Resubmissions
20-12-2024 19:52
241220-ylsg1atjhk 1020-12-2024 19:25
241220-x47h7sspgr 1020-12-2024 19:25
241220-x4y7tsspgp 120-12-2024 19:14
241220-xxpd2ssjdy 10Analysis
-
max time kernel
679s -
max time network
441s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-fr -
resource tags
arch:x64arch:x86image:win10v2004-20241007-frlocale:fr-fros:windows10-2004-x64systemwindows -
submitted
20-12-2024 19:25
Static task
static1
Behavioral task
behavioral1
Sample
f6142cf78b009b118166332df150bcdbc0428bdaf2542e250af299431dd27268.gz
Resource
win10v2004-20241007-fr
General
-
Target
f6142cf78b009b118166332df150bcdbc0428bdaf2542e250af299431dd27268.gz
-
Size
836KB
-
MD5
1b4d02ca1abe23f1948225d0846cf882
-
SHA1
becd7b6a9a665c16ef18b01772e2419e9b9bf8b9
-
SHA256
f6142cf78b009b118166332df150bcdbc0428bdaf2542e250af299431dd27268
-
SHA512
b89965b74105f7ffa6c8a2092116dadb9c6f6bb696ca34c9d4ccc7f902f92005c8803d2d9a90d74ab904119b36e5bf01c9ea157693f879001abebd23a6d23cfb
-
SSDEEP
24576:bMzscMk7UyOoZChSyco5AXYLIOfj3G4zTJsMmgbZX0oOA3OXxmS:bs0kyoISyco5AXYLIO7jpig1aA+XL
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 61 IoCs
resource yara_rule behavioral1/memory/2020-19-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral1/memory/2020-22-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral1/memory/2020-25-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral1/memory/2020-41-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral1/memory/2020-40-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral1/memory/2020-39-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral1/memory/2020-28-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral1/memory/2020-35-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral1/memory/2020-27-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral1/memory/2020-34-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral1/memory/2020-26-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral1/memory/2020-32-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral1/memory/2020-31-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral1/memory/2020-30-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral1/memory/2020-29-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral1/memory/2020-24-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral1/memory/2020-23-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral1/memory/2020-79-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral1/memory/2020-81-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral1/memory/2020-82-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral1/memory/2020-80-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral1/memory/2020-76-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral1/memory/2020-75-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral1/memory/2020-74-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral1/memory/2020-73-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral1/memory/2020-72-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral1/memory/2020-71-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral1/memory/2020-70-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral1/memory/2020-69-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral1/memory/2020-67-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral1/memory/2020-65-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral1/memory/2020-66-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral1/memory/2020-64-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral1/memory/2020-62-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral1/memory/2020-61-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral1/memory/2020-60-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral1/memory/2020-59-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral1/memory/2020-58-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral1/memory/2020-56-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral1/memory/2020-55-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral1/memory/2020-54-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral1/memory/2020-50-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral1/memory/2020-33-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral1/memory/2020-44-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral1/memory/2020-78-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral1/memory/2020-77-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral1/memory/2020-43-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral1/memory/2020-42-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral1/memory/2020-68-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral1/memory/2020-63-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral1/memory/2020-38-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral1/memory/2020-57-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral1/memory/2020-37-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral1/memory/2020-36-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral1/memory/2020-53-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral1/memory/2020-51-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral1/memory/2020-48-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral1/memory/2020-49-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral1/memory/2020-47-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral1/memory/2020-46-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 behavioral1/memory/2020-45-0x0000000002CE0000-0x0000000003CE0000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation WScript.exe -
