Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
19-12-2024 04:17
Static task
static1
Behavioral task
behavioral1
Sample
e11e4469c9c003f2b0074deada876e15f30afccae6178c5317e16cf5e6ee1ff6.bat
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
e11e4469c9c003f2b0074deada876e15f30afccae6178c5317e16cf5e6ee1ff6.bat
Resource
win10v2004-20241007-en
General
-
Target
e11e4469c9c003f2b0074deada876e15f30afccae6178c5317e16cf5e6ee1ff6.bat
-
Size
2.8MB
-
MD5
0bdc3aeffe000c9c0c73a3faa2d001d8
-
SHA1
1c8bc96bd0e00b21d734f936aeaea1e612442912
-
SHA256
e11e4469c9c003f2b0074deada876e15f30afccae6178c5317e16cf5e6ee1ff6
-
SHA512
6e577ecc9f09a106bfc32f81ece6e3277f3c02622d12205da0d8efbaf5602d86b6556ed2df576bad9de48c7908122d8ae35008c65ad868822b25b6543865fe83
-
SSDEEP
24576:kH1yveXvtJNwYay5+kiD7Dm5c0B58llll8lUWtWJxM9bhHNfbTXr063u95fX7:kVyGftJ+YawbiS5BBUvzM9bhHNfnXm
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 61 IoCs
resource yara_rule behavioral1/memory/2468-33-0x0000000002910000-0x0000000003910000-memory.dmp modiloader_stage2 behavioral1/memory/2468-38-0x0000000002910000-0x0000000003910000-memory.dmp modiloader_stage2 behavioral1/memory/2468-39-0x0000000002910000-0x0000000003910000-memory.dmp modiloader_stage2 behavioral1/memory/2468-40-0x0000000002910000-0x0000000003910000-memory.dmp modiloader_stage2 behavioral1/memory/2468-41-0x0000000002910000-0x0000000003910000-memory.dmp modiloader_stage2 behavioral1/memory/2468-42-0x0000000002910000-0x0000000003910000-memory.dmp modiloader_stage2 behavioral1/memory/2468-45-0x0000000002910000-0x0000000003910000-memory.dmp modiloader_stage2 behavioral1/memory/2468-49-0x0000000002910000-0x0000000003910000-memory.dmp modiloader_stage2 behavioral1/memory/2468-53-0x0000000002910000-0x0000000003910000-memory.dmp modiloader_stage2 behavioral1/memory/2468-51-0x0000000002910000-0x0000000003910000-memory.dmp modiloader_stage2 behavioral1/memory/2468-56-0x0000000002910000-0x0000000003910000-memory.dmp modiloader_stage2 behavioral1/memory/2468-63-0x0000000002910000-0x0000000003910000-memory.dmp modiloader_stage2 behavioral1/memory/2468-60-0x0000000002910000-0x0000000003910000-memory.dmp modiloader_stage2 behavioral1/memory/2468-68-0x0000000002910000-0x0000000003910000-memory.dmp modiloader_stage2 behavioral1/memory/2468-65-0x0000000002910000-0x0000000003910000-memory.dmp modiloader_stage2 behavioral1/memory/2468-75-0x0000000002910000-0x0000000003910000-memory.dmp modiloader_stage2 behavioral1/memory/2468-80-0x0000000002910000-0x0000000003910000-memory.dmp modiloader_stage2 behavioral1/memory/2468-77-0x0000000002910000-0x0000000003910000-memory.dmp modiloader_stage2 behavioral1/memory/2468-85-0x0000000002910000-0x0000000003910000-memory.dmp modiloader_stage2 behavioral1/memory/2468-82-0x0000000002910000-0x0000000003910000-memory.dmp modiloader_stage2 behavioral1/memory/2468-72-0x0000000002910000-0x0000000003910000-memory.dmp modiloader_stage2 behavioral1/memory/2468-70-0x0000000002910000-0x0000000003910000-memory.dmp modiloader_stage2 behavioral1/memory/2468-58-0x0000000002910000-0x0000000003910000-memory.dmp