Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2024 09:25
Static task
static1
Behavioral task
behavioral1
Sample
b8ce7b8f60bb42477ea6bba32_JC.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
b8ce7b8f60bb42477ea6bba32_JC.exe
Resource
win10v2004-20241007-en
General
-
Target
b8ce7b8f60bb42477ea6bba32_JC.exe
-
Size
1.5MB
-
MD5
0d4b25a33c69e4443f28a43ae3b015c9
-
SHA1
92267c25dc62805bdfff9497174bf91feec90f2c
-
SHA256
869eb1b44b9d5e0ee5b99b1189edd21d706c58094387ba32ebf2aa45703a9c9b
-
SHA512
f628aaa5e739534b6e7833f44ca96e3a83dc83aac026b0f75c3919e937ed468d18764f1b2347995822e98d3eb6c6797524c0c28d4c6371f3a9c57dab0eac9e1f
-
SSDEEP
24576:rbGHGrOrQ9gnMC6LO3cQoikKgti8PM2MCUrTDLwVIf2IOXkDtZ3NptsNbJZ:rbGWAJeDingti8P+TwSNO0n9vwbJZ
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
Suspicious use of NtCreateProcessOtherParentProcess 1 IoCs
description pid Process PID 1200 created 0 1200 b8ce7b8f60bb42477ea6bba32_JC.exe -
ModiLoader Second Stage 62 IoCs
resource yara_rule behavioral2/memory/1200-78-0x0000000002370000-0x00000000023A1000-memory.dmp modiloader_stage2 behavioral2/memory/1200-123-0x0000000002370000-0x00000000023A1000-memory.dmp modiloader_stage2 behavioral2/memory/1200-122-0x0000000002370000-0x00000000023A1000-memory.dmp modiloader_stage2 behavioral2/memory/1200-129-0x0000000002370000-0x00000000023A1000-memory.dmp modiloader_stage2 behavioral2/memory/1200-131-0x0000000002370000-0x00000000023A1000-memory.dmp modiloader_stage2 behavioral2/memory/1200-140-0x0000000002370000-0x00000000023A1000-memory.dmp modiloader_stage2 behavioral2/memory/1200-139-0x0000000002370000-0x00000000023A1000-memory.dmp modiloader_stage2 behavioral2/memory/1200-138-0x0000000002370000-0x00000000023A1000-memory.dmp modiloader_stage2 behavioral2/memory/1200-137-0x0000000002370000-0x00000000023A1000-memory.dmp modiloader_stage2 behavioral2/memory/1200-136-0x0000000002370000-0x00000000023A1000-memory.dmp modiloader_stage2 behavioral2/memory/1200-135-0x0000000002370000-0x00000000023A1000-memory.dmp modiloader_stage2 behavioral2/memory/1200-134-0x0000000002370000-0x00000000023A1000-memory.dmp modiloader_stage2 behavioral2/memory/1200-133-0x0000000002370000-0x00000000023A1000-memory.dmp modiloader_stage2 behavioral2/memory/1200-132-0x0000000002370000-0x00000000023A1000-memory.dmp modiloader_stage2 behavioral2/memory/1200-130-0x0000000002370000-0x00000000023A1000-memory.dmp modiloader_stage2 behavioral2/memory/1200-128-0x0000000002370000-0x00000000023A1000-memory.dmp modiloader_stage2 behavioral2/memory/1200-127-0x0000000002370000-0x00000000023A1000-memory.dmp modiloader_stage2 behavioral2/memory/1200-126-0x0000000002370000-0x00000000023A1000-memory.dmp modiloader_stage2 behavioral2/memory/1200-124-0x0000000002370000-0x00000000023A1000-memory.dmp modiloader_stage2 behavioral2/memory/1200-125-0x0000000002370000-0x00000000023A1000-memory.dmp modiloader_stage2 behavioral2/memory/1200-141-0x0000000002370000-0x00000000023A1000-memory.dmp modiloader_stage2 behavioral2/memory/1200-142-0x0000000002370000-0x00000000023A1000-memory.dmp modiloader_stage2 behavioral2/memory/1200-144-0x0000000002370000-0x00000000023A1000-memory.dmp modiloader_stage2 behavioral2/memory/1200-146-0x0000000002370000-0x00000000023A1000-memory.dmp modiloader_stage2 behavioral2/memory/1200-147-0x0000000002370000-0x00000000023A1000-memory.dmp modiloader_stage2 behavioral2/memory/1200-145-0x0000000002370000-0x00000000023A1000-memory.dmp modiloader_stage2 behavioral2/memory/1200-143-0x0000000002370000-0x00000000023A1000-memory.dmp modiloader_stage2 behavioral2/memory/1200-149-0x0000000002370000-0x00000000023A1000-memory.dmp modiloader_stage2 behavioral2/memory/1200-151-0x0000000002370000-0x00000000023A1000-memory.dmp modiloader_stage2 behavioral2/memory/1200-154-0x0000000002370000-0x00000000023A1000-memory.dmp modiloader_stage2 behavioral2/memory/1200-153-0x0000000002370000-0x00000000023A1000-memory.dmp modiloader_stage2 behavioral2/memory/1200-152-0x0000000002370000-0x00000000023A1000-memory.dmp modiloader_stage2 behavioral2/memory/1200-150-0x0000000002370000-0x00000000023A1000-memory.dmp modiloader_stage2 