Analysis
-
max time kernel
95s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26/11/2024, 15:51
Static task
static1
Behavioral task
behavioral1
Sample
RFQ-BIOTEC_002728-NOV2024.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
RFQ-BIOTEC_002728-NOV2024.exe
Resource
win10v2004-20241007-en
General
-
Target
RFQ-BIOTEC_002728-NOV2024.exe
-
Size
1.3MB
-
MD5
79ace15018985ca7eca866bc1ba75450
-
SHA1
8398ecad208ffceb7a7d7f05effb062aee0575a2
-
SHA256
d9a741f56d074d634b03d575c2146fd18eccdaa91a12b694b1a74c603e3d73ba
-
SHA512
392dfdd81132b3ff6e71910038fbdce13163f1d87bfbbc5d88c2ce8af3113dfd57d4db24f314ee43c99ae0533ef22a1ab22c13445e0befb366ba28238282d136
-
SSDEEP
24576:UxxWMyBNKhfrnjjyal3sTcueSG3YH4fPFLb62+bJb7xtP:WLMulhBFLb67VxtP
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 61 IoCs
resource yara_rule behavioral2/memory/3792-2-0x0000000002C60000-0x0000000003C60000-memory.dmp modiloader_stage2 behavioral2/memory/3792-10-0x0000000002C60000-0x0000000003C60000-memory.dmp modiloader_stage2 behavioral2/memory/3792-17-0x0000000002C60000-0x0000000003C60000-memory.dmp modiloader_stage2 behavioral2/memory/3792-32-0x0000000002C60000-0x0000000003C60000-memory.dmp modiloader_stage2 behavioral2/memory/3792-66-0x0000000002C60000-0x0000000003C60000-memory.dmp modiloader_stage2 behavioral2/memory/3792-65-0x0000000002C60000-0x0000000003C60000-memory.dmp modiloader_stage2 behavioral2/memory/3792-64-0x0000000002C60000-0x0000000003C60000-memory.dmp modiloader_stage2 behavioral2/memory/3792-63-0x0000000002C60000-0x0000000003C60000-memory.dmp modiloader_stage2 behavioral2/memory/3792-61-0x0000000002C60000-0x0000000003C60000-memory.dmp modiloader_stage2 behavioral2/memory/3792-60-0x0000000002C60000-0x0000000003C60000-memory.dmp modiloader_stage2 behavioral2/memory/3792-59-0x0000000002C60000-0x0000000003C60000-memory.dmp modiloader_stage2 behavioral2/memory/3792-57-0x0000000002C60000-0x0000000003C60000-memory.dmp modiloader_stage2 behavioral2/memory/3792-56-0x0000000002C60000-0x0000000003C60000-memory.dmp modiloader_stage2 behavioral2/memory/3792-55-0x0000000002C60000-0x0000000003C60000-memory.dmp modiloader_stage2 behavioral2/memory/3792-54-0x0000000002C60000-0x0000000003C60000-memory.dmp modiloader_stage2 behavioral2/memory/3792-52-0x0000000002C60000-0x0000000003C60000-memory.dmp modiloader_stage2 behavioral2/memory/3792-51-0x0000000002C60000-0x0000000003C60000-memory.dmp modiloader_stage2 behavioral2/memory/3792-50-0x0000000002C60000-0x0000000003C60000-memory.dmp modiloader_stage2 behavioral2/memory/3792-49-0x0000000002C60000-0x0000000003C60000-memory.dmp modiloader_stage2 behavioral2/memory/3792-47-0x0000000002C60000-0x0000000003C60000-memory.dmp modiloader_stage2 behavioral2/memory/3792-46-0x0000000002C60000-0x0000000003C60000-memory.dmp modiloader_stage2 behavioral2/memory/3792-45-0x0000000002C60000-0x0000000003C60000-memory.dmp modiloader_stage2 behavioral2/memory/3792-43-0x0000000002C60000-0x0000000003C60000-memory.dmp modiloader_stage2 behavioral2/memory/3792-41-0x0000000002C60000-0x0000000003C60000-memory.dmp modiloader_stage2 behavioral2/memory/3792-40-0x0000000002C60000-0x0000000003C60000-memory.dmp modiloader_stage2 behavioral2/memory/3792-39-0x0000000002C60000-0x0000000003C60000-memory.dmp modiloader_stage2 behavioral2/memory/3792-38-0x0000000002C60000-0x0000000003C60000-memory.dmp modiloader_stage2 behavioral2/memory/3792-37-0x0000000002C60000-0x0000000003C60000-memory.dmp modiloader_stage2 behavioral2/memory/3792-36-0x0000000002C60000-0x0000000003C60000-memory.dmp modiloader_stage2 behavioral2/memory/3792-35-0x0000000002C60000-0x0000000003C60000-memory.dmp modiloader_stage2 behavioral2/memory/3792-34-0x0000000002C60000-0x0000000003C60000-memory.dmp modiloader_stage2 behavioral2/memory/3792-33-0x0000000002C60000-0x0000000003C60000-memory.dmp modiloader_stage2 behavioral2/memory/3792-62-0x0000000002C60000-0x0000000003C60000-memory.dmp modiloader_stage2 behavioral2/memory/3792-30-0x0000000002C60000-0x0000000003C60000-memory.dmp modiloader_stage2 behavioral2/memory/3792-58-0x0000000002C60000-0x0000000003C60000-memory.dmp