Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
20-12-2024 04:02
Static task
static1
Behavioral task
behavioral1
Sample
29bda570966cf934b38ff7b1613f9330709307405391ced5452bd9cc63736331.cmd
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
29bda570966cf934b38ff7b1613f9330709307405391ced5452bd9cc63736331.cmd
Resource
win10v2004-20241007-en
General
-
Target
29bda570966cf934b38ff7b1613f9330709307405391ced5452bd9cc63736331.cmd
-
Size
2.8MB
-
MD5
7afcba92a35ba26fcde12f3aba8ff7d8
-
SHA1
8fe8577fc2ef8866c83ab163a8655ea777e6d4f4
-
SHA256
29bda570966cf934b38ff7b1613f9330709307405391ced5452bd9cc63736331
-
SHA512
a0fdbdb93054ea71efea0dc9ecee2d68644d89e0725a3c34e0d492fd6b2b3d9f3307fbfa5386cdec1e7f452754331bf73242e9316d3d667353cc7c62bad58027
-
SSDEEP
24576:kH1yveXvtJNwYay5+kiD7Dm5c0B58llll8lUWtWJxM9bh+NfbTXr063u95fX7:kVyGftJ+YawbiS5BBUvzM9bh+NfnXm
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 62 IoCs
resource yara_rule behavioral1/memory/2556-35-0x00000000027E0000-0x00000000037E0000-memory.dmp modiloader_stage2 behavioral1/memory/2556-39-0x00000000027E0000-0x00000000037E0000-memory.dmp modiloader_stage2 behavioral1/memory/2556-38-0x00000000027E0000-0x00000000037E0000-memory.dmp modiloader_stage2 behavioral1/memory/2556-41-0x00000000027E0000-0x00000000037E0000-memory.dmp modiloader_stage2 behavioral1/memory/2556-52-0x00000000027E0000-0x00000000037E0000-memory.dmp modiloader_stage2 behavioral1/memory/2556-89-0x00000000027E0000-0x00000000037E0000-memory.dmp modiloader_stage2 behavioral1/memory/2556-88-0x00000000027E0000-0x00000000037E0000-memory.dmp modiloader_stage2 behavioral1/memory/2556-86-0x00000000027E0000-0x00000000037E0000-memory.dmp modiloader_stage2 behavioral1/memory/2556-84-0x00000000027E0000-0x00000000037E0000-memory.dmp modiloader_stage2 behavioral1/memory/2556-81-0x00000000027E0000-0x00000000037E0000-memory.dmp modiloader_stage2 behavioral1/memory/2556-77-0x00000000027E0000-0x00000000037E0000-memory.dmp modiloader_stage2 behavioral1/memory/2556-75-0x00000000027E0000-0x00000000037E0000-memory.dmp modiloader_stage2 behavioral1/memory/2556-72-0x00000000027E0000-0x00000000037E0000-memory.dmp modiloader_stage2 behavioral1/memory/2556-71-0x00000000027E0000-0x00000000037E0000-memory.dmp modiloader_stage2 behavioral1/memory/2556-69-0x00000000027E0000-0x00000000037E0000-memory.dmp modiloader_stage2 behavioral1/memory/2556-66-0x00000000027E0000-0x00000000037E0000-memory.dmp modiloader_stage2 behavioral1/memory/2556-64-0x00000000027E0000-0x00000000037E0000-memory.dmp modiloader_stage2 behavioral1/memory/2556-62-0x00000000027E0000-0x00000000037E0000-memory.dmp modiloader_stage2 behavioral1/memory/2556-40-0x00000000027E0000-0x00000000037E0000-memory.dmp modiloader_stage2 behavioral1/memory/2556-60-0x00000000027E0000-0x00000000037E0000-memory.dmp modiloader_stage2 behavioral1/memory/2556-57-0x00000000027E0000-0x00000000037E0000-memory.dmp modiloader_stage2 behavioral1/memory/2556-55-0x00000000027E0000-0x00000000037E0000-memory.dmp modiloader_stage2 behavioral1/memory/2556-54-0x00000000027E0000-0x00000000037E0000-memory.dmp