Analysis
-
max time kernel
240s -
max time network
248s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22/11/2024, 02:08
Static task
static1
Behavioral task
behavioral1
Sample
22112024_0208_Documentazione_Doganale_richieste_di_copia.bat
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
22112024_0208_Documentazione_Doganale_richieste_di_copia.bat
Resource
win10v2004-20241007-en
General
-
Target
22112024_0208_Documentazione_Doganale_richieste_di_copia.bat
-
Size
3.4MB
-
MD5
e83eaefa47746764ed0708da11cf890f
-
SHA1
5986d2e1da1d6fa42825ae627ee688cac4530fd7
-
SHA256
13e2c237c2fa5b146ada50ad1be0be71832e42b745f2bc82daa52558807a7aa6
-
SHA512
d69fe44a64af8693c5d15dcc0d3773e3b30da540f90be0ba3addd1bbcf99c26632572f1a4eccf1838ac60da4e0d27b5700a4ebeeac8448f3c822e67399a9d251
-
SSDEEP
49152:f6DzaZKYLJqhTLqP8gTM0BiuWSIRbWRIi9b:v
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 61 IoCs
resource yara_rule behavioral1/memory/2184-31-0x0000000002F70000-0x0000000003F70000-memory.dmp modiloader_stage2 behavioral1/memory/2184-35-0x0000000002F70000-0x0000000003F70000-memory.dmp modiloader_stage2 behavioral1/memory/2184-43-0x0000000002F70000-0x0000000003F70000-memory.dmp modiloader_stage2 behavioral1/memory/2184-44-0x0000000002F70000-0x0000000003F70000-memory.dmp modiloader_stage2 behavioral1/memory/2184-69-0x0000000002F70000-0x0000000003F70000-memory.dmp modiloader_stage2 behavioral1/memory/2184-71-0x0000000002F70000-0x0000000003F70000-memory.dmp modiloader_stage2 behavioral1/memory/2184-66-0x0000000002F70000-0x0000000003F70000-memory.dmp modiloader_stage2 behavioral1/memory/2184-65-0x0000000002F70000-0x0000000003F70000-memory.dmp modiloader_stage2 behavioral1/memory/2184-64-0x0000000002F70000-0x0000000003F70000-memory.dmp modiloader_stage2 behavioral1/memory/2184-62-0x0000000002F70000-0x0000000003F70000-memory.dmp modiloader_stage2 behavioral1/memory/2184-61-0x0000000002F70000-0x0000000003F70000-memory.dmp modiloader_stage2 behavioral1/memory/2184-60-0x0000000002F70000-0x0000000003F70000-memory.dmp modiloader_stage2 behavioral1/memory/2184-58-0x0000000002F70000-0x0000000003F70000-memory.dmp modiloader_stage2 behavioral1/memory/2184-57-0x0000000002F70000-0x0000000003F70000-memory.dmp modiloader_stage2 behavioral1/memory/2184-54-0x0000000002F70000-0x0000000003F70000-memory.dmp modiloader_stage2 behavioral1/memory/2184-114-0x0000000002F70000-0x0000000003F70000-memory.dmp modiloader_stage2 behavioral1/memory/2184-113-0x0000000002F70000-0x0000000003F70000-memory.dmp modiloader_stage2 behavioral1/memory/2184-51-0x0000000002F70000-0x0000000003F70000-memory.dmp modiloader_stage2 behavioral1/memory/2184-110-0x0000000002F70000-0x0000000003F70000-memory.dmp modiloader_stage2 behavioral1/memory/2184-108-0x0000000002F70000-0x0000000003F70000-memory.dmp modiloader_stage2 behavioral1/memory/2184-105-0x0000000002F70000-0x0000000003F70000-memory.dmp modiloader_stage2 behavioral1/memory/2184-50-0x0000000002F70000-0x0000000003F70000-memory.dmp modiloader_stage2 