Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/11/2024, 14:59
Static task
static1
Behavioral task
behavioral1
Sample
A1 igazolás.cmd
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
A1 igazolás.cmd
Resource
win10v2004-20241007-en
General
-
Target
A1 igazolás.cmd
-
Size
3.7MB
-
MD5
ebdec3ea8aada5aae98146f1b61a13ed
-
SHA1
9ed537ca66a14b296010eccdde716b1b1a629fe2
-
SHA256
6650a769ac035e23964c16c27df892d7725f415dee92582a4c7b4ceeef7345b2
-
SHA512
c733cb6cf2754bf58ed5729357307dfb311c2e571b273c199a079d0ef96526a23fa8b0e235dc4ff07f77af61f94d32bb26561eb2b4affcd5b71c0c0c649a471e
-
SSDEEP
49152:bWnHE/6TEgA8/WHmZI3Oqz0oXp2jrCbM799GY:2
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 62 IoCs
resource yara_rule behavioral1/memory/2576-35-0x0000000003270000-0x0000000004270000-memory.dmp modiloader_stage2 behavioral1/memory/2576-52-0x0000000003270000-0x0000000004270000-memory.dmp modiloader_stage2 behavioral1/memory/2576-53-0x0000000003270000-0x0000000004270000-memory.dmp modiloader_stage2 behavioral1/memory/2576-85-0x0000000003270000-0x0000000004270000-memory.dmp modiloader_stage2 behavioral1/memory/2576-83-0x0000000003270000-0x0000000004270000-memory.dmp modiloader_stage2 behavioral1/memory/2576-82-0x0000000003270000-0x0000000004270000-memory.dmp modiloader_stage2 behavioral1/memory/2576-80-0x0000000003270000-0x0000000004270000-memory.dmp modiloader_stage2 behavioral1/memory/2576-78-0x0000000003270000-0x0000000004270000-memory.dmp modiloader_stage2 behavioral1/memory/2576-75-0x0000000003270000-0x0000000004270000-memory.dmp modiloader_stage2 behavioral1/memory/2576-73-0x0000000003270000-0x0000000004270000-memory.dmp modiloader_stage2 behavioral1/memory/2576-70-0x0000000003270000-0x0000000004270000-memory.dmp modiloader_stage2 behavioral1/memory/2576-67-0x0000000003270000-0x0000000004270000-memory.dmp modiloader_stage2 behavioral1/memory/2576-65-0x0000000003270000-0x0000000004270000-memory.dmp modiloader_stage2 behavioral1/memory/2576-63-0x0000000003270000-0x0000000004270000-memory.dmp modiloader_stage2 behavioral1/memory/2576-60-0x0000000003270000-0x0000000004270000-memory.dmp modiloader_stage2 behavioral1/memory/2576-58-0x0000000003270000-0x0000000004270000-memory.dmp modiloader_stage2 behavioral1/memory/2576-57-0x0000000003270000-0x0000000004270000-memory.dmp modiloader_stage2 behavioral1/memory/2576-55-0x0000000003270000-0x0000000004270000-memory.dmp modiloader_stage2 behavioral1/memory/2576-51-0x0000000003270000-0x0000000004270000-memory.dmp modiloader_stage2 behavioral1/memory/2576-49-0x0000000003270000-0x0000000004270000-memory.dmp modiloader_stage2 behavioral1/memory/2576-48-0x0000000003270000-0x0000000004270000-memory.dmp modiloader_stage2 behavioral1/memory/2576-110-0x0000000003270000-0x0000000004270000-memory.dmp modiloader_stage2 behavioral1/memory/2576-107-0x0000000003270000-0x0000000004270000-memory.dmp modiloader_stage2 behavioral1/memory/2576-105-0x0000000003270000-0x0000000004270000-memory.dmp modiloader_stage2 behavioral1/memory/2576-103-0x0000000003270000-0x0000000004270000-memory.dmp modiloader_stage2 behavioral1/memory/2576-101-0x0000000003270000-0x0000000004270000-memory.dmp modiloader_stage2 behavioral1/memory/2576-99-0x0000000003270000-0x0000000004270000-memory.dmp modiloader_stage2 behavioral1/memory/2576-96-0x0000000003270000-0x0000000004270000-memory.dmp modiloader_stage2 behavioral1/memory/2576-95-0x0000000003270000-0x0000000004270000-memory.dmp modiloader_stage2 behavioral1/memory/2576-94-0x0000000003270000-0x0000000004270000-memory.dmp modiloader_stage2 behavioral1/memory/2576-91-0x0000000003270000-0x0000000004270000-memory.dmp modiloader_stage2 behavioral1/memory/2576-89-0x0000000003270000-0x0000000004270000-memory.dmp modiloader_stage2 behavioral1/memory/2576-88-0x0000000003270000-0x0000000004270000-memory.dmp modiloader_stage2 behavioral1/memory/2576-86-0x0000000003270000-0x0000000004270000-memory.dmp modiloader_stage2 