Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2024, 03:02
Static task
static1
Behavioral task
behavioral1
Sample
d39cdd125be8be319e9e290012f8907fbb6dff000199f23eab95e47c3d8d898c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d39cdd125be8be319e9e290012f8907fbb6dff000199f23eab95e47c3d8d898c.exe
Resource
win10v2004-20241007-en
General
-
Target
d39cdd125be8be319e9e290012f8907fbb6dff000199f23eab95e47c3d8d898c.exe
-
Size
1.3MB
-
MD5
34b4891cc12b3d975ec300a1a846c969
-
SHA1
b4c1907c74fbf45e91f5a648491ea7a751246d11
-
SHA256
d39cdd125be8be319e9e290012f8907fbb6dff000199f23eab95e47c3d8d898c
-
SHA512
21654dce6fd3c65f5b069056f0b5c2ae23f85677b4ed8051696e650606c722ecd0a75ed2333b241cb1f7d7fa6eb6ceaa83a36f64062c0fc8c9f8956bd94dfbb9
-
SSDEEP
24576:FL1blM9t2yTLishphbtEZ+JNP+jK37K3evi91ei:FLY9Ve+v93Fa9
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 61 IoCs
resource yara_rule behavioral2/memory/3356-2-0x0000000002E60000-0x0000000003E60000-memory.dmp modiloader_stage2 behavioral2/memory/3356-7-0x0000000002E60000-0x0000000003E60000-memory.dmp modiloader_stage2 behavioral2/memory/3356-10-0x0000000002E60000-0x0000000003E60000-memory.dmp modiloader_stage2 behavioral2/memory/3356-16-0x0000000002E60000-0x0000000003E60000-memory.dmp modiloader_stage2 behavioral2/memory/3356-55-0x0000000002E60000-0x0000000003E60000-memory.dmp modiloader_stage2 behavioral2/memory/3356-53-0x0000000002E60000-0x0000000003E60000-memory.dmp modiloader_stage2 behavioral2/memory/3356-28-0x0000000002E60000-0x0000000003E60000-memory.dmp modiloader_stage2 behavioral2/memory/3356-27-0x0000000002E60000-0x0000000003E60000-memory.dmp modiloader_stage2 behavioral2/memory/3356-56-0x0000000002E60000-0x0000000003E60000-memory.dmp modiloader_stage2 behavioral2/memory/3356-66-0x0000000002E60000-0x0000000003E60000-memory.dmp modiloader_stage2 behavioral2/memory/3356-64-0x0000000002E60000-0x0000000003E60000-memory.dmp modiloader_stage2 behavioral2/memory/3356-61-0x0000000002E60000-0x0000000003E60000-memory.dmp modiloader_stage2 behavioral2/memory/3356-60-0x0000000002E60000-0x0000000003E60000-memory.dmp modiloader_stage2 behavioral2/memory/3356-58-0x0000000002E60000-0x0000000003E60000-memory.dmp modiloader_stage2 behavioral2/memory/3356-57-0x0000000002E60000-0x0000000003E60000-memory.dmp modiloader_stage2 behavioral2/memory/3356-54-0x0000000002E60000-0x0000000003E60000-memory.dmp modiloader_stage2 behavioral2/memory/3356-52-0x0000000002E60000-0x0000000003E60000-memory.dmp modiloader_stage2 behavioral2/memory/3356-50-0x0000000002E60000-0x0000000003E60000-memory.dmp modiloader_stage2 behavioral2/memory/3356-48-0x0000000002E60000-0x0000000003E60000-memory.dmp modiloader_stage2 behavioral2/memory/3356-47-0x0000000002E60000-0x0000000003E60000-memory.dmp modiloader_stage2 behavioral2/memory/3356-45-0x0000000002E60000-0x0000000003E60000-memory.dmp modiloader_stage2 behavioral2/memory/3356-43-0x0000000002E60000-0x0000000003E60000-memory.dmp modiloader_stage2 behavioral2/memory/3356-40-0x0000000002E60000-0x0000000003E60000-memory.dmp modiloader_stage2 behavioral2/memory/3356-37-0x0000000002E60000-0x0000000003E60000-memory.dmp modiloader_stage2 behavioral2/memory/3356-65-0x0000000002E60000-0x0000000003E60000-memory.dmp modiloader_stage2 behavioral2/memory/3356-33-0x0000000002E60000-0x0000000003E60000-memory.dmp modiloader_stage2 behavioral2/memory/3356-63-0x0000000002E60000-0x0000000003E60000-memory.dmp modiloader_stage2 behavioral2/memory/3356-32-0x0000000002E60000-0x0000000003E60000-memory.dmp