modiloader_stage2 behavioral1/memory/2468-87-0x0000000002910000-0x0000000003910000-memory.dmp modiloader_stage2 behavioral1/memory/2468-89-0x0000000002910000-0x0000000003910000-memory.dmp modiloader_stage2 behavioral1/memory/2468-94-0x0000000002910000-0x0000000003910000-memory.dmp modiloader_stage2 behavioral1/memory/2468-92-0x0000000002910000-0x0000000003910000-memory.dmp modiloader_stage2 behavioral1/memory/2468-96-0x0000000002910000-0x0000000003910000-memory.dmp modiloader_stage2 behavioral1/memory/2468-99-0x0000000002910000-0x0000000003910000-memory.dmp modiloader_stage2 behavioral1/memory/2468-101-0x0000000002910000-0x0000000003910000-memory.dmp modiloader_stage2 behavioral1/memory/2468-103-0x0000000002910000-0x0000000003910000-memory.dmp modiloader_stage2 behavioral1/memory/2468-106-0x0000000002910000-0x0000000003910000-memory.dmp modiloader_stage2 behavioral1/memory/2468-108-0x0000000002910000-0x0000000003910000-memory.dmp modiloader_stage2 behavioral1/memory/2468-110-0x0000000002910000-0x0000000003910000-memory.dmp modiloader_stage2 behavioral1/memory/2468-113-0x0000000002910000-0x0000000003910000-memory.dmp modiloader_stage2 behavioral1/memory/2468-115-0x0000000002910000-0x0000000003910000-memory.dmp modiloader_stage2 behavioral1/memory/2468-81-0x0000000002910000-0x0000000003910000-memory.dmp modiloader_stage2 behavioral1/memory/2468-79-0x0000000002910000-0x0000000003910000-memory.dmp modiloader_stage2 behavioral1/memory/2468-78-0x0000000002910000-0x0000000003910000-memory.dmp modiloader_stage2 behavioral1/memory/2468-76-0x0000000002910000-0x0000000003910000-memory.dmp modiloader_stage2 behavioral1/memory/2468-74-0x0000000002910000-0x0000000003910000-memory.dmp modiloader_stage2 behavioral1/memory/2468-73-0x0000000002910000-0x0000000003910000-memory.dmp modiloader_stage2 behavioral1/memory/2468-71-0x0000000002910000-0x0000000003910000-memory.dmp modiloader_stage2 behavioral1/memory/2468-69-0x0000000002910000-0x0000000003910000-memory.dmp modiloader_stage2 behavioral1/memory/2468-66-0x0000000002910000-0x0000000003910000-memory.dmp modiloader_stage2 behavioral1/memory/2468-67-0x0000000002910000-0x0000000003910000-memory.dmp modiloader_stage2 behavioral1/memory/2468-64-0x0000000002910000-0x0000000003910000-memory.dmp modiloader_stage2 behavioral1/memory/2468-62-0x0000000002910000-0x0000000003910000-memory.dmp modiloader_stage2 behavioral1/memory/2468-61-0x0000000002910000-0x0000000003910000-memory.dmp modiloader_stage2 behavioral1/memory/2468-59-0x0000000002910000-0x0000000003910000-memory.dmp modiloader_stage2 behavioral1/memory/2468-57-0x0000000002910000-0x0000000003910000-memory.dmp modiloader_stage2 behavioral1/memory/2468-55-0x0000000002910000-0x0000000003910000-memory.dmp modiloader_stage2 behavioral1/memory/2468-54-0x0000000002910000-0x0000000003910000-memory.dmp modiloader_stage2 behavioral1/memory/2468-52-0x0000000002910000-0x0000000003910000-memory.dmp modiloader_stage2 behavioral1/memory/2468-50-0x0000000002910000-0x0000000003910000-memory.dmp modiloader_stage2 