Analysis
-
max time kernel
113s -
max time network
203s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26/11/2024, 15:45
Static task
static1
Behavioral task
behavioral1
Sample
RFQ-BIOTEC_002728-NOV2024.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
RFQ-BIOTEC_002728-NOV2024.exe
Resource
win10v2004-20241007-en
General
-
Target
RFQ-BIOTEC_002728-NOV2024.exe
-
Size
1.3MB
-
MD5
79ace15018985ca7eca866bc1ba75450
-
SHA1
8398ecad208ffceb7a7d7f05effb062aee0575a2
-
SHA256
d9a741f56d074d634b03d575c2146fd18eccdaa91a12b694b1a74c603e3d73ba
-
SHA512
392dfdd81132b3ff6e71910038fbdce13163f1d87bfbbc5d88c2ce8af3113dfd57d4db24f314ee43c99ae0533ef22a1ab22c13445e0befb366ba28238282d136
-
SSDEEP
24576:UxxWMyBNKhfrnjjyal3sTcueSG3YH4fPFLb62+bJb7xtP:WLMulhBFLb67VxtP
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 61 IoCs
resource yara_rule behavioral2/memory/5084-2-0x0000000002B60000-0x0000000003B60000-memory.dmp modiloader_stage2 behavioral2/memory/5084-7-0x0000000002B60000-0x0000000003B60000-memory.dmp modiloader_stage2 behavioral2/memory/5084-9-0x0000000002B60000-0x0000000003B60000-memory.dmp modiloader_stage2 behavioral2/memory/5084-8-0x0000000002B60000-0x0000000003B60000-memory.dmp modiloader_stage2 behavioral2/memory/5084-12-0x0000000002B60000-0x0000000003B60000-memory.dmp modiloader_stage2 behavioral2/memory/5084-11-0x0000000002B60000-0x0000000003B60000-memory.dmp modiloader_stage2 behavioral2/memory/5084-10-0x0000000002B60000-0x0000000003B60000-memory.dmp modiloader_stage2 behavioral2/memory/5084-17-0x0000000002B60000-0x0000000003B60000-memory.dmp modiloader_stage2 behavioral2/memory/5084-22-0x0000000002B60000-0x0000000003B60000-memory.dmp modiloader_stage2 behavioral2/memory/5084-31-0x0000000002B60000-0x0000000003B60000-memory.dmp modiloader_stage2 behavioral2/memory/5084-44-0x0000000002B60000-0x0000000003B60000-memory.dmp modiloader_stage2 behavioral2/memory/5084-64-0x0000000002B60000-0x0000000003B60000-memory.dmp modiloader_stage2 behavioral2/memory/5084-67-0x0000000002B60000-0x0000000003B60000-memory.dmp modiloader_stage2 behavioral2/memory/5084-66-0x0000000002B60000-0x0000000003B60000-memory.dmp modiloader_stage2 behavioral2/memory/5084-33-0x0000000002B60000-0x0000000003B60000-memory.dmp modiloader_stage2 behavioral2/memory/5084-63-0x0000000002B60000-0x0000000003B60000-memory.dmp modiloader_stage2 behavioral2/memory/5084-62-0x0000000002B60000-0x0000000003B60000-memory.dmp modiloader_stage2 behavioral2/memory/5084-60-0x0000000002B60000-0x0000000003B60000-memory.dmp modiloader_stage2 behavioral2/memory/5084-59-0x0000000002B60000-0x0000000003B60000-memory.dmp modiloader_stage2 behavioral2/memory/5084-56-0x0000000002B60000-0x0000000003B60000-memory.dmp modiloader_stage2 behavioral2/memory/5084-53-0x0000000002B60000-0x0000000003B60000-memory.dmp modiloader_stage2 behavioral2/memory/5084-52-0x0000000002B60000-0x0000000003B60000-memory.dmp modiloader_stage2 behavioral2/memory/5084-48-0x0000000002B60000-0x0000000003B60000-memory.dmp modiloader_stage2 behavioral2/memory/5084-46-0x0000000002B60000-0x0000000003B60000-memory.dmp modiloader_stage2 behavioral2/memory/5084-43-0x0000000002B60000-0x0000000003B60000-memory.dmp modiloader_stage2 behavioral2/memory/5084-61-0x0000000002B60000-0x0000000003B60000-memory.dmp modiloader_stage2 behavioral2/memory/5084-42-0x0000000002B60000-0x0000000003B60000-memory.dmp modiloader_stage2 behavioral2/memory/5084-41-0x0000000002B60000-0x0000000003B60000-memory.dmp modiloader_stage2 behavioral2/memory/5084-58-0x0000000002B60000-0x0000000003B60000-memory.dmp modiloader_stage2 behavioral2/memory/5084-40-0x0000000002B60000-0x0000000003B60000-memory.dmp modiloader_stage2 behavioral2/memory/5084-57-0x0000000002B60000-0x0000000003B60000-memory.dmp modiloader_stage2 behavioral2/memory/5084-39-0x0000000002B60000-0x0000000003B60000-memory.dmp modiloader_stage2 behavioral2/memory/5084-55-0x0000000002B60000-0x0000000003B60000-memory.dmp modiloader_stage2 behavioral2/memory/5084-38-0x0000000002B60000-0x0000000003B60000-memory.dmp modiloader_stage2 behavioral2/memory/5084-54-0x0000000002B60000-0x0000000003B60000-memory.dmp