modiloader_stage2 behavioral2/memory/3356-62-0x0000000002E60000-0x0000000003E60000-memory.dmp modiloader_stage2 behavioral2/memory/3356-59-0x0000000002E60000-0x0000000003E60000-memory.dmp modiloader_stage2 behavioral2/memory/3356-31-0x0000000002E60000-0x0000000003E60000-memory.dmp modiloader_stage2 behavioral2/memory/3356-51-0x0000000002E60000-0x0000000003E60000-memory.dmp modiloader_stage2 behavioral2/memory/3356-49-0x0000000002E60000-0x0000000003E60000-memory.dmp modiloader_stage2 behavioral2/memory/3356-46-0x0000000002E60000-0x0000000003E60000-memory.dmp modiloader_stage2 behavioral2/memory/3356-25-0x0000000002E60000-0x0000000003E60000-memory.dmp modiloader_stage2 behavioral2/memory/3356-24-0x0000000002E60000-0x0000000003E60000-memory.dmp modiloader_stage2 behavioral2/memory/3356-44-0x0000000002E60000-0x0000000003E60000-memory.dmp modiloader_stage2 behavioral2/memory/3356-23-0x0000000002E60000-0x0000000003E60000-memory.dmp modiloader_stage2 behavioral2/memory/3356-42-0x0000000002E60000-0x0000000003E60000-memory.dmp modiloader_stage2 behavioral2/memory/3356-22-0x0000000002E60000-0x0000000003E60000-memory.dmp modiloader_stage2 behavioral2/memory/3356-41-0x0000000002E60000-0x0000000003E60000-memory.dmp modiloader_stage2 behavioral2/memory/3356-39-0x0000000002E60000-0x0000000003E60000-memory.dmp modiloader_stage2 behavioral2/memory/3356-21-0x0000000002E60000-0x0000000003E60000-memory.dmp modiloader_stage2 behavioral2/memory/3356-38-0x0000000002E60000-0x0000000003E60000-memory.dmp modiloader_stage2 behavioral2/memory/3356-20-0x0000000002E60000-0x0000000003E60000-memory.dmp modiloader_stage2 behavioral2/memory/3356-36-0x0000000002E60000-0x0000000003E60000-memory.dmp modiloader_stage2 behavioral2/memory/3356-35-0x0000000002E60000-0x0000000003E60000-memory.dmp modiloader_stage2 behavioral2/memory/3356-19-0x0000000002E60000-0x0000000003E60000-memory.dmp modiloader_stage2 behavioral2/memory/3356-18-0x0000000002E60000-0x0000000003E60000-memory.dmp modiloader_stage2 behavioral2/memory/3356-34-0x0000000002E60000-0x0000000003E60000-memory.dmp modiloader_stage2 behavioral2/memory/3356-17-0x0000000002E60000-0x0000000003E60000-memory.dmp modiloader_stage2 behavioral2/memory/3356-30-0x0000000002E60000-0x0000000003E60000-memory.dmp modiloader_stage2 behavioral2/memory/3356-29-0x0000000002E60000-0x0000000003E60000-memory.dmp modiloader_stage2 behavioral2/memory/3356-15-0x0000000002E60000-0x0000000003E60000-memory.dmp modiloader_stage2 behavioral2/memory/3356-26-0x0000000002E60000-0x0000000003E60000-memory.dmp modiloader_stage2 behavioral2/memory/3356-14-0x0000000002E60000-0x0000000003E60000-memory.dmp modiloader_stage2 behavioral2/memory/3356-13-0x0000000002E60000-0x0000000003E60000-memory.dmp modiloader_stage2 behavioral2/memory/3356-12-0x0000000002E60000-0x0000000003E60000-memory.dmp modiloader_stage2 behavioral2/memory/3356-11-0x0000000002E60000-0x0000000003E60000-memory.dmp modiloader_stage2 behavioral2/memory/3356-9-0x0000000002E60000-0x0000000003E60000-memory.dmp modiloader_stage2 behavioral2/memory/3356-8-0x0000000002E60000-0x0000000003E60000-memory.dmp modiloader_stage2 -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 15 drive.google.com 17 drive.google.com -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d39cdd125be8be319e9e290012f8907fbb6dff000199f23eab95e47c3d8d898c.exe -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 17 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 19 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)