behavioral1/memory/2576-84-0x0000000003270000-0x0000000004270000-memory.dmp modiloader_stage2 behavioral1/memory/2576-43-0x0000000003270000-0x0000000004270000-memory.dmp modiloader_stage2 behavioral1/memory/2576-81-0x0000000003270000-0x0000000004270000-memory.dmp modiloader_stage2 behavioral1/memory/2576-42-0x0000000003270000-0x0000000004270000-memory.dmp modiloader_stage2 behavioral1/memory/2576-79-0x0000000003270000-0x0000000004270000-memory.dmp modiloader_stage2 behavioral1/memory/2576-77-0x0000000003270000-0x0000000004270000-memory.dmp modiloader_stage2 behavioral1/memory/2576-76-0x0000000003270000-0x0000000004270000-memory.dmp modiloader_stage2 behavioral1/memory/2576-74-0x0000000003270000-0x0000000004270000-memory.dmp modiloader_stage2 behavioral1/memory/2576-72-0x0000000003270000-0x0000000004270000-memory.dmp modiloader_stage2 behavioral1/memory/2576-71-0x0000000003270000-0x0000000004270000-memory.dmp modiloader_stage2 behavioral1/memory/2576-69-0x0000000003270000-0x0000000004270000-memory.dmp modiloader_stage2 behavioral1/memory/2576-68-0x0000000003270000-0x0000000004270000-memory.dmp modiloader_stage2 behavioral1/memory/2576-66-0x0000000003270000-0x0000000004270000-memory.dmp modiloader_stage2 behavioral1/memory/2576-64-0x0000000003270000-0x0000000004270000-memory.dmp modiloader_stage2 behavioral1/memory/2576-62-0x0000000003270000-0x0000000004270000-memory.dmp modiloader_stage2 behavioral1/memory/2576-61-0x0000000003270000-0x0000000004270000-memory.dmp modiloader_stage2 behavioral1/memory/2576-38-0x0000000003270000-0x0000000004270000-memory.dmp modiloader_stage2 behavioral1/memory/2576-59-0x0000000003270000-0x0000000004270000-memory.dmp modiloader_stage2 behavioral1/memory/2576-56-0x0000000003270000-0x0000000004270000-memory.dmp modiloader_stage2 behavioral1/memory/2576-54-0x0000000003270000-0x0000000004270000-memory.dmp modiloader_stage2 behavioral1/memory/2576-50-0x0000000003270000-0x0000000004270000-memory.dmp modiloader_stage2 behavioral1/memory/2576-39-0x0000000003270000-0x0000000004270000-memory.dmp modiloader_stage2 behavioral1/memory/2576-47-0x0000000003270000-0x0000000004270000-memory.dmp modiloader_stage2 behavioral1/memory/2576-46-0x0000000003270000-0x0000000004270000-memory.dmp modiloader_stage2 behavioral1/memory/2576-45-0x0000000003270000-0x0000000004270000-memory.dmp modiloader_stage2 behavioral1/memory/2576-44-0x0000000003270000-0x0000000004270000-memory.dmp modiloader_stage2 behavioral1/memory/2576-41-0x0000000003270000-0x0000000004270000-memory.dmp modiloader_stage2 behavioral1/memory/2576-40-0x0000000003270000-0x0000000004270000-memory.dmp modiloader_stage2 -
Executes dropped EXE 8 IoCs
pid Process 2776 alpha.exe 2840 alpha.exe 2856 kn.exe 2748 alpha.exe 2716 kn.exe 2576 AnyDesk.PIF 2692 alpha.exe 2844 alpha.exe -
Loads dropped DLL 9 IoCs
pid Process 2380 cmd.exe 2380 cmd.exe 2840 alpha.exe 2380 cmd.exe 2748 alpha.exe 2380 cmd.exe 2380 cmd.exe 1484 WerFault.exe 1484 WerFault.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1484 2576 WerFault.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AnyDesk.PIF -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 2576 AnyDesk.PIF -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2684 2380 cmd.exe 31 PID 2380 wrote to memory of 2684 2380 cmd.exe 31 PID 2380 wrote to memory of 2684 2380 cmd.exe 31 PID 2380 wrote to memory of 2776 2380 cmd.exe 32 PID 2380 wrote to memory of 2776 2380 cmd.exe 32 PID 2380 wrote to memory of 2776 2380 cmd.exe 32 PID 2776 wrote to memory of 2800 2776 alpha.exe 33 PID 2776 wrote to memory of 2800 2776 alpha.exe 33 PID 2776 wrote to memory of 2800 2776 alpha.exe 33 PID 2380 wrote to memory of 2840 2380 cmd.exe 34 PID 2380 wrote to memory of 2840 2380 cmd.exe 34 PID 2380 wrote to memory of 2840 2380 cmd.exe 34 PID 2840 wrote to memory of 2856 2840 alpha.exe 35 PID 2840 wrote to memory of 2856 2840 alpha.exe 35 PID 2840 wrote to memory of 2856 2840 alpha.exe 35 PID 2380 wrote to memory of 2748 