modiloader_stage2 behavioral1/memory/2556-51-0x00000000027E0000-0x00000000037E0000-memory.dmp modiloader_stage2 behavioral1/memory/2556-117-0x00000000027E0000-0x00000000037E0000-memory.dmp modiloader_stage2 behavioral1/memory/2556-49-0x00000000027E0000-0x00000000037E0000-memory.dmp modiloader_stage2 behavioral1/memory/2556-114-0x00000000027E0000-0x00000000037E0000-memory.dmp modiloader_stage2 behavioral1/memory/2556-112-0x00000000027E0000-0x00000000037E0000-memory.dmp modiloader_stage2 behavioral1/memory/2556-110-0x00000000027E0000-0x00000000037E0000-memory.dmp modiloader_stage2 behavioral1/memory/2556-48-0x00000000027E0000-0x00000000037E0000-memory.dmp modiloader_stage2 behavioral1/memory/2556-107-0x00000000027E0000-0x00000000037E0000-memory.dmp modiloader_stage2 behavioral1/memory/2556-104-0x00000000027E0000-0x00000000037E0000-memory.dmp modiloader_stage2 behavioral1/memory/2556-102-0x00000000027E0000-0x00000000037E0000-memory.dmp modiloader_stage2 behavioral1/memory/2556-100-0x00000000027E0000-0x00000000037E0000-memory.dmp modiloader_stage2 behavioral1/memory/2556-98-0x00000000027E0000-0x00000000037E0000-memory.dmp modiloader_stage2 behavioral1/memory/2556-96-0x00000000027E0000-0x00000000037E0000-memory.dmp modiloader_stage2 behavioral1/memory/2556-46-0x00000000027E0000-0x00000000037E0000-memory.dmp modiloader_stage2 behavioral1/memory/2556-92-0x00000000027E0000-0x00000000037E0000-memory.dmp modiloader_stage2 behavioral1/memory/2556-90-0x00000000027E0000-0x00000000037E0000-memory.dmp modiloader_stage2 behavioral1/memory/2556-45-0x00000000027E0000-0x00000000037E0000-memory.dmp modiloader_stage2 behavioral1/memory/2556-87-0x00000000027E0000-0x00000000037E0000-memory.dmp modiloader_stage2 behavioral1/memory/2556-85-0x00000000027E0000-0x00000000037E0000-memory.dmp modiloader_stage2 behavioral1/memory/2556-82-0x00000000027E0000-0x00000000037E0000-memory.dmp modiloader_stage2 behavioral1/memory/2556-79-0x00000000027E0000-0x00000000037E0000-memory.dmp modiloader_stage2 behavioral1/memory/2556-80-0x00000000027E0000-0x00000000037E0000-memory.dmp modiloader_stage2 behavioral1/memory/2556-78-0x00000000027E0000-0x00000000037E0000-memory.dmp modiloader_stage2 behavioral1/memory/2556-76-0x00000000027E0000-0x00000000037E0000-memory.dmp modiloader_stage2 behavioral1/memory/2556-73-0x00000000027E0000-0x00000000037E0000-memory.dmp modiloader_stage2 behavioral1/memory/2556-43-0x00000000027E0000-0x00000000037E0000-memory.dmp modiloader_stage2 behavioral1/memory/2556-70-0x00000000027E0000-0x00000000037E0000-memory.dmp modiloader_stage2 behavioral1/memory/2556-68-0x00000000027E0000-0x00000000037E0000-memory.dmp modiloader_stage2 behavioral1/memory/2556-67-0x00000000027E0000-0x00000000037E0000-memory.dmp modiloader_stage2 behavioral1/memory/2556-65-0x00000000027E0000-0x00000000037E0000-memory.dmp modiloader_stage2 behavioral1/memory/2556-42-0x00000000027E0000-0x00000000037E0000-memory.dmp modiloader_stage2 behavioral1/memory/2556-61-0x00000000027E0000-0x00000000037E0000-memory.dmp modiloader_stage2 