Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
19-12-2024 11:44
Static task
static1
Behavioral task
behavioral1
Sample
Svcrhpjadgyclc.cmd
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Svcrhpjadgyclc.cmd
Resource
win10v2004-20241007-en
General
-
Target
Svcrhpjadgyclc.cmd
-
Size
2.8MB
-
MD5
7afcba92a35ba26fcde12f3aba8ff7d8
-
SHA1
8fe8577fc2ef8866c83ab163a8655ea777e6d4f4
-
SHA256
29bda570966cf934b38ff7b1613f9330709307405391ced5452bd9cc63736331
-
SHA512
a0fdbdb93054ea71efea0dc9ecee2d68644d89e0725a3c34e0d492fd6b2b3d9f3307fbfa5386cdec1e7f452754331bf73242e9316d3d667353cc7c62bad58027
-
SSDEEP
24576:kH1yveXvtJNwYay5+kiD7Dm5c0B58llll8lUWtWJxM9bh+NfbTXr063u95fX7:kVyGftJ+YawbiS5BBUvzM9bh+NfnXm
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 61 IoCs
resource yara_rule behavioral1/memory/2736-34-0x0000000002700000-0x0000000003700000-memory.dmp modiloader_stage2 behavioral1/memory/2736-38-0x0000000002700000-0x0000000003700000-memory.dmp modiloader_stage2 behavioral1/memory/2736-39-0x0000000002700000-0x0000000003700000-memory.dmp modiloader_stage2 behavioral1/memory/2736-40-0x0000000002700000-0x0000000003700000-memory.dmp modiloader_stage2 behavioral1/memory/2736-41-0x0000000002700000-0x0000000003700000-memory.dmp modiloader_stage2 behavioral1/memory/2736-42-0x0000000002700000-0x0000000003700000-memory.dmp modiloader_stage2 behavioral1/memory/2736-43-0x0000000002700000-0x0000000003700000-memory.dmp modiloader_stage2 behavioral1/memory/2736-44-0x0000000002700000-0x0000000003700000-memory.dmp modiloader_stage2 behavioral1/memory/2736-46-0x0000000002700000-0x0000000003700000-memory.dmp modiloader_stage2 behavioral1/memory/2736-49-0x0000000002700000-0x0000000003700000-memory.dmp modiloader_stage2 behavioral1/memory/2736-50-0x0000000002700000-0x0000000003700000-memory.dmp modiloader_stage2 behavioral1/memory/2736-68-0x0000000002700000-0x0000000003700000-memory.dmp modiloader_stage2 behavioral1/memory/2736-100-0x0000000002700000-0x0000000003700000-memory.dmp modiloader_stage2 behavioral1/memory/2736-99-0x0000000002700000-0x0000000003700000-memory.dmp modiloader_stage2 behavioral1/memory/2736-98-0x0000000002700000-0x0000000003700000-memory.dmp modiloader_stage2 behavioral1/memory/2736-97-0x0000000002700000-0x0000000003700000-memory.dmp modiloader_stage2 behavioral1/memory/2736-96-0x0000000002700000-0x0000000003700000-memory.dmp modiloader_stage2 behavioral1/memory/2736-95-0x0000000002700000-0x0000000003700000-memory.dmp modiloader_stage2 behavioral1/memory/2736-94-0x0000000002700000-0x0000000003700000-memory.dmp modiloader_stage2 behavioral1/memory/2736-93-0x0000000002700000-0x0000000003700000-memory.dmp modiloader_stage2 behavioral1/memory/2736-92-0x0000000002700000-0x0000000003700000-memory.dmp modiloader_stage2 behavioral1/memory/2736-91-0x0000000002700000-0x0000000003700000-memory.dmp modiloader_stage2 behavioral1/memory/2736-90-0x0000000002700000-0x0000000003700000-memory.dmp modiloader_stage2 behavioral1/memory/2736-89-0x0000000002700000-0x0000000003700000-memory.dmp modiloader_stage2 behavioral1/memory/2736-88-0x0000000002700000-0x0000000003700000-memory.dmp modiloader_stage2 behavioral1/memory/2736-87-0x0000000002700000-0x0000000003700000-memory.dmp modiloader_stage2 behavioral1/memory/2736-86-0x0000000002700000-0x0000000003700000-memory.dmp modiloader_stage2 behavioral1/memory/2736-85-0x0000000002700000-0x0000000003700000-memory.dmp modiloader_stage2 behavioral1/memory/2736-84-0x0000000002700000-0x0000000003700000-memory.dmp modiloader_stage2 behavioral1/memory/2736-83-0x0000000002700000-0x0000000003700000-memory.dmp modiloader_stage2 behavioral1/memory/2736-82-0x0000000002700000-0x0000000003700000-memory.dmp modiloader_stage2 behavioral1/memory/2736-81-0x0000000002700000-0x0000000003700000-memory.dmp modiloader_stage2 behavioral1/memory/2736-80-0x0000000002700000-0x0000000003700000-memory.dmp modiloader_stage2 behavioral1/memory/2736-79-0x0000000002700000-0x0000000003700000-memory.dmp