modiloader_stage2 behavioral2/memory/3792-28-0x0000000002C60000-0x0000000003C60000-memory.dmp modiloader_stage2 behavioral2/memory/3792-27-0x0000000002C60000-0x0000000003C60000-memory.dmp modiloader_stage2 behavioral2/memory/3792-53-0x0000000002C60000-0x0000000003C60000-memory.dmp modiloader_stage2 behavioral2/memory/3792-26-0x0000000002C60000-0x0000000003C60000-memory.dmp modiloader_stage2 behavioral2/memory/3792-25-0x0000000002C60000-0x0000000003C60000-memory.dmp modiloader_stage2 behavioral2/memory/3792-48-0x0000000002C60000-0x0000000003C60000-memory.dmp modiloader_stage2 behavioral2/memory/3792-24-0x0000000002C60000-0x0000000003C60000-memory.dmp modiloader_stage2 behavioral2/memory/3792-44-0x0000000002C60000-0x0000000003C60000-memory.dmp modiloader_stage2 behavioral2/memory/3792-22-0x0000000002C60000-0x0000000003C60000-memory.dmp modiloader_stage2 behavioral2/memory/3792-42-0x0000000002C60000-0x0000000003C60000-memory.dmp modiloader_stage2 behavioral2/memory/3792-21-0x0000000002C60000-0x0000000003C60000-memory.dmp modiloader_stage2 behavioral2/memory/3792-20-0x0000000002C60000-0x0000000003C60000-memory.dmp modiloader_stage2 behavioral2/memory/3792-19-0x0000000002C60000-0x0000000003C60000-memory.dmp modiloader_stage2 behavioral2/memory/3792-18-0x0000000002C60000-0x0000000003C60000-memory.dmp modiloader_stage2 behavioral2/memory/3792-31-0x0000000002C60000-0x0000000003C60000-memory.dmp modiloader_stage2 behavioral2/memory/3792-16-0x0000000002C60000-0x0000000003C60000-memory.dmp modiloader_stage2 behavioral2/memory/3792-29-0x0000000002C60000-0x0000000003C60000-memory.dmp modiloader_stage2 behavioral2/memory/3792-15-0x0000000002C60000-0x0000000003C60000-memory.dmp modiloader_stage2 behavioral2/memory/3792-14-0x0000000002C60000-0x0000000003C60000-memory.dmp modiloader_stage2 behavioral2/memory/3792-23-0x0000000002C60000-0x0000000003C60000-memory.dmp modiloader_stage2 behavioral2/memory/3792-13-0x0000000002C60000-0x0000000003C60000-memory.dmp modiloader_stage2 behavioral2/memory/3792-12-0x0000000002C60000-0x0000000003C60000-memory.dmp modiloader_stage2 behavioral2/memory/3792-11-0x0000000002C60000-0x0000000003C60000-memory.dmp modiloader_stage2 behavioral2/memory/3792-8-0x0000000002C60000-0x0000000003C60000-memory.dmp modiloader_stage2 behavioral2/memory/3792-9-0x0000000002C60000-0x0000000003C60000-memory.dmp modiloader_stage2 behavioral2/memory/3792-7-0x0000000002C60000-0x0000000003C60000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 3140 xhvojehW.pif -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3792 set thread context of 3140 3792 RFQ-BIOTEC_002728-NOV2024.exe 89 -
Program crash 1 IoCs
pid pid_target Process procid_target 680 3140 WerFault.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RFQ-BIOTEC_002728-NOV2024.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 20 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3792 wrote to memory of 3140 3792 RFQ-BIOTEC_002728-NOV2024.exe 89 PID 3792 wrote to memory of 3140 3792 RFQ-BIOTEC_002728-NOV2024.exe 89 PID 3792 wrote to memory of 3140 3792 RFQ-BIOTEC_002728-NOV2024.exe 89 PID 3792 wrote to memory of 3140 3792 RFQ-BIOTEC_002728-NOV2024.exe 89 PID 3792 wrote to memory of 3140 3792 RFQ-BIOTEC_002728-NOV2024.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\RFQ-BIOTEC_002728-NOV2024.exe"C:\Users\Admin\AppData\Local\Temp\RFQ-BIOTEC_002728-NOV2024.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Users\Public\Libraries\xhvojehW.pifC:\Users\Public\Libraries\xhvojehW.pif2⤵
- Executes dropped EXE
PID:3140 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3140 -s 123⤵
- Program crash
PID:680
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3140 -ip 31401⤵PID:4540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD5c116d3604ceafe7057d77ff27552c215
SHA1452b14432fb5758b46f2897aeccd89f7c82a727d
SHA2567bcdc2e607abc65ef93afd009c3048970d9e8d1c2a18fc571562396b13ebb301
SHA5129202a00eeaf4c5be94de32fd41bfea40fc32d368955d49b7bad2b5c23c4ebc92dccb37d99f5a14e53ad674b63f1baa6efb1feb27225c86693ead3262a26d66c6