Analysis
-
max time kernel
142s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/12/2024, 03:02
Static task
static1
Behavioral task
behavioral1
Sample
d39cdd125be8be319e9e290012f8907fbb6dff000199f23eab95e47c3d8d898c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d39cdd125be8be319e9e290012f8907fbb6dff000199f23eab95e47c3d8d898c.exe
Resource
win10v2004-20241007-en
General
-
Target
d39cdd125be8be319e9e290012f8907fbb6dff000199f23eab95e47c3d8d898c.exe
-
Size
1.3MB
-
MD5
34b4891cc12b3d975ec300a1a846c969
-
SHA1
b4c1907c74fbf45e91f5a648491ea7a751246d11
-
SHA256
d39cdd125be8be319e9e290012f8907fbb6dff000199f23eab95e47c3d8d898c
-
SHA512
21654dce6fd3c65f5b069056f0b5c2ae23f85677b4ed8051696e650606c722ecd0a75ed2333b241cb1f7d7fa6eb6ceaa83a36f64062c0fc8c9f8956bd94dfbb9
-
SSDEEP
24576:FL1blM9t2yTLishphbtEZ+JNP+jK37K3evi91ei:FLY9Ve+v93Fa9
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 61 IoCs
resource yara_rule behavioral1/memory/1660-2-0x0000000003690000-0x0000000004690000-memory.dmp modiloader_stage2 behavioral1/memory/1660-6-0x0000000003690000-0x0000000004690000-memory.dmp modiloader_stage2 behavioral1/memory/1660-7-0x0000000003690000-0x0000000004690000-memory.dmp modiloader_stage2 behavioral1/memory/1660-9-0x0000000003690000-0x0000000004690000-memory.dmp modiloader_stage2 behavioral1/memory/1660-13-0x0000000003690000-0x0000000004690000-memory.dmp modiloader_stage2 behavioral1/memory/1660-16-0x0000000003690000-0x0000000004690000-memory.dmp modiloader_stage2 behavioral1/memory/1660-21-0x0000000003690000-0x0000000004690000-memory.dmp modiloader_stage2 behavioral1/memory/1660-25-0x0000000003690000-0x0000000004690000-memory.dmp modiloader_stage2 behavioral1/memory/1660-28-0x0000000003690000-0x0000000004690000-memory.dmp modiloader_stage2 behavioral1/memory/1660-32-0x0000000003690000-0x0000000004690000-memory.dmp modiloader_stage2 behavioral1/memory/1660-36-0x0000000003690000-0x0000000004690000-memory.dmp modiloader_stage2 behavioral1/memory/1660-40-0x0000000003690000-0x0000000004690000-memory.dmp modiloader_stage2 behavioral1/memory/1660-45-0x0000000003690000-0x0000000004690000-memory.dmp modiloader_stage2 behavioral1/memory/1660-12-0x0000000003690000-0x0000000004690000-memory.dmp modiloader_stage2 behavioral1/memory/1660-20-0x0000000003690000-0x0000000004690000-memory.dmp modiloader_stage2 behavioral1/memory/1660-19-0x0000000003690000-0x0000000004690000-memory.dmp modiloader_stage2 behavioral1/memory/1660-18-0x0000000003690000-0x0000000004690000-memory.dmp modiloader_stage2 behavioral1/memory/1660-17-0x0000000003690000-0x0000000004690000-memory.dmp modiloader_stage2 behavioral1/memory/1660-15-0x0000000003690000-0x0000000004690000-memory.dmp modiloader_stage2 behavioral1/memory/1660-14-0x0000000003690000-0x0000000004690000-memory.dmp modiloader_stage2 behavioral1/memory/1660-11-0x0000000003690000-0x0000000004690000-memory.dmp modiloader_stage2 behavioral1/memory/1660-85-0x0000000003690000-0x0000000004690000-memory.dmp modiloader_stage2 behavioral1/memory/1660-10-0x0000000003690000-0x0000000004690000-memory.dmp modiloader_stage2 behavioral1/memory/1660-8-0x0000000003690000-0x0000000004690000-memory.dmp modiloader_stage2 behavioral1/memory/1660-84-0x0000000003690000-0x0000000004690000-memory.dmp modiloader_stage2 behavioral1/memory/1660-83-0x0000000003690000-0x0000000004690000-memory.dmp modiloader_stage2 behavioral1/memory/1660-82-0x0000000003690000-0x0000000004690000-memory.dmp modiloader_stage2 behavioral1/memory/1660-81-0x0000000003690000-0x0000000004690000-memory.dmp