modiloader_stage2 behavioral1/memory/2736-78-0x0000000002700000-0x0000000003700000-memory.dmp modiloader_stage2 behavioral1/memory/2736-77-0x0000000002700000-0x0000000003700000-memory.dmp modiloader_stage2 behavioral1/memory/2736-76-0x0000000002700000-0x0000000003700000-memory.dmp modiloader_stage2 behavioral1/memory/2736-75-0x0000000002700000-0x0000000003700000-memory.dmp modiloader_stage2 behavioral1/memory/2736-74-0x0000000002700000-0x0000000003700000-memory.dmp modiloader_stage2 behavioral1/memory/2736-73-0x0000000002700000-0x0000000003700000-memory.dmp modiloader_stage2 behavioral1/memory/2736-72-0x0000000002700000-0x0000000003700000-memory.dmp modiloader_stage2 behavioral1/memory/2736-71-0x0000000002700000-0x0000000003700000-memory.dmp modiloader_stage2 behavioral1/memory/2736-70-0x0000000002700000-0x0000000003700000-memory.dmp modiloader_stage2 behavioral1/memory/2736-69-0x0000000002700000-0x0000000003700000-memory.dmp modiloader_stage2 behavioral1/memory/2736-67-0x0000000002700000-0x0000000003700000-memory.dmp modiloader_stage2 behavioral1/memory/2736-66-0x0000000002700000-0x0000000003700000-memory.dmp modiloader_stage2 behavioral1/memory/2736-65-0x0000000002700000-0x0000000003700000-memory.dmp modiloader_stage2 behavioral1/memory/2736-64-0x0000000002700000-0x0000000003700000-memory.dmp modiloader_stage2 behavioral1/memory/2736-63-0x0000000002700000-0x0000000003700000-memory.dmp modiloader_stage2 behavioral1/memory/2736-62-0x0000000002700000-0x0000000003700000-memory.dmp modiloader_stage2 behavioral1/memory/2736-61-0x0000000002700000-0x0000000003700000-memory.dmp modiloader_stage2 behavioral1/memory/2736-60-0x0000000002700000-0x0000000003700000-memory.dmp modiloader_stage2 behavioral1/memory/2736-59-0x0000000002700000-0x0000000003700000-memory.dmp modiloader_stage2 behavioral1/memory/2736-58-0x0000000002700000-0x0000000003700000-memory.dmp modiloader_stage2 behavioral1/memory/2736-57-0x0000000002700000-0x0000000003700000-memory.dmp modiloader_stage2 behavioral1/memory/2736-56-0x0000000002700000-0x0000000003700000-memory.dmp modiloader_stage2 behavioral1/memory/2736-55-0x0000000002700000-0x0000000003700000-memory.dmp modiloader_stage2 behavioral1/memory/2736-54-0x0000000002700000-0x0000000003700000-memory.dmp modiloader_stage2 behavioral1/memory/2736-53-0x0000000002700000-0x0000000003700000-memory.dmp modiloader_stage2 behavioral1/memory/2736-52-0x0000000002700000-0x0000000003700000-memory.dmp modiloader_stage2 behavioral1/memory/2736-51-0x0000000002700000-0x0000000003700000-memory.dmp modiloader_stage2 -
Executes dropped EXE 8 IoCs
pid Process 2532 alpha.exe 2564 alpha.exe 2520 kn.exe 2216 alpha.exe 596 kn.exe 2736 spoolsv.COM 2816 alpha.exe 2836 alpha.exe -
Loads dropped DLL 9 IoCs
pid Process 2252 cmd.exe 2252 cmd.exe 2564 alpha.exe 2252 cmd.exe 2216 alpha.exe 2252 cmd.exe 2252 cmd.exe 2008 WerFault.exe 2008 WerFault.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2008 2736 WerFault.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.COM -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 2736 spoolsv.COM -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 2252 wrote to memory of 2132 2252 cmd.exe 31 PID 2252 wrote to memory of 2132 2252 cmd.exe 31 PID 2252 wrote to memory of 2132 2252 cmd.exe 31 PID 2252 wrote to memory of 2532 2252 cmd.exe 32 PID 2252 wrote to memory of 2532 2252 cmd.exe 32 PID 2252 wrote to memory of 2532 2252 cmd.exe 32 PID 2532 wrote to memory of 2364 2532 alpha.exe 33 PID 2532 wrote to memory of 2364 2532 alpha.exe 33 PID 2532 wrote to memory of 2364 2532 alpha.exe 33 PID 2252 wrote to memory of 2564 2252 cmd.exe 34 PID 2252 wrote to memory of 2564 2252 cmd.exe 34 PID 2252 wrote to memory of 2564 2252 cmd.exe 34 PID 2564 wrote to memory of 2520 2564 alpha.exe 35 PID 2564 wrote to memory of 2520 2564 alpha.exe 35 PID 2564 wrote to memory of 2520 2564 alpha.exe 35 PID 2252 wrote to memory of 2216 2252 cmd.exe 36 PID 