Analysis
-
max time kernel
140s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-12-2024 21:46
Behavioral task
behavioral1
Sample
e8efbb14a3fdb433e11f64993092a18c0c6605ef10f655cdf7dabf2d4a951e5e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e8efbb14a3fdb433e11f64993092a18c0c6605ef10f655cdf7dabf2d4a951e5e.exe
Resource
win10v2004-20241007-en
General
-
Target
e8efbb14a3fdb433e11f64993092a18c0c6605ef10f655cdf7dabf2d4a951e5e.exe
-
Size
2.2MB
-
MD5
88f65230b988517b529f15ee1f173b3c
-
SHA1
5dd29ced644415f87d106b340eba656eb9eae311
-
SHA256
e8efbb14a3fdb433e11f64993092a18c0c6605ef10f655cdf7dabf2d4a951e5e
-
SHA512
46ac27d80b61939f0fef7d5493866274f95494bcfb855751d8b82d6677ef2aef1d6fc9f26b1dbeb217277abe4408ccbc3c75dfc37bc552f31085dc31e99e0c91
-
SSDEEP
49152:4n7JG9CyViR+Y9ZYVCiIrNDctSXXEeXzAAAL:yV+C0nYoItyg9AL
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader First Stage 4 IoCs
resource yara_rule behavioral2/memory/3252-3-0x0000000000400000-0x000000000098F000-memory.dmp modiloader_stage1 behavioral2/memory/3252-7-0x0000000000400000-0x000000000098F000-memory.dmp modiloader_stage1 behavioral2/memory/3252-11-0x0000000000400000-0x000000000098F000-memory.dmp modiloader_stage1 behavioral2/memory/3252-13-0x0000000000400000-0x000000000098F000-memory.dmp modiloader_stage1 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e8efbb14a3fdb433e11f64993092a18c0c6605ef10f655cdf7dabf2d4a951e5e.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{237561AB-1162-5837-1307-251216710420}\Info e8efbb14a3fdb433e11f64993092a18c0c6605ef10f655cdf7dabf2d4a951e5e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node e8efbb14a3fdb433e11f64993092a18c0c6605ef10f655cdf7dabf2d4a951e5e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID e8efbb14a3fdb433e11f64993092a18c0c6605ef10f655cdf7dabf2d4a951e5e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{237561AB-1162-5837-1307-251216710420} e8efbb14a3fdb433e11f64993092a18c0c6605ef10f655cdf7dabf2d4a951e5e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{237561AB-1162-5837-1307-251216710420}\Info e8efbb14a3fdb433e11f64993092a18c0c6605ef10f655cdf7dabf2d4a951e5e.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{237561AB-1162-5837-1307-251216710420}\Info\Data = 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 e8efbb14a3fdb433e11f64993092a18c0c6605ef10f655cdf7dabf2d4a951e5e.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3252 e8efbb14a3fdb433e11f64993092a18c0c6605ef10f655cdf7dabf2d4a951e5e.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3252 e8efbb14a3fdb433e11f64993092a18c0c6605ef10f655cdf7dabf2d4a951e5e.exe 3252 e8efbb14a3fdb433e11f64993092a18c0c6605ef10f655cdf7dabf2d4a951e5e.exe 3252 e8efbb14a3fdb433e11f64993092a18c0c6605ef10f655cdf7dabf2d4a951e5e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8efbb14a3fdb433e11f64993092a18c0c6605ef10f655cdf7dabf2d4a951e5e.exe"C:\Users\Admin\AppData\Local\Temp\e8efbb14a3fdb433e11f64993092a18c0c6605ef10f655cdf7dabf2d4a951e5e.exe"1⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3252