Analysis
-
max time kernel
116s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-12-2024 06:48
Behavioral task
behavioral1
Sample
b01a47c8562851b30cca233f6124d279c20b4c93ef99a64eaa9b1824ae5ccc4fN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b01a47c8562851b30cca233f6124d279c20b4c93ef99a64eaa9b1824ae5ccc4fN.exe
Resource
win10v2004-20241007-en
General
-
Target
b01a47c8562851b30cca233f6124d279c20b4c93ef99a64eaa9b1824ae5ccc4fN.exe
-
Size
376KB
-
MD5
f6c65d3d7783d6c6b21383e4ee50f6d0
-
SHA1
28f16d6c44991249b52af17e134649bfd1911ad6
-
SHA256
b01a47c8562851b30cca233f6124d279c20b4c93ef99a64eaa9b1824ae5ccc4f
-
SHA512
f9b5d9b1de92039f6c06994a7ac4dfaede3abf51e085fad07f52ae227910eab21e0e1c984812800debc90dccbd08698bb7c845c434a36a4766511173cc9bfa68
-
SSDEEP
6144:c9ctxJKFzDz8KFykipAjWnt7Q4VonPGgmFrrDciW1oreICFpz7K/obXko4:c6XKxYKBipBgBmFrrDcixeIkp6/GXko4
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral2/memory/4812-7-0x0000000000400000-0x0000000000418000-memory.dmp modiloader_stage2 -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts update1.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation b01a47c8562851b30cca233f6124d279c20b4c93ef99a64eaa9b1824ae5ccc4fN.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation update1.exe -
Executes dropped EXE 4 IoCs
pid Process 4256 update2.exe 2140 update1.exe 2996 update2.exe 1144 auditpol.exe -
Loads dropped DLL 1 IoCs
pid Process 1144 auditpol.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\auditpol = "C:\\Users\\Admin\\AppData\\Local\\auditpol.exe" update1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\auditpol = "C:\\Users\\Admin\\AppData\\Local\\auditpol.exe" update1.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4812 set thread context of 976 4812 b01a47c8562851b30cca233f6124d279c20b4c93ef99a64eaa9b1824ae5ccc4fN.exe 85 PID 4256 set thread context of 2996 4256 update2.exe 90 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b01a47c8562851b30cca233f6124d279c20b4c93ef99a64eaa9b1824ae5ccc4fN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language update2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language update1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language auditpol.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b01a47c8562851b30cca233f6124d279c20b4c93ef99a64eaa9b1824ae5ccc4fN.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ update1.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4256 update2.exe 1144 auditpol.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 4812 wrote to memory of 976 4812 b01a47c8562851b30cca233f6124d279c20b4c93ef99a64eaa9b1824ae5ccc4fN.exe 85 PID 4812 wrote to memory of 976 4812 b01a47c8562851b30cca233f6124d279c20b4c93ef99a64eaa9b1824ae5ccc4fN.exe 85 PID 4812 wrote to memory of 976 4812 b01a47c8562851b30cca233f6124d279c20b4c93ef99a64eaa9b1824ae5ccc4fN.exe 85 PID 4812 wrote to memory of 976 4812 b01a47c8562851b30cca233f6124d279c20b4c93ef99a64eaa9b1824ae5ccc4fN.exe 85 PID 4812 wrote to memory of 976 4812 b01a47c8562851b30cca233f6124d279c20b4c93ef99a64eaa9b1824ae5ccc4fN.exe 85 PID 4812 wrote to memory of 976 4812 b01a47c8562851b30cca233f6124d279c20b4c93ef99a64eaa9b1824ae5ccc4fN.exe 85 PID 4812 wrote to memory of 976 4812 b01a47c8562851b30cca233f6124d279c20b4c93ef99a64eaa9b1824ae5ccc4fN.exe 85 PID 976 wrote to memory of 4256 976 b01a47c8562851b30cca233f6124d279c20b4c93ef99a64eaa9b1824ae5ccc4fN.exe 86 PID 976 wrote to memory of 4256 976 b01a47c8562851b30cca233f6124d279c20b4c93ef99a64eaa9b1824ae5ccc4fN.exe 86 PID 976 wrote to memory of 4256 976 b01a47c8562851b30cca233f6124d279c20b4c93ef99a64eaa9b1824ae5ccc4fN.exe 86 PID 976 wrote to memory