behavioral2/memory/1200-148-0x0000000002370000-0x00000000023A1000-memory.dmp modiloader_stage2 behavioral2/memory/1200-157-0x0000000002370000-0x00000000023A1000-memory.dmp modiloader_stage2 behavioral2/memory/1200-159-0x0000000002370000-0x00000000023A1000-memory.dmp modiloader_stage2 behavioral2/memory/1200-158-0x0000000002370000-0x00000000023A1000-memory.dmp modiloader_stage2 behavioral2/memory/1200-156-0x0000000002370000-0x00000000023A1000-memory.dmp modiloader_stage2 behavioral2/memory/1200-155-0x0000000002370000-0x00000000023A1000-memory.dmp modiloader_stage2 behavioral2/memory/1200-161-0x0000000002370000-0x00000000023A1000-memory.dmp modiloader_stage2 behavioral2/memory/1200-160-0x0000000002370000-0x00000000023A1000-memory.dmp modiloader_stage2 behavioral2/memory/1200-162-0x0000000002370000-0x00000000023A1000-memory.dmp modiloader_stage2 behavioral2/memory/1200-163-0x0000000002370000-0x00000000023A1000-memory.dmp modiloader_stage2 behavioral2/memory/1200-165-0x0000000002370000-0x00000000023A1000-memory.dmp modiloader_stage2 behavioral2/memory/1200-164-0x0000000002370000-0x00000000023A1000-memory.dmp modiloader_stage2 behavioral2/memory/1200-167-0x0000000002370000-0x00000000023A1000-memory.dmp modiloader_stage2 behavioral2/memory/1200-169-0x0000000002370000-0x00000000023A1000-memory.dmp modiloader_stage2 behavioral2/memory/1200-168-0x0000000002370000-0x00000000023A1000-memory.dmp modiloader_stage2 behavioral2/memory/1200-166-0x0000000002370000-0x00000000023A1000-memory.dmp modiloader_stage2 behavioral2/memory/1200-171-0x0000000002370000-0x00000000023A1000-memory.dmp modiloader_stage2 behavioral2/memory/1200-172-0x0000000002370000-0x00000000023A1000-memory.dmp modiloader_stage2 behavioral2/memory/1200-174-0x0000000002370000-0x00000000023A1000-memory.dmp modiloader_stage2 behavioral2/memory/1200-173-0x0000000002370000-0x00000000023A1000-memory.dmp modiloader_stage2 behavioral2/memory/1200-170-0x0000000002370000-0x00000000023A1000-memory.dmp modiloader_stage2 behavioral2/memory/1200-177-0x0000000002370000-0x00000000023A1000-memory.dmp modiloader_stage2 behavioral2/memory/1200-176-0x0000000002370000-0x00000000023A1000-memory.dmp modiloader_stage2 behavioral2/memory/1200-175-0x0000000002370000-0x00000000023A1000-memory.dmp modiloader_stage2 behavioral2/memory/1200-179-0x0000000002370000-0x00000000023A1000-memory.dmp modiloader_stage2 behavioral2/memory/1200-180-0x0000000002370000-0x00000000023A1000-memory.dmp modiloader_stage2 behavioral2/memory/1200-181-0x0000000002370000-0x00000000023A1000-memory.dmp modiloader_stage2 behavioral2/memory/1200-178-0x0000000002370000-0x00000000023A1000-memory.dmp modiloader_stage2 behavioral2/memory/1200-182-0x0000000002370000-0x00000000023A1000-memory.dmp modiloader_stage2 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Vewxaunn = "C:\\Users\\Public\\Vewxaunn.url" b8ce7b8f60bb42477ea6bba32_JC.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1916 1200 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b8ce7b8f60bb42477ea6bba32_JC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language logagent.exe -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 17 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 19 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1200 b8ce7b8f60bb42477ea6bba32_JC.exe 1200 b8ce7b8f60bb42477ea6bba32_JC.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1200 wrote to memory of 4644 1200 b8ce7b8f60bb42477ea6bba32_JC.exe 93 PID 1200 wrote to memory of 4644 1200 b8ce7b8f60bb42477ea6bba32_JC.exe 93 PID 1200 wrote to memory of 4644 1200 b8ce7b8f60bb42477ea6bba32_JC.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8ce7b8f60bb42477ea6bba32_JC.exe"C:\Users\Admin\AppData\Local\Temp\b8ce7b8f60bb42477ea6bba32_JC.exe"1⤵
- Suspicious use of NtCreateProcessOtherParentProcess
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\SysWOW64\logagent.exeC:\Windows\System32\logagent.exe2⤵
- System Location Discovery: System Language Discovery
PID:4644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1200 -s 17522⤵
- Program crash
PID:1916
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1200 -ip 12001⤵PID:2360