modiloader_stage2 behavioral2/memory/5084-37-0x0000000002B60000-0x0000000003B60000-memory.dmp modiloader_stage2 behavioral2/memory/5084-51-0x0000000002B60000-0x0000000003B60000-memory.dmp modiloader_stage2 behavioral2/memory/5084-36-0x0000000002B60000-0x0000000003B60000-memory.dmp modiloader_stage2 behavioral2/memory/5084-50-0x0000000002B60000-0x0000000003B60000-memory.dmp modiloader_stage2 behavioral2/memory/5084-35-0x0000000002B60000-0x0000000003B60000-memory.dmp modiloader_stage2 behavioral2/memory/5084-49-0x0000000002B60000-0x0000000003B60000-memory.dmp modiloader_stage2 behavioral2/memory/5084-34-0x0000000002B60000-0x0000000003B60000-memory.dmp modiloader_stage2 behavioral2/memory/5084-47-0x0000000002B60000-0x0000000003B60000-memory.dmp modiloader_stage2 behavioral2/memory/5084-32-0x0000000002B60000-0x0000000003B60000-memory.dmp modiloader_stage2 behavioral2/memory/5084-45-0x0000000002B60000-0x0000000003B60000-memory.dmp modiloader_stage2 behavioral2/memory/5084-30-0x0000000002B60000-0x0000000003B60000-memory.dmp modiloader_stage2 behavioral2/memory/5084-29-0x0000000002B60000-0x0000000003B60000-memory.dmp modiloader_stage2 behavioral2/memory/5084-28-0x0000000002B60000-0x0000000003B60000-memory.dmp modiloader_stage2 behavioral2/memory/5084-27-0x0000000002B60000-0x0000000003B60000-memory.dmp modiloader_stage2 behavioral2/memory/5084-26-0x0000000002B60000-0x0000000003B60000-memory.dmp modiloader_stage2 behavioral2/memory/5084-25-0x0000000002B60000-0x0000000003B60000-memory.dmp modiloader_stage2 behavioral2/memory/5084-24-0x0000000002B60000-0x0000000003B60000-memory.dmp modiloader_stage2 behavioral2/memory/5084-23-0x0000000002B60000-0x0000000003B60000-memory.dmp modiloader_stage2 behavioral2/memory/5084-21-0x0000000002B60000-0x0000000003B60000-memory.dmp modiloader_stage2 behavioral2/memory/5084-20-0x0000000002B60000-0x0000000003B60000-memory.dmp modiloader_stage2 behavioral2/memory/5084-19-0x0000000002B60000-0x0000000003B60000-memory.dmp modiloader_stage2 behavioral2/memory/5084-18-0x0000000002B60000-0x0000000003B60000-memory.dmp modiloader_stage2 behavioral2/memory/5084-16-0x0000000002B60000-0x0000000003B60000-memory.dmp modiloader_stage2 behavioral2/memory/5084-15-0x0000000002B60000-0x0000000003B60000-memory.dmp modiloader_stage2 behavioral2/memory/5084-14-0x0000000002B60000-0x0000000003B60000-memory.dmp modiloader_stage2 behavioral2/memory/5084-13-0x0000000002B60000-0x0000000003B60000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 432 xhvojehW.pif -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5084 set thread context of 432 5084 RFQ-BIOTEC_002728-NOV2024.exe 89 -
Program crash 1 IoCs
pid pid_target Process procid_target 932 432 WerFault.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RFQ-BIOTEC_002728-NOV2024.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 22 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 5084 wrote to memory of 432 5084 RFQ-BIOTEC_002728-NOV2024.exe 89 PID 5084 wrote to memory of 432 5084 RFQ-BIOTEC_002728-NOV2024.exe 89 PID 5084 wrote to memory of 432 5084 RFQ-BIOTEC_002728-NOV2024.exe 89 PID 5084 wrote to memory of 432 5084 RFQ-BIOTEC_002728-NOV2024.exe 89 PID 5084 wrote to memory of 432 5084 RFQ-BIOTEC_002728-NOV2024.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\RFQ-BIOTEC_002728-NOV2024.exe"C:\Users\Admin\AppData\Local\Temp\RFQ-BIOTEC_002728-NOV2024.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Users\Public\Libraries\xhvojehW.pifC:\Users\Public\Libraries\xhvojehW.pif2⤵
- Executes dropped EXE
PID:432 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 432 -s 123⤵
- Program crash
PID:932
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 432 -ip 4321⤵PID:2320
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD5c116d3604ceafe7057d77ff27552c215
SHA1452b14432fb5758b46f2897aeccd89f7c82a727d
SHA2567bcdc2e607abc65ef93afd009c3048970d9e8d1c2a18fc571562396b13ebb301
SHA5129202a00eeaf4c5be94de32fd41bfea40fc32d368955d49b7bad2b5c23c4ebc92dccb37d99f5a14e53ad674b63f1baa6efb1feb27225c86693ead3262a26d66c6