Analysis
-
max time kernel
93s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-12-2024 04:20
Static task
static1
Behavioral task
behavioral1
Sample
63c77a3f6cfa94cbc6a4c0c1475f02520592e58d6a03e8553e77a85a3f03c32f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
63c77a3f6cfa94cbc6a4c0c1475f02520592e58d6a03e8553e77a85a3f03c32f.exe
Resource
win10v2004-20241007-en
General
-
Target
63c77a3f6cfa94cbc6a4c0c1475f02520592e58d6a03e8553e77a85a3f03c32f.exe
-
Size
1.3MB
-
MD5
ccdcd04a0ffde31366754018598eb02f
-
SHA1
38492826e8febf5bd7da4f9d8a8379ec7044ca9a
-
SHA256
63c77a3f6cfa94cbc6a4c0c1475f02520592e58d6a03e8553e77a85a3f03c32f
-
SHA512
8059cf54a64b45598b39becb3ec02fdf4b5837e4dd84ac82d33334850d61d1b33df70da0a65857c33e9a0fe2dc3d405bdbf6fa7214ab68e471e2e0c0f7e31053
-
SSDEEP
24576:TS1gzTBokW3THfYl7JTOs1r7FX2DOfqDrKfK8r/4mSwhONqR:TtTiq973f
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 61 IoCs
resource yara_rule behavioral2/memory/5048-2-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral2/memory/5048-10-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral2/memory/5048-40-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral2/memory/5048-41-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral2/memory/5048-66-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral2/memory/5048-65-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral2/memory/5048-64-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral2/memory/5048-63-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral2/memory/5048-62-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral2/memory/5048-60-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral2/memory/5048-59-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral2/memory/5048-57-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral2/memory/5048-56-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral2/memory/5048-55-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral2/memory/5048-53-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral2/memory/5048-52-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral2/memory/5048-51-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral2/memory/5048-49-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral2/memory/5048-48-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral2/memory/5048-47-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral2/memory/5048-46-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral2/memory/5048-45-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral2/memory/5048-43-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral2/memory/5048-42-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral2/memory/5048-39-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral2/memory/5048-37-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral2/memory/5048-35-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral2/memory/5048-34-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral2/memory/5048-33-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral2/memory/5048-32-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral2/memory/5048-30-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral2/memory/5048-61-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral2/memory/5048-28-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral2/memory/5048-58-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral2/memory/5048-27-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral2/memory/5048-54-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral2/memory/5048-50-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral2/memory/5048-24-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral2/memory/5048-23-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral2/memory/5048-44-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral2/memory/5048-21-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral2/memory/5048-19-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral2/memory/5048-38-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral2/memory/5048-18-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral2/memory/5048-36-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral2/memory/5048-17-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral2/memory/5048-16-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral2/memory/5048-31-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral2/memory/5048-15-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral2/memory/5048-29-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral2/memory/5048-14-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral2/memory/5048-26-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral2/memory/5048-25-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral2/memory/5048-13-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral2/memory/5048-22-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral2/memory/5048-12-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral2/memory/5048-20-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral2/memory/5048-11-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral2/memory/5048-8-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral2/memory/5048-9-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral2/memory/5048-7-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Emxwenem = "C:\\Users\\Public\\Emxwenem.url" 63c77a3f6cfa94cbc6a4c0c1475f02520592e58d6a03e8553e77a85a3f03c32f.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SndVol.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 63c77a3f6cfa94cbc6a4c0c1475f02520592e58d6a03e8553e77a85a3f03c32f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 20 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3260 SndVol.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 3260 SndVol.exe 3260 SndVol.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 5048 wrote to memory of 3856 5048 63c77a3f6cfa94cbc6a4c0c1475f02520592e58d6a03e8553e77a85a3f03c32f.exe 87 PID 5048 wrote to memory of 3856 5048 63c77a3f6cfa94cbc6a4c0c1475f02520592e58d6a03e8553e77a85a3f03c32f.exe 87 PID 5048 wrote to memory of 3856 5048 63c77a3f6cfa94cbc6a4c0c1475f02520592e58d6a03e8553e77a85a3f03c32f.exe 87 PID 5048 wrote to memory of 3260 5048 63c77a3f6cfa94cbc6a4c0c1475f02520592e58d6a03e8553e77a85a3f03c32f.exe 91 PID 5048 wrote to memory of 3260 5048 63c77a3f6cfa94cbc6a4c0c1475f02520592e58d6a03e8553e77a85a3f03c32f.exe 91 PID 5048 wrote to memory of 3260 5048 63c77a3f6cfa94cbc6a4c0c1475f02520592e58d6a03e8553e77a85a3f03c32f.exe 91 PID 5048 wrote to memory of 3260 5048 63c77a3f6cfa94cbc6a4c0c1475f02520592e58d6a03e8553e77a85a3f03c32f.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\63c77a3f6cfa94cbc6a4c0c1475f02520592e58d6a03e8553e77a85a3f03c32f.exe"C:\Users\Admin\AppData\Local\Temp\63c77a3f6cfa94cbc6a4c0c1475f02520592e58d6a03e8553e77a85a3f03c32f.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Public\Libraries\FX.cmd2⤵
- System Location Discovery: System Language Discovery
PID:3856
-
-
C:\Windows\SysWOW64\SndVol.exeC:\Windows\System32\SndVol.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3260
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD560cd0be570decd49e4798554639a05ae
SHA1bd7bed69d9ab9a20b5263d74921c453f38477bcb
SHA256ca6a6c849496453990beceef8c192d90908c0c615fa0a1d01bcd464bad6966a5
SHA512ab3dbdb4ed95a0cb4072b23dd241149f48ecff8a69f16d81648e825d9d81a55954e5dd9bc46d3d7408421df30c901b9ad1385d1e70793fa8d715c86c9e800c57