behavioral1/memory/2468-48-0x0000000002910000-0x0000000003910000-memory.dmp modiloader_stage2 behavioral1/memory/2468-47-0x0000000002910000-0x0000000003910000-memory.dmp modiloader_stage2 behavioral1/memory/2468-117-0x0000000002910000-0x0000000003910000-memory.dmp modiloader_stage2 behavioral1/memory/2468-46-0x0000000002910000-0x0000000003910000-memory.dmp modiloader_stage2 behavioral1/memory/2468-44-0x0000000002910000-0x0000000003910000-memory.dmp modiloader_stage2 behavioral1/memory/2468-43-0x0000000002910000-0x0000000003910000-memory.dmp modiloader_stage2 -
Executes dropped EXE 8 IoCs
pid Process 2080 alpha.exe 2520 alpha.exe 2340 kn.exe 2536 alpha.exe 760 kn.exe 2468 spoolsv.COM 2092 alpha.exe 2872 alpha.exe -
Loads dropped DLL 8 IoCs
pid Process 2036 cmd.exe 2036 cmd.exe 2520 alpha.exe 2036 cmd.exe 2536 alpha.exe 2036 cmd.exe 1488 WerFault.exe 1488 WerFault.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 bitbucket.org 2 bitbucket.org -
Program crash 1 IoCs
pid pid_target Process procid_target 1488 2468 WerFault.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.COM -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 2468 spoolsv.COM -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 2036 wrote to memory of 2028 2036 cmd.exe 31 PID 2036 wrote to memory of 2028 2036 cmd.exe 31 PID 2036 wrote to memory of 2028 2036 cmd.exe 31 PID 2036 wrote to memory of 2080 2036 cmd.exe 32 PID 2036 wrote to memory of 2080 2036 cmd.exe 32 PID 2036 wrote to memory of 2080 2036 cmd.exe 32 PID 2080 wrote to memory of 2064 2080 alpha.exe 33 PID 2080 wrote to memory of 2064 2080 alpha.exe 33 PID 2080 wrote to memory of 2064 2080 alpha.exe 33 PID 2036 wrote to memory of 2520 2036 cmd.exe 34 PID 2036 wrote to memory of 2520 2036 cmd.exe 34 PID 2036 wrote to memory of 2520 2036 cmd.exe 34 PID 2520 wrote to memory of 2340 2520 alpha.exe 35 PID 2520 wrote to memory of 2340 2520 alpha.exe 35 PID 2520 wrote to memory of 2340 2520 alpha.exe 35 PID 2036 wrote to memory of 2536 2036 cmd.exe 36 PID 2036 wrote to memory of 2536 2036 cmd.exe 36 PID 2036 wrote to memory of 2536 2036 cmd.exe 36 PID 2536 wrote to memory of 760 2536 alpha.exe 37 PID 2536 wrote to memory of 760 2536 alpha.exe 37 PID 2536 wrote to memory of 760 2536 alpha.exe 37 PID 2036 wrote to memory of 2468 2036 cmd.exe 38 PID 2036 wrote to memory of 2468 2036 cmd.exe 38 PID 2036 wrote to memory of 2468 2036 cmd.exe 38 PID 2036 wrote to memory of 2468 2036 cmd.exe 38 PID 2036 wrote to memory of 2092 2036 cmd.exe 39 PID 2036 wrote to memory of 2092 2036 cmd.exe 39 PID 2036 wrote to memory of 2092 2036 cmd.exe 39 PID 2036 wrote to memory of 2872 2036 cmd.exe 40 PID 2036 wrote to memory of 2872 2036 cmd.exe 40 PID 2036 wrote to memory of 2872 2036 cmd.exe 40 PID 2468 wrote to memory of 1488 2468 spoolsv.COM 42 PID 2468 wrote to memory of 1488 2468 spoolsv.COM 42 PID 2468 wrote to memory of 1488 2468 spoolsv.COM 42 PID 2468 wrote to memory of 1488 2468 spoolsv.COM 42
