Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26/11/2024, 15:51
Static task
static1
Behavioral task
behavioral1
Sample
RFQ-BIOTEC_002728-NOV2024.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
RFQ-BIOTEC_002728-NOV2024.exe
Resource
win10v2004-20241007-en
General
-
Target
RFQ-BIOTEC_002728-NOV2024.exe
-
Size
1.3MB
-
MD5
79ace15018985ca7eca866bc1ba75450
-
SHA1
8398ecad208ffceb7a7d7f05effb062aee0575a2
-
SHA256
d9a741f56d074d634b03d575c2146fd18eccdaa91a12b694b1a74c603e3d73ba
-
SHA512
392dfdd81132b3ff6e71910038fbdce13163f1d87bfbbc5d88c2ce8af3113dfd57d4db24f314ee43c99ae0533ef22a1ab22c13445e0befb366ba28238282d136
-
SSDEEP
24576:UxxWMyBNKhfrnjjyal3sTcueSG3YH4fPFLb62+bJb7xtP:WLMulhBFLb67VxtP
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 61 IoCs
resource yara_rule behavioral1/memory/1624-2-0x00000000033B0000-0x00000000043B0000-memory.dmp modiloader_stage2 behavioral1/memory/1624-6-0x00000000033B0000-0x00000000043B0000-memory.dmp modiloader_stage2 behavioral1/memory/1624-26-0x00000000033B0000-0x00000000043B0000-memory.dmp modiloader_stage2 behavioral1/memory/1624-28-0x00000000033B0000-0x00000000043B0000-memory.dmp modiloader_stage2 behavioral1/memory/1624-15-0x00000000033B0000-0x00000000043B0000-memory.dmp modiloader_stage2 behavioral1/memory/1624-32-0x00000000033B0000-0x00000000043B0000-memory.dmp modiloader_stage2 behavioral1/memory/1624-7-0x00000000033B0000-0x00000000043B0000-memory.dmp modiloader_stage2 behavioral1/memory/1624-35-0x00000000033B0000-0x00000000043B0000-memory.dmp modiloader_stage2 behavioral1/memory/1624-38-0x00000000033B0000-0x00000000043B0000-memory.dmp modiloader_stage2 behavioral1/memory/1624-8-0x00000000033B0000-0x00000000043B0000-memory.dmp modiloader_stage2 behavioral1/memory/1624-18-0x00000000033B0000-0x00000000043B0000-memory.dmp modiloader_stage2 behavioral1/memory/1624-43-0x00000000033B0000-0x00000000043B0000-memory.dmp modiloader_stage2 behavioral1/memory/1624-9-0x00000000033B0000-0x00000000043B0000-memory.dmp modiloader_stage2 behavioral1/memory/1624-10-0x00000000033B0000-0x00000000043B0000-memory.dmp modiloader_stage2 behavioral1/memory/1624-11-0x00000000033B0000-0x00000000043B0000-memory.dmp modiloader_stage2 behavioral1/memory/1624-79-0x00000000033B0000-0x00000000043B0000-memory.dmp modiloader_stage2 behavioral1/memory/1624-81-0x00000000033B0000-0x00000000043B0000-memory.dmp modiloader_stage2 behavioral1/memory/1624-14-0x00000000033B0000-0x00000000043B0000-memory.dmp modiloader_stage2 behavioral1/memory/1624-13-0x00000000033B0000-0x00000000043B0000-memory.dmp modiloader_stage2 behavioral1/memory/1624-84-0x00000000033B0000-0x00000000043B0000-memory.dmp modiloader_stage2 behavioral1/memory/1624-12-0x00000000033B0000-0x00000000043B0000-memory.dmp modiloader_stage2 behavioral1/memory/1624-17-0x00000000033B0000-0x00000000043B0000-memory.dmp modiloader_stage2 behavioral1/memory/1624-33-0x00000000033B0000-0x00000000043B0000-memory.dmp modiloader_stage2 behavioral1/memory/1624-16-0x00000000033B0000-0x00000000043B0000-memory.dmp modiloader_stage2 behavioral1/memory/1624-48-0x00000000033B0000-0x00000000043B0000-memory.dmp modiloader_stage2 behavioral1/memory/1624-55-0x00000000033B0000-0x00000000043B0000-memory.dmp modiloader_stage2 behavioral1/memory/1624-53-0x00000000033B0000-0x00000000043B0000-memory.dmp modiloader_stage2 behavioral1/memory/1624-51-0x00000000033B0000-0x00000000043B0000-memory.dmp modiloader_stage2 behavioral1/memory/1624-21-0x00000000033B0000-0x00000000043B0000-memory.dmp modiloader_stage2 behavioral1/memory/1624-70-0x00000000033B0000-0x00000000043B0000-memory.dmp modiloader_stage2 behavioral1/memory/1624-23-0x00000000033B0000-0x00000000043B0000-memory.dmp modiloader_stage2 behavioral1/memory/1624-68-0x00000000033B0000-0x00000000043B0000-memory.dmp modiloader_stage2 behavioral1/memory/1624-66-0x00000000033B0000-0x00000000043B0000-memory.dmp modiloader_stage2 behavioral1/memory/1624-65-0x00000000033B0000-0x00000000043B0000-memory.dmp modiloader_stage2 