Analysis
-
max time kernel
120s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2024 11:08
Static task
static1
Behavioral task
behavioral1
Sample
aa95fde20adaa37c7641579e37edaca8e5a672e28aa6d735005b664c11bc21e5N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
aa95fde20adaa37c7641579e37edaca8e5a672e28aa6d735005b664c11bc21e5N.exe
Resource
win10v2004-20241007-en
General
-
Target
aa95fde20adaa37c7641579e37edaca8e5a672e28aa6d735005b664c11bc21e5N.exe
-
Size
112KB
-
MD5
ff54a22dc697b82df4f185deade078f0
-
SHA1
124703a4d1046c20ba7095f2c3151582f97160c4
-
SHA256
aa95fde20adaa37c7641579e37edaca8e5a672e28aa6d735005b664c11bc21e5
-
SHA512
cd17197939d3625d6764bb260f24e66d497448befb8173f32c8fff58186a97108d032ad57001c361a932aaf94b41e4ed8af8848f99695cab3d91435dbbffd0e7
-
SSDEEP
1536:t2ovIa47CqIf2f3w41p7sDcX7juR/JSJw8EeNshUDGXJr:tVIr7zI+fAceoGxSKKo5r
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 4 IoCs
resource yara_rule behavioral2/memory/624-64-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 behavioral2/memory/624-63-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 behavioral2/memory/624-62-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 behavioral2/memory/624-72-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation aa95fde20adaa37c7641579e37edaca8e5a672e28aa6d735005b664c11bc21e5N.exe -
Executes dropped EXE 3 IoCs
pid Process 2560 WAMain.exe 3480 WAMain.exe 624 WAMain.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows WA = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\WAMain.exe" reg.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 2520 set thread context of 2732 2520 aa95fde20adaa37c7641579e37edaca8e5a672e28aa6d735005b664c11bc21e5N.exe 84 PID 2520 set thread context of 4816 2520 aa95fde20adaa37c7641579e37edaca8e5a672e28aa6d735005b664c11bc21e5N.exe 85 PID 2560 set thread context of 4600 2560 WAMain.exe 91 PID 2560 set thread context of 3480 2560 WAMain.exe 92 PID 2560 set thread context of 624 2560 WAMain.exe 94 -
resource yara_rule behavioral2/memory/4816-9-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4816-18-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4816-14-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4816-49-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/624-57-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/624-64-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/624-63-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/624-62-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/624-61-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/4816-70-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3480-71-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/624-72-0x0000000000400000-0x0000000000414000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 512 4600 WerFault.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WAMain.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WAMain.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WAMain.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aa95fde20adaa37c7641579e37edaca8e5a672e28aa6d735005b664c11bc21e5N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aa95fde20adaa37c7641579e37edaca8e5a672e28aa6d735005b664c11bc21e5N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2732 svchost.exe 2732 svchost.exe 2732 svchost.exe 2732 svchost.exe 2732 svchost.exe 2732 svchost.exe 2732 svchost.exe 2732 svchost.exe 2732 svchost.exe 2732 svchost.exe 2732 svchost.exe 2732 svchost.exe 2732 svchost.exe 2732 svchost.exe 2732 svchost.exe 2732 svchost.exe 2732 svchost.exe 2732 svchost.exe 2732 svchost.exe 2732 svchost.exe 2732 svchost.exe 2732 svchost.exe 2732 svchost.exe 2732 svchost.exe 2732 svchost.exe 2732 svchost.exe 2732 svchost.exe 2732 svchost.exe 2732 svchost.exe 2732 svchost.exe 2732 svchost.exe 2732 svchost.exe 2732 svchost.exe 2732 svchost.exe 2732 svchost.exe 2732 svchost.exe 2732 svchost.exe 2732 svchost.exe 2732 svchost.exe 2732 svchost.exe 2732 svchost.exe 2732 svchost.exe 2732 svchost.exe 2732 svchost.exe 2732 svchost.exe 2732 svchost.exe 2732 svchost.exe 2732 svchost.exe 2732 svchost.exe 2732 svchost.exe 2732 svchost.exe 2732 svchost.exe 2732 svchost.exe 2732 svchost.exe 2732 svchost.exe 2732 svchost.exe 2732 svchost.exe 2732 svchost.exe 2732 svchost.exe 2732 svchost.exe 2732 svchost.exe 2732 svchost.exe 2732 svchost.exe 2732 svchost.