Analysis
-
max time kernel
1s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22-12-2024 11:08
Static task
static1
Behavioral task
behavioral1
Sample
aa95fde20adaa37c7641579e37edaca8e5a672e28aa6d735005b664c11bc21e5N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
aa95fde20adaa37c7641579e37edaca8e5a672e28aa6d735005b664c11bc21e5N.exe
Resource
win10v2004-20241007-en
General
-
Target
aa95fde20adaa37c7641579e37edaca8e5a672e28aa6d735005b664c11bc21e5N.exe
-
Size
112KB
-
MD5
ff54a22dc697b82df4f185deade078f0
-
SHA1
124703a4d1046c20ba7095f2c3151582f97160c4
-
SHA256
aa95fde20adaa37c7641579e37edaca8e5a672e28aa6d735005b664c11bc21e5
-
SHA512
cd17197939d3625d6764bb260f24e66d497448befb8173f32c8fff58186a97108d032ad57001c361a932aaf94b41e4ed8af8848f99695cab3d91435dbbffd0e7
-
SSDEEP
1536:t2ovIa47CqIf2f3w41p7sDcX7juR/JSJw8EeNshUDGXJr:tVIr7zI+fAceoGxSKKo5r
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral1/memory/1540-285-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2744 set thread context of 2984 2744 aa95fde20adaa37c7641579e37edaca8e5a672e28aa6d735005b664c11bc21e5N.exe 30 PID 2744 set thread context of 2268 2744 aa95fde20adaa37c7641579e37edaca8e5a672e28aa6d735005b664c11bc21e5N.exe 31 -
resource yara_rule behavioral1/memory/2268-129-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2268-124-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2268-118-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2268-113-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2268-111-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1508-276-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1540-285-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/2268-288-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1508-293-0x0000000000400000-0x000000000040B000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aa95fde20adaa37c7641579e37edaca8e5a672e28aa6d735005b664c11bc21e5N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aa95fde20adaa37c7641579e37edaca8e5a672e28aa6d735005b664c11bc21e5N.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2744 aa95fde20adaa37c7641579e37edaca8e5a672e28aa6d735005b664c11bc21e5N.exe 2984 svchost.exe 2268 aa95fde20adaa37c7641579e37edaca8e5a672e28aa6d735005b664c11bc21e5N.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2744 wrote to memory of 2984 2744 aa95fde20adaa37c7641579e37edaca8e5a672e28aa6d735005b664c11bc21e5N.exe 30 PID 2744 wrote to memory of 2984 2744 aa95fde20adaa37c7641579e37edaca8e5a672e28aa6d735005b664c11bc21e5N.exe 30 PID 2744 wrote to memory of 2984 2744 aa95fde20adaa37c7641579e37edaca8e5a672e28aa6d735005b664c11bc21e5N.exe 30 PID 2744 wrote to memory of 2984 2744 aa95fde20adaa37c7641579e37edaca8e5a672e28aa6d735005b664c11bc21e5N.exe 30 PID 2744 wrote to memory of 2984 2744 aa95fde20adaa37c7641579e37edaca8e5a672e28aa6d735005b664c11bc21e5N.exe 30 PID 2744 wrote to memory of 2984 2744 aa95fde20adaa37c7641579e37edaca8e5a672e28aa6d735005b664c11bc21e5N.exe 30 PID 2744 wrote to memory of 2984 2744 aa95fde20adaa37c7641579e37edaca8e5a672e28aa6d735005b664c11bc21e5N.exe 30 PID 2744 wrote to memory of 2984 2744 aa95fde20adaa37c7641579e37edaca8e5a672e28aa6d735005b664c11bc21e5N.exe 30 PID 2744 wrote to memory of 2984 2744 aa95fde20adaa37c7641579e37edaca8e5a672e28aa6d735005b664c11bc21e5N.exe 30 PID 2744 wrote to memory of 2984 2744 aa95fde20adaa37c7641579e37edaca8e5a672e28aa6d735005b664c11bc21e5N.exe 30 PID 2744 wrote to memory of 2268 2744 aa95fde20adaa37c7641579e37edaca8e5a672e28aa6d735005b664c11bc21e5N.exe 31 PID 2744 wrote to memory of 2268 2744 aa95fde20adaa37c7641579e37edaca8e5a672e28aa6d735005b664c11bc21e5N.exe 31 PID 2744 wrote to memory of 2268 2744 aa95fde20adaa37c7641579e37edaca8e5a672e28aa6d735005b664c11bc21e5N.exe 31 PID 2744 wrote to memory of 2268 2744 aa95fde20adaa37c7641579e37edaca8e5a672e28aa6d735005b664c11bc21e5N.exe 31 PID 2744 wrote to memory of 2268 2744 aa95fde20adaa37c7641579e37edaca8e5a672e28aa6d735005b664c11bc21e5N.exe 31 PID 2744 wrote to memory of 2268 2744 aa95fde20adaa37c7641579e37edaca8e5a672e28aa6d735005b664c11bc21e5N.exe 31 PID 2744 wrote to memory of 2268 2744 aa95fde20adaa37c7641579e37edaca8e5a672e28aa6d735005b664c11bc21e5N.exe 31 PID 2744 wrote to memory of 2268 2744 aa95fde20adaa37c7641579e37edaca8e5a672e28aa6d735005b664c11bc21e5N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa95fde20adaa37c7641579e37edaca8e5a672e28aa6d735005b664c11bc21e5N.exe"C:\Users\Admin\AppData\Local\Temp\aa95fde20adaa37c7641579e37edaca8e5a672e28aa6d735005b664c11bc21e5N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2984
-
-
C:\Users\Admin\AppData\Local\Temp\aa95fde20adaa37c7641579e37edaca8e5a672e28aa6d735005b664c11bc21e5N.exe"C:\Users\Admin\AppData\Local\Temp\aa95fde20adaa37c7641579e37edaca8e5a672e28aa6d735005b664c11bc21e5N.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2268 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\QRNMG.bat" "3⤵PID:1784
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows WA" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe" /f4⤵PID:3028
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"3⤵PID:3048
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"4⤵PID:2432
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"4⤵PID:1508
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"4⤵PID:1540
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148B
MD53a4614705555abb049c3298e61170b7f
SHA1c8686410756f346d9551256a5b878b04770950ba
SHA256cff0663c8cfadf83b80583a871c313ffc5d950cb503809cb4a482f400c5d846b
SHA51265ce6fec00e6934f21635e7ccd74757f31ed4b0ddb52bd80d3ea9abeba56340128d23151ef7d9f5daacb5d61e4a4cca50dbb3a43132e350522311ee06e829007
-
Filesize
112KB
MD50fb0b6d1a2f535466003a863d2df8c8e
SHA141a0c55ce330b2f34e238e24a215d7bd9a7f613f
SHA25693784ba328f05bbdd0f222ef063426539ae19fa589159d492abeb121c850cb99
SHA5126f5203adb965a0dd1e2a1be452f9e64d06afdb4c2283530de736472eaa3e071a876864be645a433b2ef3a29d8fef8440ecd501920556fa019d483cd4531220e8