behavioral1/memory/2184-101-0x0000000002F70000-0x0000000003F70000-memory.dmp modiloader_stage2 behavioral1/memory/2184-100-0x0000000002F70000-0x0000000003F70000-memory.dmp modiloader_stage2 behavioral1/memory/2184-98-0x0000000002F70000-0x0000000003F70000-memory.dmp modiloader_stage2 behavioral1/memory/2184-96-0x0000000002F70000-0x0000000003F70000-memory.dmp modiloader_stage2 behavioral1/memory/2184-94-0x0000000002F70000-0x0000000003F70000-memory.dmp modiloader_stage2 behavioral1/memory/2184-48-0x0000000002F70000-0x0000000003F70000-memory.dmp modiloader_stage2 behavioral1/memory/2184-92-0x0000000002F70000-0x0000000003F70000-memory.dmp modiloader_stage2 behavioral1/memory/2184-90-0x0000000002F70000-0x0000000003F70000-memory.dmp modiloader_stage2 behavioral1/memory/2184-88-0x0000000002F70000-0x0000000003F70000-memory.dmp modiloader_stage2 behavioral1/memory/2184-86-0x0000000002F70000-0x0000000003F70000-memory.dmp modiloader_stage2 behavioral1/memory/2184-84-0x0000000002F70000-0x0000000003F70000-memory.dmp modiloader_stage2 behavioral1/memory/2184-38-0x0000000002F70000-0x0000000003F70000-memory.dmp modiloader_stage2 behavioral1/memory/2184-81-0x0000000002F70000-0x0000000003F70000-memory.dmp modiloader_stage2 behavioral1/memory/2184-46-0x0000000002F70000-0x0000000003F70000-memory.dmp modiloader_stage2 behavioral1/memory/2184-78-0x0000000002F70000-0x0000000003F70000-memory.dmp modiloader_stage2 behavioral1/memory/2184-76-0x0000000002F70000-0x0000000003F70000-memory.dmp modiloader_stage2 behavioral1/memory/2184-45-0x0000000002F70000-0x0000000003F70000-memory.dmp modiloader_stage2 behavioral1/memory/2184-41-0x0000000002F70000-0x0000000003F70000-memory.dmp modiloader_stage2 behavioral1/memory/2184-40-0x0000000002F70000-0x0000000003F70000-memory.dmp modiloader_stage2 behavioral1/memory/2184-39-0x0000000002F70000-0x0000000003F70000-memory.dmp modiloader_stage2 behavioral1/memory/2184-70-0x0000000002F70000-0x0000000003F70000-memory.dmp modiloader_stage2 behavioral1/memory/2184-42-0x0000000002F70000-0x0000000003F70000-memory.dmp modiloader_stage2 behavioral1/memory/2184-59-0x0000000002F70000-0x0000000003F70000-memory.dmp modiloader_stage2 behavioral1/memory/2184-56-0x0000000002F70000-0x0000000003F70000-memory.dmp modiloader_stage2 behavioral1/memory/2184-52-0x0000000002F70000-0x0000000003F70000-memory.dmp modiloader_stage2 behavioral1/memory/2184-111-0x0000000002F70000-0x0000000003F70000-memory.dmp modiloader_stage2 behavioral1/memory/2184-107-0x0000000002F70000-0x0000000003F70000-memory.dmp modiloader_stage2 behavioral1/memory/2184-102-0x0000000002F70000-0x0000000003F70000-memory.dmp modiloader_stage2 behavioral1/memory/2184-49-0x0000000002F70000-0x0000000003F70000-memory.dmp modiloader_stage2 behavioral1/memory/2184-95-0x0000000002F70000-0x0000000003F70000-memory.dmp modiloader_stage2 behavioral1/memory/2184-47-0x0000000002F70000-0x0000000003F70000-memory.dmp modiloader_stage2 behavioral1/memory/2184-83-0x0000000002F70000-0x0000000003F70000-memory.dmp modiloader_stage2 