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e11e4469c9c003f2b0074deada876e15f30afccae6178c5317e16cf5e6ee1ff6.bat"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\System32\extrac32.exeC:\\Windows\\System32\\extrac32 /C /Y C:\\Windows\\System32\\cmd.exe "C:\\Users\\Public\\alpha.exe"2⤵PID:2028
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c extrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\system32\extrac32.exeextrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe3⤵PID:2064
-
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c C:\\Users\\Public\\kn -decodehex -F "C:\Users\Admin\AppData\Local\Temp\e11e4469c9c003f2b0074deada876e15f30afccae6178c5317e16cf5e6ee1ff6.bat" "C:\\Users\\Public\\spoolsv.MPEG" 92⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Public\kn.exeC:\\Users\\Public\\kn -decodehex -F "C:\Users\Admin\AppData\Local\Temp\e11e4469c9c003f2b0074deada876e15f30afccae6178c5317e16cf5e6ee1ff6.bat" "C:\\Users\\Public\\spoolsv.MPEG" 93⤵
- Executes dropped EXE
PID:2340
-
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c C:\\Users\\Public\\kn -decodehex -F "C:\\Users\\Public\\spoolsv.MPEG" "C:\\Users\\Public\\Libraries\\spoolsv.COM" 122⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Public\kn.exeC:\\Users\\Public\\kn -decodehex -F "C:\\Users\\Public\\spoolsv.MPEG" "C:\\Users\\Public\\Libraries\\spoolsv.COM" 123⤵
- Executes dropped EXE
PID:760
-
-
-
C:\Users\Public\Libraries\spoolsv.COMC:\Users\Public\Libraries\spoolsv.COM2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2468 -s 6603⤵
- Loads dropped DLL
- Program crash
PID:1488
-
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c del /q "C:\Users\Public\kn.exe" / A / F / Q / S2⤵
- Executes dropped EXE
PID:2092
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c del /q "C:\Users\Public\spoolsv.MPEG" / A / F / Q / S2⤵
- Executes dropped EXE
PID:2872
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
995KB
MD546fc1e1bca07585cf21cc37149f2b424
SHA12d028a4ee44f9b3dd5387da39490d45f897d7c8f
SHA256ba9c4833df28503ea4ac99bde43ce579fe555dc3abce36429197c4ec727ce5c3
SHA5128c5a859a3b3d065c63187dbadd621eb71fb8747bbe39b2bb62e00251b747117092bc7791a0a80d7f4034f0255a8b929c270ba603d6b44ed192f94cc4e1802f67
-
Filesize
1.1MB
MD5ec1fd3050dbc40ec7e87ab99c7ca0b03
SHA1ae7fdfc29f4ef31e38ebf381e61b503038b5cb35
SHA2561e19c5a26215b62de1babd5633853344420c1e673bb83e8a89213085e17e16e3
SHA5124e47331f2fdce77b01d86cf8e21cd7d6df13536f09b70c53e5a6b82f66512faa10e38645884c696b47a27ea6bddc6c1fdb905ee78684dca98cbda5f39fbafcc2
-
Filesize
1.9MB
MD56892220c5881083c867b7271ae3242ac
SHA1bd4a53c21f1f7a53ed69cd9ec96f606e880d7e50
SHA256daef811906fb8d0bc905f712e9edbc970d17adc31a5fa5517889b2dcee73ef22
SHA512b98888601892104b01b1276d467a6debb33e26276be949ddde68614435d387e26c669f7a6eb549de28d7c95135fd46b09bfd2fef7ad543e4e34d31e117d0d722
-
Filesize
337KB
MD55746bd7e255dd6a8afa06f7c42c1ba41
SHA10f3c4ff28f354aede202d54e9d1c5529a3bf87d8
SHA256db06c3534964e3fc79d2763144ba53742d7fa250ca336f4a0fe724b75aaff386
SHA5123a968356d7b94cc014f78ca37a3c03f354c3970c9e027ed4ccb8e59f0f9f2a32bfa22e7d6b127d44631d715ea41bf8ace91f0b4d69d1714d55552b064ffeb69e