2380 cmd.exe 36 PID 2380 wrote to memory of 2748 2380 cmd.exe 36 PID 2380 wrote to memory of 2748 2380 cmd.exe 36 PID 2748 wrote to memory of 2716 2748 alpha.exe 37 PID 2748 wrote to memory of 2716 2748 alpha.exe 37 PID 2748 wrote to memory of 2716 2748 alpha.exe 37 PID 2380 wrote to memory of 2576 2380 cmd.exe 38 PID 2380 wrote to memory of 2576 2380 cmd.exe 38 PID 2380 wrote to memory of 2576 2380 cmd.exe 38 PID 2380 wrote to memory of 2576 2380 cmd.exe 38 PID 2380 wrote to memory of 2692 2380 cmd.exe 39 PID 2380 wrote to memory of 2692 2380 cmd.exe 39 PID 2380 wrote to memory of 2692 2380 cmd.exe 39 PID 2380 wrote to memory of 2844 2380 cmd.exe 40 PID 2380 wrote to memory of 2844 2380 cmd.exe 40 PID 2380 wrote to memory of 2844 2380 cmd.exe 40 PID 2576 wrote to memory of 1484 2576 AnyDesk.PIF 41 PID 2576 wrote to memory of 1484 2576 AnyDesk.PIF 41 PID 2576 wrote to memory of 1484 2576 AnyDesk.PIF 41 PID 2576 wrote to memory of 1484 2576 AnyDesk.PIF 41
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\A1 igazolás.cmd"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\System32\extrac32.exeC:\\Windows\\System32\\extrac32 /C /Y C:\\Windows\\System32\\cmd.exe "C:\\Users\\Public\\alpha.exe"2⤵PID:2684
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c extrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\system32\extrac32.exeextrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe3⤵PID:2800
-
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c C:\\Users\\Public\\kn -decodehex -F "C:\Users\Admin\AppData\Local\Temp\A1 igazolás.cmd" "C:\\Users\\Public\\AnyDesk.jpeg" 92⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Public\kn.exeC:\\Users\\Public\\kn -decodehex -F "C:\Users\Admin\AppData\Local\Temp\A1 igazolás.cmd" "C:\\Users\\Public\\AnyDesk.jpeg" 93⤵
- Executes dropped EXE
PID:2856
-
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c C:\\Users\\Public\\kn -decodehex -F "C:\\Users\\Public\\AnyDesk.jpeg" "C:\\Users\\Public\\Libraries\\AnyDesk.PIF" 122⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Public\kn.exeC:\\Users\\Public\\kn -decodehex -F "C:\\Users\\Public\\AnyDesk.jpeg" "C:\\Users\\Public\\Libraries\\AnyDesk.PIF" 123⤵
- Executes dropped EXE
PID:2716
-
-
-
C:\Users\Public\Libraries\AnyDesk.PIFC:\Users\Public\Libraries\AnyDesk.PIF2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2576 -s 7123⤵
- Loads dropped DLL
- Program crash
PID:1484
-
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c del /q "C:\Users\Public\kn.exe" / A / F / Q / S2⤵
- Executes dropped EXE
PID:2692
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c del /q "C:\Users\Public\AnyDesk.jpeg" / A / F / Q / S2⤵
- Executes dropped EXE
PID:2844
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD55701d503c293645679d856d0c494b94e
SHA171d664ad536d21adedfb84b3f9a16fc89165c1e5
SHA256ce18404f625bf524666db80e18e715dd93c20ffb33508adfc0fe2dc1b9160d3c
SHA5122805ab3b2cae50847d9d0e77ccc92fb8f819c8d1bfad2abf61bb5f442ad3f77c448c1669c3addddcd201148e8b5303093f853d1bc9c076727fa739d3a8154443
-
Filesize
1.3MB
MD5a8af2d572217e48eeebdf7dd135f90cd
SHA179130f4d66f04c8b6cf6d88307039478060da9e9
SHA2565687ad48c8b8268f79cb520b632175beadd8cdf7b6e6431a636a518774d47faa
SHA5123385579e987e19dac4a069510ab9204ecb98c6655d86680668eee05bcc4901809d9d3f5a30d0a4522dde45288dae1f2110988010389a4597ff4b623e5665c596
-
Filesize
337KB
MD55746bd7e255dd6a8afa06f7c42c1ba41
SHA10f3c4ff28f354aede202d54e9d1c5529a3bf87d8
SHA256db06c3534964e3fc79d2763144ba53742d7fa250ca336f4a0fe724b75aaff386
SHA5123a968356d7b94cc014f78ca37a3c03f354c3970c9e027ed4ccb8e59f0f9f2a32bfa22e7d6b127d44631d715ea41bf8ace91f0b4d69d1714d55552b064ffeb69e
-
Filesize
1.1MB
MD5ec1fd3050dbc40ec7e87ab99c7ca0b03
SHA1ae7fdfc29f4ef31e38ebf381e61b503038b5cb35
SHA2561e19c5a26215b62de1babd5633853344420c1e673bb83e8a89213085e17e16e3
SHA5124e47331f2fdce77b01d86cf8e21cd7d6df13536f09b70c53e5a6b82f66512faa10e38645884c696b47a27ea6bddc6c1fdb905ee78684dca98cbda5f39fbafcc2