behavioral1/memory/2184-79-0x0000000002F70000-0x0000000003F70000-memory.dmp modiloader_stage2 behavioral1/memory/2184-74-0x0000000002F70000-0x0000000003F70000-memory.dmp modiloader_stage2 behavioral1/memory/2184-67-0x0000000002F70000-0x0000000003F70000-memory.dmp modiloader_stage2 behavioral1/memory/2184-63-0x0000000002F70000-0x0000000003F70000-memory.dmp modiloader_stage2 behavioral1/memory/2184-36-0x0000000002F70000-0x0000000003F70000-memory.dmp modiloader_stage2 behavioral1/memory/2184-55-0x0000000002F70000-0x0000000003F70000-memory.dmp modiloader_stage2 behavioral1/memory/2184-37-0x0000000002F70000-0x0000000003F70000-memory.dmp modiloader_stage2 -
Executes dropped EXE 8 IoCs
pid Process 2856 alpha.exe 2996 alpha.exe 2868 kn.exe 2264 alpha.exe 2912 kn.exe 2184 AnyDesk.PIF 2740 alpha.exe 1184 alpha.exe -
Loads dropped DLL 5 IoCs
pid Process 2904 cmd.exe 2904 cmd.exe 2996 alpha.exe 2664 WerFault.exe 2664 WerFault.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2664 2184 WerFault.exe 37 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AnyDesk.PIF -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 2184 AnyDesk.PIF -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 2904 wrote to memory of 2216 2904 cmd.exe 30 PID 2904 wrote to memory of 2216 2904 cmd.exe 30 PID 2904 wrote to memory of 2216 2904 cmd.exe 30 PID 2904 wrote to memory of 2856 2904 cmd.exe 31 PID 2904 wrote to memory of 2856 2904 cmd.exe 31 PID 2904 wrote to memory of 2856 2904 cmd.exe 31 PID 2856 wrote to memory of 2976 2856 alpha.exe 32 PID 2856 wrote to memory of 2976 2856 alpha.exe 32 PID 2856 wrote to memory of 2976 2856 alpha.exe 32 PID 2904 wrote to memory of 2996 2904 cmd.exe 33 PID 2904 wrote to memory of 2996 2904 cmd.exe 33 PID 2904 wrote to memory of 2996 2904 cmd.exe 33 PID 2996 wrote to memory of 2868 2996 alpha.exe 34 PID 2996 wrote to memory of 2868 2996 alpha.exe 34 PID 2996 wrote to memory of 2868 2996 alpha.exe 34 PID 2904 wrote to memory of 2264 2904 cmd.exe 35 PID 2904 wrote to memory of 2264 2904 cmd.exe 35 PID 2904 wrote to memory of 2264 2904 cmd.exe 35 PID 2264 wrote to memory of 2912 2264 alpha.exe 36 PID 2264 wrote to memory of 2912 2264 alpha.exe 36 PID 2264 wrote to memory of 2912 2264 alpha.exe 36 PID 2904 wrote to memory of 2184 2904 cmd.exe 37 PID 2904 wrote to memory of 2184 2904 cmd.exe 37 PID 2904 wrote to memory of 2184 2904 cmd.exe 37 PID 2904 wrote to memory of 2184 2904 cmd.exe 37 PID 2904 wrote to memory of 2740 2904 cmd.exe 38 PID 2904 wrote to memory of 2740 2904 cmd.exe 38 PID 2904 wrote to memory of 2740 2904 cmd.exe 38 PID 2904 wrote to memory of 1184 2904 cmd.exe 39 PID 2904 wrote to memory of 1184 2904 cmd.exe 39 PID 2904 wrote to memory of 1184 2904 cmd.exe 39 PID 2184 wrote to memory of 2664 2184 AnyDesk.PIF 40 PID 2184 wrote to memory of 2664 2184 AnyDesk.PIF 40 PID 2184 wrote to memory of 2664 2184 AnyDesk.PIF 40 PID 2184 wrote to memory of 2664 2184 AnyDesk.PIF 40