modiloader_stage2 behavioral1/memory/1660-80-0x0000000003690000-0x0000000004690000-memory.dmp modiloader_stage2 behavioral1/memory/1660-79-0x0000000003690000-0x0000000004690000-memory.dmp modiloader_stage2 behavioral1/memory/1660-78-0x0000000003690000-0x0000000004690000-memory.dmp modiloader_stage2 behavioral1/memory/1660-77-0x0000000003690000-0x0000000004690000-memory.dmp modiloader_stage2 behavioral1/memory/1660-76-0x0000000003690000-0x0000000004690000-memory.dmp modiloader_stage2 behavioral1/memory/1660-75-0x0000000003690000-0x0000000004690000-memory.dmp modiloader_stage2 behavioral1/memory/1660-74-0x0000000003690000-0x0000000004690000-memory.dmp modiloader_stage2 behavioral1/memory/1660-73-0x0000000003690000-0x0000000004690000-memory.dmp modiloader_stage2 behavioral1/memory/1660-72-0x0000000003690000-0x0000000004690000-memory.dmp modiloader_stage2 behavioral1/memory/1660-71-0x0000000003690000-0x0000000004690000-memory.dmp modiloader_stage2 behavioral1/memory/1660-70-0x0000000003690000-0x0000000004690000-memory.dmp modiloader_stage2 behavioral1/memory/1660-69-0x0000000003690000-0x0000000004690000-memory.dmp modiloader_stage2 behavioral1/memory/1660-68-0x0000000003690000-0x0000000004690000-memory.dmp modiloader_stage2 behavioral1/memory/1660-67-0x0000000003690000-0x0000000004690000-memory.dmp modiloader_stage2 behavioral1/memory/1660-66-0x0000000003690000-0x0000000004690000-memory.dmp modiloader_stage2 behavioral1/memory/1660-65-0x0000000003690000-0x0000000004690000-memory.dmp modiloader_stage2 behavioral1/memory/1660-64-0x0000000003690000-0x0000000004690000-memory.dmp modiloader_stage2 behavioral1/memory/1660-63-0x0000000003690000-0x0000000004690000-memory.dmp modiloader_stage2 behavioral1/memory/1660-62-0x0000000003690000-0x0000000004690000-memory.dmp modiloader_stage2 behavioral1/memory/1660-61-0x0000000003690000-0x0000000004690000-memory.dmp modiloader_stage2 behavioral1/memory/1660-60-0x0000000003690000-0x0000000004690000-memory.dmp modiloader_stage2 behavioral1/memory/1660-59-0x0000000003690000-0x0000000004690000-memory.dmp modiloader_stage2 behavioral1/memory/1660-58-0x0000000003690000-0x0000000004690000-memory.dmp modiloader_stage2 behavioral1/memory/1660-57-0x0000000003690000-0x0000000004690000-memory.dmp modiloader_stage2 behavioral1/memory/1660-56-0x0000000003690000-0x0000000004690000-memory.dmp modiloader_stage2 behavioral1/memory/1660-55-0x0000000003690000-0x0000000004690000-memory.dmp modiloader_stage2 behavioral1/memory/1660-54-0x0000000003690000-0x0000000004690000-memory.dmp modiloader_stage2 behavioral1/memory/1660-53-0x0000000003690000-0x0000000004690000-memory.dmp modiloader_stage2 behavioral1/memory/1660-52-0x0000000003690000-0x0000000004690000-memory.dmp modiloader_stage2 behavioral1/memory/1660-51-0x0000000003690000-0x0000000004690000-memory.dmp modiloader_stage2 behavioral1/memory/1660-50-0x0000000003690000-0x0000000004690000-memory.dmp modiloader_stage2 behavioral1/memory/1660-49-0x0000000003690000-0x0000000004690000-memory.dmp modiloader_stage2 behavioral1/memory/1660-48-0x0000000003690000-0x0000000004690000-memory.dmp modiloader_stage2 -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 2 drive.google.com 4 drive.google.com -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d39cdd125be8be319e9e290012f8907fbb6dff000199f23eab95e47c3d8d898c.exe -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 4 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 6 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)