioral2/memory/1708-54-0x0000000002E50000-0x0000000003E50000-memory.dmp modiloader_stage2 behavioral2/memory/1708-68-0x0000000002E50000-0x0000000003E50000-memory.dmp modiloader_stage2 behavioral2/memory/1708-67-0x0000000002E50000-0x0000000003E50000-memory.dmp modiloader_stage2 behavioral2/memory/1708-66-0x0000000002E50000-0x0000000003E50000-memory.dmp modiloader_stage2 behavioral2/memory/1708-65-0x0000000002E50000-0x0000000003E50000-memory.dmp modiloader_stage2 behavioral2/memory/1708-64-0x0000000002E50000-0x0000000003E50000-memory.dmp modiloader_stage2 behavioral2/memory/1708-63-0x0000000002E50000-0x0000000003E50000-memory.dmp modiloader_stage2 behavioral2/memory/1708-62-0x0000000002E50000-0x0000000003E50000-memory.dmp modiloader_stage2 behavioral2/memory/1708-61-0x0000000002E50000-0x0000000003E50000-memory.dmp modiloader_stage2 behavioral2/memory/1708-60-0x0000000002E50000-0x0000000003E50000-memory.dmp modiloader_stage2 behavioral2/memory/1708-59-0x0000000002E50000-0x0000000003E50000-memory.dmp modiloader_stage2 behavioral2/memory/1708-58-0x0000000002E50000-0x0000000003E50000-memory.dmp modiloader_stage2 behavioral2/memory/1708-36-0x0000000002E50000-0x0000000003E50000-memory.dmp modiloader_stage2 behavioral2/memory/1708-57-0x0000000002E50000-0x0000000003E50000-memory.dmp modiloader_stage2 behavioral2/memory/1708-55-0x0000000002E50000-0x0000000003E50000-memory.dmp modiloader_stage2 behavioral2/memory/1708-52-0x0000000002E50000-0x0000000003E50000-memory.dmp modiloader_stage2 behavioral2/memory/1708-51-0x0000000002E50000-0x0000000003E50000-memory.dmp modiloader_stage2 behavioral2/memory/1708-31-0x0000000002E50000-0x0000000003E50000-memory.dmp modiloader_stage2 behavioral2/memory/1708-44-0x0000000002E50000-0x0000000003E50000-memory.dmp modiloader_stage2 behavioral2/memory/1708-43-0x0000000002E50000-0x0000000003E50000-memory.dmp modiloader_stage2 behavioral2/memory/1708-26-0x0000000002E50000-0x0000000003E50000-memory.dmp modiloader_stage2 behavioral2/memory/1708-41-0x0000000002E50000-0x0000000003E50000-memory.dmp modiloader_stage2 behavioral2/memory/1708-40-0x0000000002E50000-0x0000000003E50000-memory.dmp modiloader_stage2 behavioral2/memory/1708-39-0x0000000002E50000-0x0000000003E50000-memory.dmp modiloader_stage2 behavioral2/memory/1708-38-0x0000000002E50000-0x0000000003E50000-memory.dmp modiloader_stage2 behavioral2/memory/1708-23-0x0000000002E50000-0x0000000003E50000-memory.dmp modiloader_stage2 behavioral2/memory/1708-56-0x0000000002E50000-0x0000000003E50000-memory.dmp modiloader_stage2 behavioral2/memory/1708-35-0x0000000002E50000-0x0000000003E50000-memory.dmp modiloader_stage2 behavioral2/memory/1708-53-0x0000000002E50000-0x0000000003E50000-memory.dmp modiloader_stage2 behavioral2/memory/1708-34-0x0000000002E50000-0x0000000003E50000-memory.dmp modiloader_stage2 behavioral2/memory/1708-33-0x0000000002E50000-0x0000000003E50000-memory.dmp modiloader_stage2 behavioral2/memory/1708-50-0x0000000002E50000-0x0000000003E50000-memory.dmp modiloader_stage2 behavioral2/memory/1708-32-0x0000000002E50000-0x0000000003E50000-memory.dmp modiloader_stage2 behavioral2/memory/1708-47-0x0000000002E50000-0x0000000003E50000-memory.dmp modiloader_stage2 behavioral2/memory/1708-46-0x0000000002E50000-0x0000000003E50000-memory.dmp modiloader_stage2 behavioral2/memory/1708-45-0x0000000002E50000-0x0000000003E50000-memory.dmp modiloader_stage2 behavioral2/memory/1708-27-0x0000000002E50000-0x0000000003E50000-memory.dmp modiloader_stage2 behavioral2/memory/1708-42-0x0000000002E50000-0x0000000003E50000-memory.dmp modiloader_stage2 behavioral2/memory/1708-16-0x0000000002E50000-0x0000000003E50000-memory.dmp modiloader_stage2 behavioral2/memory/1708-25-0x0000000002E50000-0x0000000003E50000-memory.dmp modiloader_stage2 behavioral2/memory/1708-24-0x0000000002E50000-0x0000000003E50000-memory.dmp modiloader_stage2 behavioral2/memory/1708-37-0x0000000002E50000-0x0000000003E50000-memory.dmp modiloader_stage2 behavioral2/memory/1708-15-0x0000000002E50000-0x0000000003E50000-memory.dmp modiloader_stage2 behavioral2/memory/1708-21-0x0000000002E50000-0x0000000003E50000-memory.dmp modiloader_stage2 behavioral2/memory/1708-11-0x0000000002E50000-0x0000000003E50000-memory.dmp modiloader_stage2 behavioral2/memory/1708-20-0x0000000002E50000-0x0000000003E50000-memory.dmp modiloader_stage2 behavioral2/memory/1708-19-0x0000000002E50000-0x0000000003E50000-memory.dmp modiloader_stage2 behavioral2/memory/1708-30-0x0000000002E50000-0x0000000003E50000-memory.dmp modiloader_stage2 behavioral2/memory/1708-29-0x0000000002E50000-0x0000000003E50000-memory.dmp modiloader_stage2 behavioral2/memory/1708-18-0x0000000002E50000-0x0000000003E50000-memory.dmp modiloader_stage2 behavioral2/memory/1708-28-0x0000000002E50000-0x0000000003E50000-memory.dmp modiloader_stage2 behavioral2/memory/1708-10-0x0000000002E50000-0x0000000003E50000-memory.dmp modiloader_stage2 behavioral2/memory/1708-17-0x0000000002E50000-0x0000000003E50000-memory.dmp modiloader_stage2 behavioral2/memory/1708-5-0x0000000002E50000-0x0000000003E50000-memory.dmp modiloader_stage2 behavioral2/memory/1708-9-0x0000000002E50000-0x0000000003E50000-memory.dmp modiloader_stage2 behavioral2/memory/1708-7-0x0000000002E50000-0x0000000003E50000-memory.dmp modiloader_stage2 behavioral2/memory/1708-6-0x0000000002E50000-0x0000000003E50000-memory.dmp modiloader_stage2 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
9612061996833737a29c719d52e4ef0997c3eaca5eec756c2e1c5e34a1b25970.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9612061996833737a29c719d52e4ef0997c3eaca5eec756c2e1c5e34a1b25970.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 18 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)