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\22112024_0208_Documentazione_Doganale_richieste_di_copia.bat"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\System32\extrac32.exeC:\\Windows\\System32\\extrac32 /C /Y C:\\Windows\\System32\\cmd.exe "C:\\Users\\Public\\alpha.exe"2⤵PID:2216
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c extrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\system32\extrac32.exeextrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe3⤵PID:2976
-
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c C:\\Users\\Public\\kn -decodehex -F "C:\Users\Admin\AppData\Local\Temp\22112024_0208_Documentazione_Doganale_richieste_di_copia.bat" "C:\\Users\\Public\\AnyDesk.jpeg" 92⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Public\kn.exeC:\\Users\\Public\\kn -decodehex -F "C:\Users\Admin\AppData\Local\Temp\22112024_0208_Documentazione_Doganale_richieste_di_copia.bat" "C:\\Users\\Public\\AnyDesk.jpeg" 93⤵
- Executes dropped EXE
PID:2868
-
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c C:\\Users\\Public\\kn -decodehex -F "C:\\Users\\Public\\AnyDesk.jpeg" "C:\\Users\\Public\\Libraries\\AnyDesk.PIF" 122⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Public\kn.exeC:\\Users\\Public\\kn -decodehex -F "C:\\Users\\Public\\AnyDesk.jpeg" "C:\\Users\\Public\\Libraries\\AnyDesk.PIF" 123⤵
- Executes dropped EXE
PID:2912
-
-
-
C:\Users\Public\Libraries\AnyDesk.PIFC:\Users\Public\Libraries\AnyDesk.PIF2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2184 -s 7163⤵
- Loads dropped DLL
- Program crash
PID:2664
-
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c del /q "C:\Users\Public\kn.exe" / A / F / Q / S2⤵
- Executes dropped EXE
PID:2740
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c del /q "C:\Users\Public\AnyDesk.jpeg" / A / F / Q / S2⤵
- Executes dropped EXE
PID:1184
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD5249b8941e9be56a05f2506bd021f97c0
SHA19719003f93839aa45568cf9ae911dde3745e1ce6
SHA25643be45cca8380f82bfa444fcfc3f36223068f008cf552628ceb26858cebe8b9b
SHA512420b1741e91984259c8527792e278e9880d842bb27aeed35f16eeaca04f6ea2ec186f3c7273f502ca31b8db00d5ffa37b6a4e135bc6c57a9b4dec79e152e7ef8
-
Filesize
1.2MB
MD5bceea9753420a675af68cda43864438e
SHA10823f156da4f106a26b5738cf9f732d5dd68cdd8
SHA256b6a6a59c8b8387233be03bb2111830d4e8aafec6a62a290090ae75cbff5736ec
SHA5128dcd35be032e853bc785615e63993deb71fa2ef35a20db9427c2a281f20ea4768b3754b4887d212cc5867ee36e470d47e33a7333cc9ca0a22196ff8371e51490
-
Filesize
337KB
MD55746bd7e255dd6a8afa06f7c42c1ba41
SHA10f3c4ff28f354aede202d54e9d1c5529a3bf87d8
SHA256db06c3534964e3fc79d2763144ba53742d7fa250ca336f4a0fe724b75aaff386
SHA5123a968356d7b94cc014f78ca37a3c03f354c3970c9e027ed4ccb8e59f0f9f2a32bfa22e7d6b127d44631d715ea41bf8ace91f0b4d69d1714d55552b064ffeb69e
-
Filesize
1.1MB
MD5ec1fd3050dbc40ec7e87ab99c7ca0b03
SHA1ae7fdfc29f4ef31e38ebf381e61b503038b5cb35
SHA2561e19c5a26215b62de1babd5633853344420c1e673bb83e8a89213085e17e16e3
SHA5124e47331f2fdce77b01d86cf8e21cd7d6df13536f09b70c53e5a6b82f66512faa10e38645884c696b47a27ea6bddc6c1fdb905ee78684dca98cbda5f39fbafcc2