Analysis
-
max time kernel
4s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-12-2024 22:17
Static task
static1
Behavioral task
behavioral1
Sample
778154b0aaf4adc4d2db9cb9bed724db3c48a76f94c6ca431c661f4c6ca83b79.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
778154b0aaf4adc4d2db9cb9bed724db3c48a76f94c6ca431c661f4c6ca83b79.exe
Resource
win10v2004-20241007-en
General
-
Target
778154b0aaf4adc4d2db9cb9bed724db3c48a76f94c6ca431c661f4c6ca83b79.exe
-
Size
112KB
-
MD5
5ca948731b59c088486bd330ef956c5e
-
SHA1
8ffadee6e187b6e3b3e96ac61f871fb3a856f81a
-
SHA256
778154b0aaf4adc4d2db9cb9bed724db3c48a76f94c6ca431c661f4c6ca83b79
-
SHA512
ac4a2c2e483fb7ba44e7fc145a67c3c2a853b66f4a43332c9aa88653a4f7d2524ab8987de91bf61a2e7269eec54360fc83158dedec75373afb631b750e389ca9
-
SSDEEP
1536:t2ovIa47CqIf2f3w41p7sDcX7juR/JSJw8EeNshUDGXJt:tVIr7zI+fAceoGxSKKo5t
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral1/memory/1788-291-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows WA = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\WAMain.exe" reg.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 804 set thread context of 2632 804 778154b0aaf4adc4d2db9cb9bed724db3c48a76f94c6ca431c661f4c6ca83b79.exe 31 PID 804 set thread context of 2576 804 778154b0aaf4adc4d2db9cb9bed724db3c48a76f94c6ca431c661f4c6ca83b79.exe 32 -
resource yara_rule behavioral1/memory/2576-124-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2576-129-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1788-284-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/2576-282-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1788-291-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/2420-290-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 778154b0aaf4adc4d2db9cb9bed724db3c48a76f94c6ca431c661f4c6ca83b79.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 778154b0aaf4adc4d2db9cb9bed724db3c48a76f94c6ca431c661f4c6ca83b79.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 804 778154b0aaf4adc4d2db9cb9bed724db3c48a76f94c6ca431c661f4c6ca83b79.exe 2632 svchost.exe 2576 778154b0aaf4adc4d2db9cb9bed724db3c48a76f94c6ca431c661f4c6ca83b79.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 804 wrote to memory of 2632 804 778154b0aaf4adc4d2db9cb9bed724db3c48a76f94c6ca431c661f4c6ca83b79.exe 31 PID 804 wrote to memory of 2632 804 778154b0aaf4adc4d2db9cb9bed724db3c48a76f94c6ca431c661f4c6ca83b79.exe 31 PID 804 wrote to memory of 2632 804 778154b0aaf4adc4d2db9cb9bed724db3c48a76f94c6ca431c661f4c6ca83b79.exe 31 PID 804 wrote to memory of 2632 804 778154b0aaf4adc4d2db9cb9bed724db3c48a76f94c6ca431c661f4c6ca83b79.exe 31 PID 804 wrote to memory of 2632 804 778154b0aaf4adc4d2db9cb9bed724db3c48a76f94c6ca431c661f4c6ca83b79.exe 31 PID 804 wrote to memory of 2632 804 778154b0aaf4adc4d2db9cb9bed724db3c48a76f94c6ca431c661f4c6ca83b79.exe 31 PID 804 wrote to memory of 2632 804 778154b0aaf4adc4d2db9cb9bed724db3c48a76f94c6ca431c661f4c6ca83b79.exe 31 PID 804 wrote to memory of 2632 804 778154b0aaf4adc4d2db9cb9bed724db3c48a76f94c6ca431c661f4c6ca83b79.exe 31 PID 804 wrote to memory of 2632 804 778154b0aaf4adc4d2db9cb9bed724db3c48a76f94c6ca431c661f4c6ca83b79.exe 