2252 wrote to memory of 2216 2252 cmd.exe 36 PID 2252 wrote to memory of 2216 2252 cmd.exe 36 PID 2216 wrote to memory of 596 2216 alpha.exe 37 PID 2216 wrote to memory of 596 2216 alpha.exe 37 PID 2216 wrote to memory of 596 2216 alpha.exe 37 PID 2252 wrote to memory of 2736 2252 cmd.exe 38 PID 2252 wrote to memory of 2736 2252 cmd.exe 38 PID 2252 wrote to memory of 2736 2252 cmd.exe 38 PID 2252 wrote to memory of 2736 2252 cmd.exe 38 PID 2252 wrote to memory of 2816 2252 cmd.exe 39 PID 2252 wrote to memory of 2816 2252 cmd.exe 39 PID 2252 wrote to memory of 2816 2252 cmd.exe 39 PID 2252 wrote to memory of 2836 2252 cmd.exe 40 PID 2252 wrote to memory of 2836 2252 cmd.exe 40 PID 2252 wrote to memory of 2836 2252 cmd.exe 40 PID 2736 wrote to memory of 2008 2736 spoolsv.COM 42 PID 2736 wrote to memory of 2008 2736 spoolsv.COM 42 PID 2736 wrote to memory of 2008 2736 spoolsv.COM 42 PID 2736 wrote to memory of 2008 2736 spoolsv.COM 42
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Svcrhpjadgyclc.cmd"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\System32\extrac32.exeC:\\Windows\\System32\\extrac32 /C /Y C:\\Windows\\System32\\cmd.exe "C:\\Users\\Public\\alpha.exe"2⤵PID:2132
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c extrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\system32\extrac32.exeextrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe3⤵PID:2364
-
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c C:\\Users\\Public\\kn -decodehex -F "C:\Users\Admin\AppData\Local\Temp\Svcrhpjadgyclc.cmd" "C:\\Users\\Public\\spoolsv.MPEG" 92⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Users\Public\kn.exeC:\\Users\\Public\\kn -decodehex -F "C:\Users\Admin\AppData\Local\Temp\Svcrhpjadgyclc.cmd" "C:\\Users\\Public\\spoolsv.MPEG" 93⤵
- Executes dropped EXE
PID:2520
-
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c C:\\Users\\Public\\kn -decodehex -F "C:\\Users\\Public\\spoolsv.MPEG" "C:\\Users\\Public\\Libraries\\spoolsv.COM" 122⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Public\kn.exeC:\\Users\\Public\\kn -decodehex -F "C:\\Users\\Public\\spoolsv.MPEG" "C:\\Users\\Public\\Libraries\\spoolsv.COM" 123⤵
- Executes dropped EXE
PID:596
-
-
-
C:\Users\Public\Libraries\spoolsv.COMC:\Users\Public\Libraries\spoolsv.COM2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2736 -s 6363⤵
- Loads dropped DLL
- Program crash
PID:2008
-
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c del /q "C:\Users\Public\kn.exe" / A / F / Q / S2⤵
- Executes dropped EXE
PID:2816
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c del /q "C:\Users\Public\spoolsv.MPEG" / A / F / Q / S2⤵
- Executes dropped EXE
PID:2836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
995KB
MD5dfd15a4158ab979660435d6f3e95a3ec
SHA16d5566cddfb4b99e82a6babdbd4536a24e8f6f73
SHA256baa12b649fddd77ef62ecd2b3169fab9bb5fbe78404175485f9a7fb48dc4456d
SHA512f33677b419f307c8970c0024e45162bc83e63141878ec2d15b59011261cb30aa412076b62b80fd4e9b99713a689c10699ea8682f67754b2569c83b22b1225e02
-
Filesize
337KB
MD55746bd7e255dd6a8afa06f7c42c1ba41
SHA10f3c4ff28f354aede202d54e9d1c5529a3bf87d8
SHA256db06c3534964e3fc79d2763144ba53742d7fa250ca336f4a0fe724b75aaff386
SHA5123a968356d7b94cc014f78ca37a3c03f354c3970c9e027ed4ccb8e59f0f9f2a32bfa22e7d6b127d44631d715ea41bf8ace91f0b4d69d1714d55552b064ffeb69e
-
Filesize
1.9MB
MD5eb3c4dd5b03eb7e43016cb693c1c6820
SHA18c3cbf8733a1642c43bb7847ccbf0338b931fb64
SHA256ad93393e701dc0ebf905589e548ffa4a1bb894c34e70f8ee730e3fdf34158779
SHA5120331dadcfcc4f06a38bb68c08ff1c3c60f009ccd57c3ff4c60e49090667d541d342e9dd6b01d989dcde1091eaa21f142ed3d5a292970abdfa58b8818fec97a45
-
Filesize
1.1MB
MD5ec1fd3050dbc40ec7e87ab99c7ca0b03
SHA1ae7fdfc29f4ef31e38ebf381e61b503038b5cb35
SHA2561e19c5a26215b62de1babd5633853344420c1e673bb83e8a89213085e17e16e3
SHA5124e47331f2fdce77b01d86cf8e21cd7d6df13536f09b70c53e5a6b82f66512faa10e38645884c696b47a27ea6bddc6c1fdb905ee78684dca98cbda5f39fbafcc2