Executes dropped EXE 5 IoCs
pid Process 2020 x.exe 3516 x.exe 4924 x.exe 3628 x.exe 4172 x.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 872 2020 WerFault.exe 95 1744 4924 WerFault.exe 98 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language x.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language x.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language x.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language x.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language x.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings OpenWith.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 3636 NOTEPAD.EXE -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 1828 7zFM.exe Token: 35 1828 7zFM.exe Token: SeSecurityPrivilege 1828 7zFM.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1828 7zFM.exe 1828 7zFM.exe -
Suspicious use of SetWindowsHookEx 41 IoCs
pid Process 312 OpenWith.exe 312 OpenWith.exe 312 OpenWith.exe 312 OpenWith.exe 312 OpenWith.exe 312 OpenWith.exe 312 OpenWith.exe 312 OpenWith.exe 312 OpenWith.exe 312 OpenWith.exe 312 OpenWith.exe 312 OpenWith.exe 312 OpenWith.exe 312 OpenWith.exe 312 OpenWith.exe 1932 OpenWith.exe 1932 OpenWith.exe 1932 OpenWith.exe 1932 OpenWith.exe 1932 OpenWith.exe 1932 OpenWith.exe 1932 OpenWith.exe 1932 OpenWith.exe 1932 OpenWith.exe 1932 OpenWith.exe 1932 OpenWith.exe 1932 OpenWith.exe 1932 OpenWith.exe 4240 OpenWith.exe 4240 OpenWith.exe 4240 OpenWith.exe 4240 OpenWith.exe 4240 OpenWith.exe 4240 OpenWith.exe 4240 OpenWith.exe 4240 OpenWith.exe 4240 OpenWith.exe 4240 OpenWith.exe 4240 OpenWith.exe 4240 OpenWith.exe 4240 OpenWith.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4016 wrote to memory of 2020 4016 WScript.exe 95 PID 4016 wrote to memory of 2020 4016 WScript.exe 95 PID 4016 wrote to memory of 2020 4016 WScript.exe 95 PID 312 wrote to memory of 2648 312 OpenWith.exe 109 PID 312 wrote to memory of 2648 312 OpenWith.exe 109 PID 1932 wrote to memory of 4084 1932 OpenWith.exe 111 PID 1932 wrote to memory of 4084 1932 OpenWith.exe 111 PID 4240 wrote to memory of 3636 4240 OpenWith.exe 121 PID 4240 wrote to memory of 3636 4240 OpenWith.exe 121
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\f6142cf78b009b118166332df150bcdbc0428bdaf2542e250af299431dd27268.gz"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1828
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2764
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\PO_S23K.vbs"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Users\Admin\AppData\Local\Temp\x.exe"C:\Users\Admin\AppData\Local\Temp\x.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2020 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2020 -s 12403⤵
- Program crash
PID:872
-
-
-
C:\Users\Admin\AppData\Local\Temp\x.exe"C:\Users\Admin\AppData\Local\Temp\x.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3516
-
C:\Users\Admin\AppData\Local\Temp\x.exe"C:\Users\Admin\AppData\Local\Temp\x.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4924 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4924 -s 8322⤵
- Program crash
PID:1744
-
-
C:\Users\Admin\AppData\Local\Temp\x.exe"C:\Users\Admin\AppData\Local\Temp\x.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2020 -ip 20201⤵PID:2824
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:312 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\______________________2⤵PID:2648
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\______________________2⤵PID:4084
-
-
C:\Users\Admin\AppData\Local\Temp\x.exe"C:\Users\Admin\AppData\Local\Temp\x.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4172
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\PO_S23K.vbs"1⤵PID:2088
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\PO_S23K.vbs"1⤵PID:3652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4924 -ip 49241⤵PID:4080
-
C:\Windows\System32\CScript.exe"C:\Windows\System32\CScript.exe" "C:\Users\Admin\AppData\Local\Temp\PO_S23K.vbs"1⤵PID:4736
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\PO_S23K.vbs2⤵
- Opens file in notepad (likely ransom note)
PID:3636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD59e1689409fdcb7ba5265907bc0164a98
SHA187388a6758b0659c56b97da2370a97721ed383ef
SHA256988f06de5e206681e74d9a8ba01f63069eaa7043b39784cfbddbe4845723b1b4
SHA51218d389197556b6f543b7a0d5a559763164b61a3e6c56783931dbfc0b46a5c45994e106dea948f90db089d4078a411e76d82f463d65969b2e0a7cf975814988f5
-
Filesize
6B
MD5325a6c5ca994f3718f1cef2c6324e004
SHA1d5e9edab4432f2e149a09b93d8e2928ff0fb619f
SHA2565f73a85ee6609ee50d42f67783499d356da92795e9d117f3e2b2a4a4934b6211
SHA5124a9234cff2dc455fc6d877439f61d283bd01531e752cd26290633c538a91634bae0da1c5b50a4fe21a3f74ef32db1dfd6d56b99d11a04aed7792e9891b570c7a
-
Filesize
1.2MB
MD5385a5e0136bd0aa68cde4ba38756b086
SHA1a73948144ee59a7805f81dd6a73291ca40625ac1
SHA25693739039ca89805f9934e13d66bf446d302447801e96ee6b9e654cff0d39e20d
SHA51292d38b855d990c8b6e839bdfa6215039e671cac184ec75bd2653a0865b160a2d35715179e3518aa2550825ae06340641ed09d3dd685910584698dc60215f7e90