of 2140 976 b01a47c8562851b30cca233f6124d279c20b4c93ef99a64eaa9b1824ae5ccc4fN.exe 89 PID 976 wrote to memory of 2140 976 b01a47c8562851b30cca233f6124d279c20b4c93ef99a64eaa9b1824ae5ccc4fN.exe 89 PID 976 wrote to memory of 2140 976 b01a47c8562851b30cca233f6124d279c20b4c93ef99a64eaa9b1824ae5ccc4fN.exe 89 PID 4256 wrote to memory of 2996 4256 update2.exe 90 PID 4256 wrote to memory of 2996 4256 update2.exe 90 PID 4256 wrote to memory of 2996 4256 update2.exe 90 PID 4256 wrote to memory of 2996 4256 update2.exe 90 PID 4256 wrote to memory of 2996 4256 update2.exe 90 PID 4256 wrote to memory of 2996 4256 update2.exe 90 PID 4256 wrote to memory of 2996 4256 update2.exe 90 PID 4256 wrote to memory of 2996 4256 update2.exe 90 PID 2140 wrote to memory of 1144 2140 update1.exe 92 PID 2140 wrote to memory of 1144 2140 update1.exe 92 PID 2140 wrote to memory of 1144 2140 update1.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\b01a47c8562851b30cca233f6124d279c20b4c93ef99a64eaa9b1824ae5ccc4fN.exe"C:\Users\Admin\AppData\Local\Temp\b01a47c8562851b30cca233f6124d279c20b4c93ef99a64eaa9b1824ae5ccc4fN.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Users\Admin\AppData\Local\Temp\b01a47c8562851b30cca233f6124d279c20b4c93ef99a64eaa9b1824ae5ccc4fN.exeb01a47c8562851b30cca233f6124d279c20b4c93ef99a64eaa9b1824ae5ccc4fN.exe2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Users\Admin\AppData\Local\Temp\update2.exe"C:\Users\Admin\AppData\Local\Temp\update2.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Users\Admin\AppData\Local\Temp\update2.exeC:\Users\Admin\AppData\Local\Temp\update2.exe4⤵
- Executes dropped EXE
PID:2996
-
-
-
C:\Users\Admin\AppData\Local\Temp\update1.exe"C:\Users\Admin\AppData\Local\Temp\update1.exe"3⤵
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Users\Admin\AppData\Local\auditpol.exe"C:\Users\Admin\AppData\Local\auditpol.exe" C:\Users\Admin\AppData\Local\Temp\update1.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1144
-
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}1⤵
- System Location Discovery: System Language Discovery
PID:784
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD59f036c83663c4a3e5f5382adf6f32bcc
SHA1842870e3dfb3ee76e927d93c517f9753c872d751
SHA2564eeef6ad75578f995af8f662d5a33581fafb19de9b5dd1fb7d9294fa80172874
SHA512097b79b332810ff212fe59c60f2480c99538f8b0309c35c2955d9e5c677047569edadc8669cbf82ca21667ec71449f3e34542c8d24b065845efe228eaaae13c9
-
Filesize
24KB
MD591029d37cf86ecc5d58605676eab6643
SHA1e6b6bcd7bb30b8c8bb05489a89238eb4793c38fe
SHA256d4bda0161466452d3f75d14472720d95d168ac09e2d63fedef45538576f98e0b
SHA512377b33a534f955e48299f2532216482ee14ae17a4e52a44b2a40b98c4b274505e60fb1c07c61f4e84644644fd4757f8dcefc12359712fe53ad9e4122bd12961e
-
Filesize
884B
MD53f0493d494f1ca681c73976f4f97c262
SHA151766ebd206c8a62b3e1604fd64ac7be896fe909
SHA256aa4f8c0fff53953056dff9c26af2c2bb97245c32d523982981d307270f48a308
SHA512ea7a4717238285dbce3336d30410d8647ebfa37d858f92c555f8d0ce2722516ad435d2f8bad2359699fbfe84094b1464795f8657bf7d570aea761abef5027b6b
-
Filesize
144KB
MD5de8b2505379dc0690000155dc1d4b849
SHA1a9a703a20b6536d3d80f5e657b26c409e00c4162
SHA256f3e0cb8e1603b70209208e67961d9c5cc0b07e31e1cfebcffb2603218ab7dd50
SHA5129d1ec27407edc66867083bb27d3f6fa37040948ebdf19a9ab55dc280d33c5525294a92ccde24dbb0985e67aba058080a169a52531a081a6d0cb46cf41e5ff2d8
-
Filesize
159KB
MD570f92610b1bd700ff472997dfecb689c
SHA1ddac19bc8d97f9ac1d1c754b7193eac5f4b249f7
SHA256bd30f98ffb8d8cfb4868253e51d5a5927aeb53ac4d9e431a4ba8fc3517a76423
SHA512564003358a8fdb727838f5962af9c25cca1b5e7b8021e7e74babf14fc12d989414ff77f81918784fdf684cb8c19b82ffcacee3a0fa1e85001fc1ee6b614124bb