behavioral1/memory/2556-59-0x00000000027E0000-0x00000000037E0000-memory.dmp modiloader_stage2 behavioral1/memory/2556-58-0x00000000027E0000-0x00000000037E0000-memory.dmp modiloader_stage2 behavioral1/memory/2556-56-0x00000000027E0000-0x00000000037E0000-memory.dmp modiloader_stage2 behavioral1/memory/2556-53-0x00000000027E0000-0x00000000037E0000-memory.dmp modiloader_stage2 behavioral1/memory/2556-50-0x00000000027E0000-0x00000000037E0000-memory.dmp modiloader_stage2 behavioral1/memory/2556-47-0x00000000027E0000-0x00000000037E0000-memory.dmp modiloader_stage2 behavioral1/memory/2556-44-0x00000000027E0000-0x00000000037E0000-memory.dmp modiloader_stage2 -
Executes dropped EXE 8 IoCs
pid Process 2392 alpha.exe 2156 alpha.exe 860 kn.exe 1752 alpha.exe 2548 kn.exe 2556 spoolsv.COM 2808 alpha.exe 2920 alpha.exe -
Loads dropped DLL 9 IoCs
pid Process 2416 cmd.exe 2416 cmd.exe 2156 alpha.exe 2416 cmd.exe 1752 alpha.exe 2416 cmd.exe 2416 cmd.exe 2104 WerFault.exe 2104 WerFault.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2104 2556 WerFault.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.COM -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 2556 spoolsv.COM -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 2416 wrote to memory of 1784 2416 cmd.exe 31 PID 2416 wrote to memory of 1784 2416 cmd.exe 31 PID 2416 wrote to memory of 1784 2416 cmd.exe 31 PID 2416 wrote to memory of 2392 2416 cmd.exe 32 PID 2416 wrote to memory of 2392 2416 cmd.exe 32 PID 2416 wrote to memory of 2392 2416 cmd.exe 32 PID 2392 wrote to memory of 2620 2392 alpha.exe 33 PID 2392 wrote to memory of 2620 2392 alpha.exe 33 PID 2392 wrote to memory of 2620 2392 alpha.exe 33 PID 2416 wrote to memory of 2156 2416 cmd.exe 34 PID 2416 wrote to memory of 2156 2416 cmd.exe 34 PID 2416 wrote to memory of 2156 2416 cmd.exe 34 PID 2156 wrote to memory of 860 2156 alpha.exe 35 PID 2156 wrote to memory of 860 2156 alpha.exe 35 PID 2156 wrote to memory of 860 2156 alpha.exe 35 PID 2416 wrote to memory of 1752 2416 cmd.exe 36 PID 2416 wrote to memory of 1752 2416 cmd.exe 36 PID 2416 wrote to memory of 1752 2416 cmd.exe 36 PID 1752 wrote to memory of 2548 1752 alpha.exe 37 PID 1752 wrote to memory of 2548 1752 alpha.exe 37 PID 1752 wrote to memory of 2548 1752 alpha.exe 37 PID 2416 wrote to memory of 2556 2416 cmd.exe 38 PID 2416 wrote to memory of 2556 2416 cmd.exe 38 PID 2416 wrote to memory of 2556 2416 cmd.exe 38 PID 2416 wrote to memory of 2556 2416 cmd.exe 38 PID 2416 wrote to memory of 2808 2416 cmd.exe 39 PID 2416 wrote to memory of 2808 2416 cmd.exe 39 PID 2416 wrote to memory of 2808 2416 cmd.exe 39 PID 2416 wrote to memory of 2920 2416 cmd.exe 40 PID 2416 wrote to memory of 2920 2416 cmd.exe 40 PID 2416 wrote to memory of 2920 2416 cmd.exe 40 PID 2556 wrote to memory of 2104 2556 spoolsv.COM 42 PID 2556 wrote to memory of 2104 2556 spoolsv.COM 42 PID 2556 wrote to memory of 2104 2556 spoolsv.COM 42 PID 2556 wrote to memory of 2104 2556 spoolsv.COM 42