31 PID 804 wrote to memory of 2632 804 778154b0aaf4adc4d2db9cb9bed724db3c48a76f94c6ca431c661f4c6ca83b79.exe 31 PID 804 wrote to memory of 2576 804 778154b0aaf4adc4d2db9cb9bed724db3c48a76f94c6ca431c661f4c6ca83b79.exe 32 PID 804 wrote to memory of 2576 804 778154b0aaf4adc4d2db9cb9bed724db3c48a76f94c6ca431c661f4c6ca83b79.exe 32 PID 804 wrote to memory of 2576 804 778154b0aaf4adc4d2db9cb9bed724db3c48a76f94c6ca431c661f4c6ca83b79.exe 32 PID 804 wrote to memory of 2576 804 778154b0aaf4adc4d2db9cb9bed724db3c48a76f94c6ca431c661f4c6ca83b79.exe 32 PID 804 wrote to memory of 2576 804 778154b0aaf4adc4d2db9cb9bed724db3c48a76f94c6ca431c661f4c6ca83b79.exe 32 PID 804 wrote to memory of 2576 804 778154b0aaf4adc4d2db9cb9bed724db3c48a76f94c6ca431c661f4c6ca83b79.exe 32 PID 804 wrote to memory of 2576 804 778154b0aaf4adc4d2db9cb9bed724db3c48a76f94c6ca431c661f4c6ca83b79.exe 32 PID 804 wrote to memory of 2576 804 778154b0aaf4adc4d2db9cb9bed724db3c48a76f94c6ca431c661f4c6ca83b79.exe 32 PID 2576 wrote to memory of 740 2576 778154b0aaf4adc4d2db9cb9bed724db3c48a76f94c6ca431c661f4c6ca83b79.exe 33 PID 2576 wrote to memory of 740 2576 778154b0aaf4adc4d2db9cb9bed724db3c48a76f94c6ca431c661f4c6ca83b79.exe 33 PID 2576 wrote to memory of 740 2576 778154b0aaf4adc4d2db9cb9bed724db3c48a76f94c6ca431c661f4c6ca83b79.exe 33 PID 2576 wrote to memory of 740 2576 778154b0aaf4adc4d2db9cb9bed724db3c48a76f94c6ca431c661f4c6ca83b79.exe 33 PID 740 wrote to memory of 2980 740 cmd.exe 35 PID 740 wrote to memory of 2980 740 cmd.exe 35 PID 740 wrote to memory of 2980 740 cmd.exe 35 PID 740 wrote to memory of 2980 740 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\778154b0aaf4adc4d2db9cb9bed724db3c48a76f94c6ca431c661f4c6ca83b79.exe"C:\Users\Admin\AppData\Local\Temp\778154b0aaf4adc4d2db9cb9bed724db3c48a76f94c6ca431c661f4c6ca83b79.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2632
-
-
C:\Users\Admin\AppData\Local\Temp\778154b0aaf4adc4d2db9cb9bed724db3c48a76f94c6ca431c661f4c6ca83b79.exe"C:\Users\Admin\AppData\Local\Temp\778154b0aaf4adc4d2db9cb9bed724db3c48a76f94c6ca431c661f4c6ca83b79.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\HGTAK.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows WA" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2980
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"3⤵PID:1932
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"4⤵PID:1368
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"4⤵PID:2420
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"4⤵PID:1788
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148B
MD53a4614705555abb049c3298e61170b7f
SHA1c8686410756f346d9551256a5b878b04770950ba
SHA256cff0663c8cfadf83b80583a871c313ffc5d950cb503809cb4a482f400c5d846b
SHA51265ce6fec00e6934f21635e7ccd74757f31ed4b0ddb52bd80d3ea9abeba56340128d23151ef7d9f5daacb5d61e4a4cca50dbb3a43132e350522311ee06e829007
-
Filesize
112KB
MD5b0097a09ab73a5417c700216e7a814e0
SHA1494b3c79cbdd850e6c74d7f99d892ad701ce96a5
SHA256fad508721794ec320417895d1b2b66847518e347081df8b911190d3969b4236a
SHA512e01661b372996ad9d429b655080f5120a1526529f7f5fa29b60a7fa307db3952a0bf44cea8d378038a729c99af886c5d38e4a0e3e06b9634ada79b4bdff55ff0