behavioral1/memory/1624-22-0x00000000033B0000-0x00000000043B0000-memory.dmp modiloader_stage2 behavioral1/memory/1624-63-0x00000000033B0000-0x00000000043B0000-memory.dmp modiloader_stage2 behavioral1/memory/1624-61-0x00000000033B0000-0x00000000043B0000-memory.dmp modiloader_stage2 behavioral1/memory/1624-59-0x00000000033B0000-0x00000000043B0000-memory.dmp modiloader_stage2 behavioral1/memory/1624-57-0x00000000033B0000-0x00000000043B0000-memory.dmp modiloader_stage2 behavioral1/memory/1624-49-0x00000000033B0000-0x00000000043B0000-memory.dmp modiloader_stage2 behavioral1/memory/1624-20-0x00000000033B0000-0x00000000043B0000-memory.dmp modiloader_stage2 behavioral1/memory/1624-47-0x00000000033B0000-0x00000000043B0000-memory.dmp modiloader_stage2 behavioral1/memory/1624-46-0x00000000033B0000-0x00000000043B0000-memory.dmp modiloader_stage2 behavioral1/memory/1624-45-0x00000000033B0000-0x00000000043B0000-memory.dmp modiloader_stage2 behavioral1/memory/1624-19-0x00000000033B0000-0x00000000043B0000-memory.dmp modiloader_stage2 behavioral1/memory/1624-78-0x00000000033B0000-0x00000000043B0000-memory.dmp modiloader_stage2 behavioral1/memory/1624-77-0x00000000033B0000-0x00000000043B0000-memory.dmp modiloader_stage2 behavioral1/memory/1624-76-0x00000000033B0000-0x00000000043B0000-memory.dmp modiloader_stage2 behavioral1/memory/1624-24-0x00000000033B0000-0x00000000043B0000-memory.dmp modiloader_stage2 behavioral1/memory/1624-74-0x00000000033B0000-0x00000000043B0000-memory.dmp modiloader_stage2 behavioral1/memory/1624-72-0x00000000033B0000-0x00000000043B0000-memory.dmp modiloader_stage2 behavioral1/memory/1624-25-0x00000000033B0000-0x00000000043B0000-memory.dmp modiloader_stage2 behavioral1/memory/1624-40-0x00000000033B0000-0x00000000043B0000-memory.dmp modiloader_stage2 behavioral1/memory/1624-39-0x00000000033B0000-0x00000000043B0000-memory.dmp modiloader_stage2 behavioral1/memory/1624-37-0x00000000033B0000-0x00000000043B0000-memory.dmp modiloader_stage2 behavioral1/memory/1624-36-0x00000000033B0000-0x00000000043B0000-memory.dmp modiloader_stage2 behavioral1/memory/1624-34-0x00000000033B0000-0x00000000043B0000-memory.dmp modiloader_stage2 behavioral1/memory/1624-31-0x00000000033B0000-0x00000000043B0000-memory.dmp modiloader_stage2 behavioral1/memory/1624-30-0x00000000033B0000-0x00000000043B0000-memory.dmp modiloader_stage2 behavioral1/memory/1624-29-0x00000000033B0000-0x00000000043B0000-memory.dmp modiloader_stage2 behavioral1/memory/1624-27-0x00000000033B0000-0x00000000043B0000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 1052 xhvojehW.pif -
Loads dropped DLL 2 IoCs
pid Process 1624 RFQ-BIOTEC_002728-NOV2024.exe 1624 RFQ-BIOTEC_002728-NOV2024.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1624 set thread context of 1052 1624 RFQ-BIOTEC_002728-NOV2024.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RFQ-BIOTEC_002728-NOV2024.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 4 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1624 wrote to memory of 1052 1624 RFQ-BIOTEC_002728-NOV2024.exe 29 PID 1624 wrote to memory of 1052 1624 RFQ-BIOTEC_002728-NOV2024.exe 29 PID 1624 wrote to memory of 1052 1624 RFQ-BIOTEC_002728-NOV2024.exe 29 PID 1624 wrote to memory of 1052 1624 RFQ-BIOTEC_002728-NOV2024.exe 29 PID 1624 wrote to memory of 1052 1624 RFQ-BIOTEC_002728-NOV2024.exe 29 PID 1624 wrote to memory of 1052 1624 RFQ-BIOTEC_002728-NOV2024.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\RFQ-BIOTEC_002728-NOV2024.exe"C:\Users\Admin\AppData\Local\Temp\RFQ-BIOTEC_002728-NOV2024.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Users\Public\Libraries\xhvojehW.pifC:\Users\Public\Libraries\xhvojehW.pif2⤵
- Executes dropped EXE
PID:1052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
66KB
MD5c116d3604ceafe7057d77ff27552c215
SHA1452b14432fb5758b46f2897aeccd89f7c82a727d
SHA2567bcdc2e607abc65ef93afd009c3048970d9e8d1c2a18fc571562396b13ebb301
SHA5129202a00eeaf4c5be94de32fd41bfea40fc32d368955d49b7bad2b5c23c4ebc92dccb37d99f5a14e53ad674b63f1baa6efb1feb27225c86693ead3262a26d66c6