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\29bda570966cf934b38ff7b1613f9330709307405391ced5452bd9cc63736331.cmd"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\System32\extrac32.exeC:\\Windows\\System32\\extrac32 /C /Y C:\\Windows\\System32\\cmd.exe "C:\\Users\\Public\\alpha.exe"2⤵PID:1784
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c extrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\system32\extrac32.exeextrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe3⤵PID:2620
-
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c C:\\Users\\Public\\kn -decodehex -F "C:\Users\Admin\AppData\Local\Temp\29bda570966cf934b38ff7b1613f9330709307405391ced5452bd9cc63736331.cmd" "C:\\Users\\Public\\spoolsv.MPEG" 92⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Public\kn.exeC:\\Users\\Public\\kn -decodehex -F "C:\Users\Admin\AppData\Local\Temp\29bda570966cf934b38ff7b1613f9330709307405391ced5452bd9cc63736331.cmd" "C:\\Users\\Public\\spoolsv.MPEG" 93⤵
- Executes dropped EXE
PID:860
-
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c C:\\Users\\Public\\kn -decodehex -F "C:\\Users\\Public\\spoolsv.MPEG" "C:\\Users\\Public\\Libraries\\spoolsv.COM" 122⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Users\Public\kn.exeC:\\Users\\Public\\kn -decodehex -F "C:\\Users\\Public\\spoolsv.MPEG" "C:\\Users\\Public\\Libraries\\spoolsv.COM" 123⤵
- Executes dropped EXE
PID:2548
-
-
-
C:\Users\Public\Libraries\spoolsv.COMC:\Users\Public\Libraries\spoolsv.COM2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2556 -s 6563⤵
- Loads dropped DLL
- Program crash
PID:2104
-
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c del /q "C:\Users\Public\kn.exe" / A / F / Q / S2⤵
- Executes dropped EXE
PID:2808
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c del /q "C:\Users\Public\spoolsv.MPEG" / A / F / Q / S2⤵
- Executes dropped EXE
PID:2920
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
995KB
MD5dfd15a4158ab979660435d6f3e95a3ec
SHA16d5566cddfb4b99e82a6babdbd4536a24e8f6f73
SHA256baa12b649fddd77ef62ecd2b3169fab9bb5fbe78404175485f9a7fb48dc4456d
SHA512f33677b419f307c8970c0024e45162bc83e63141878ec2d15b59011261cb30aa412076b62b80fd4e9b99713a689c10699ea8682f67754b2569c83b22b1225e02
-
Filesize
337KB
MD55746bd7e255dd6a8afa06f7c42c1ba41
SHA10f3c4ff28f354aede202d54e9d1c5529a3bf87d8
SHA256db06c3534964e3fc79d2763144ba53742d7fa250ca336f4a0fe724b75aaff386
SHA5123a968356d7b94cc014f78ca37a3c03f354c3970c9e027ed4ccb8e59f0f9f2a32bfa22e7d6b127d44631d715ea41bf8ace91f0b4d69d1714d55552b064ffeb69e
-
Filesize
1.9MB
MD5eb3c4dd5b03eb7e43016cb693c1c6820
SHA18c3cbf8733a1642c43bb7847ccbf0338b931fb64
SHA256ad93393e701dc0ebf905589e548ffa4a1bb894c34e70f8ee730e3fdf34158779
SHA5120331dadcfcc4f06a38bb68c08ff1c3c60f009ccd57c3ff4c60e49090667d541d342e9dd6b01d989dcde1091eaa21f142ed3d5a292970abdfa58b8818fec97a45
-
Filesize
1.1MB
MD5ec1fd3050dbc40ec7e87ab99c7ca0b03
SHA1ae7fdfc29f4ef31e38ebf381e61b503038b5cb35
SHA2561e19c5a26215b62de1babd5633853344420c1e673bb83e8a89213085e17e16e3
SHA5124e47331f2fdce77b01d86cf8e21cd7d6df13536f09b70c53e5a6b82f66512faa10e38645884c696b47a27ea6bddc6c1fdb905ee78684dca98cbda5f39fbafcc2