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3480 WAMain.exe Token: SeDebugPrivilege 3480 WAMain.exe Token: SeDebugPrivilege 3480 WAMain.exe Token: SeDebugPrivilege 3480 WAMain.exe Token: SeDebugPrivilege 3480 WAMain.exe Token: SeDebugPrivilege 3480 WAMain.exe Token: SeDebugPrivilege 3480 WAMain.exe Token: SeDebugPrivilege 3480 WAMain.exe Token: SeDebugPrivilege 3480 WAMain.exe Token: SeDebugPrivilege 3480 WAMain.exe Token: SeDebugPrivilege 3480 WAMain.exe Token: SeDebugPrivilege 3480 WAMain.exe Token: SeDebugPrivilege 3480 WAMain.exe Token: SeDebugPrivilege 3480 WAMain.exe Token: SeDebugPrivilege 3480 WAMain.exe Token: SeDebugPrivilege 3480 WAMain.exe Token: SeDebugPrivilege 3480 WAMain.exe Token: SeDebugPrivilege 3480 WAMain.exe Token: SeDebugPrivilege 3480 WAMain.exe Token: SeDebugPrivilege 3480 WAMain.exe Token: SeDebugPrivilege 3480 WAMain.exe Token: SeDebugPrivilege 3480 WAMain.exe Token: SeDebugPrivilege 3480 WAMain.exe Token: SeDebugPrivilege 3480 WAMain.exe Token: SeDebugPrivilege 3480 WAMain.exe Token: SeDebugPrivilege 3480 WAMain.exe Token: SeDebugPrivilege 3480 WAMain.exe Token: SeDebugPrivilege 3480 WAMain.exe Token: SeDebugPrivilege 3480 WAMain.exe Token: SeDebugPrivilege 3480 WAMain.exe Token: SeDebugPrivilege 3480 WAMain.exe Token: SeDebugPrivilege 3480 WAMain.exe Token: SeDebugPrivilege 3480 WAMain.exe Token: SeDebugPrivilege 3480 WAMain.exe Token: SeDebugPrivilege 3480 WAMain.exe Token: SeDebugPrivilege 3480 WAMain.exe Token: SeDebugPrivilege 3480 WAMain.exe Token: SeDebugPrivilege 3480 WAMain.exe Token: SeDebugPrivilege 3480 WAMain.exe Token: SeDebugPrivilege 3480 WAMain.exe Token: SeDebugPrivilege 3480 WAMain.exe Token: SeDebugPrivilege 3480 WAMain.exe Token: SeDebugPrivilege 3480 WAMain.exe Token: SeDebugPrivilege 3480 WAMain.exe Token: SeDebugPrivilege 3480 WAMain.exe Token: SeDebugPrivilege 3480 WAMain.exe Token: SeDebugPrivilege 3480 WAMain.exe Token: SeDebugPrivilege 3480 WAMain.exe Token: SeDebugPrivilege 3480 WAMain.exe Token: SeDebugPrivilege 3480 WAMain.exe Token: SeDebugPrivilege 3480 WAMain.exe Token: SeDebugPrivilege 3480 WAMain.exe Token: SeDebugPrivilege 3480 WAMain.exe Token: SeDebugPrivilege 3480 WAMain.exe Token: SeDebugPrivilege 3480 WAMain.exe Token: SeDebugPrivilege 3480 WAMain.exe Token: SeDebugPrivilege 3480 WAMain.exe Token: SeDebugPrivilege 3480 WAMain.exe Token: SeDebugPrivilege 3480 WAMain.exe Token: SeDebugPrivilege 3480 WAMain.exe Token: SeDebugPrivilege 3480 WAMain.exe Token: SeDebugPrivilege 3480 WAMain.exe Token: SeDebugPrivilege 3480 WAMain.exe Token: SeDebugPrivilege 3480 WAMain.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2520 aa95fde20adaa37c7641579e37edaca8e5a672e28aa6d735005b664c11bc21e5N.exe 2732 svchost.exe 4816 aa95fde20adaa37c7641579e37edaca8e5a672e28aa6d735005b664c11bc21e5N.exe 2560 WAMain.exe 3480 WAMain.exe -
Suspicious use of WriteProcessMemory 51 IoCs
description pid Process procid_target PID 2520 wrote to memory of 2732 2520 aa95fde20adaa37c7641579e37edaca8e5a672e28aa6d735005b664c11bc21e5N.exe 84 PID 2520 wrote to memory of 2732 2520 aa95fde20adaa37c7641579e37edaca8e5a672e28aa6d735005b664c11bc21e5N.exe 84 PID 2520 wrote to memory of 2732 2520 aa95fde20adaa37c7641579e37edaca8e5a672e28aa6d735005b664c11bc21e5N.exe 84 PID 2520 wrote to memory of 2732 2520 aa95fde20adaa37c7641579e37edaca8e5a672e28aa6d735005b664c11bc21e5N.exe 84 PID 2520 wrote to memory of 2732 2520 aa95fde20adaa37c7641579e37edaca8e5a672e28aa6d735005b664c11bc21e5N.exe 84 PID 2520 wrote to memory of 2732 2520 aa95fde20adaa37c7641579e37edaca8e5a672e28aa6d735005b664c11bc21e5N.exe 84 PID 2520 wrote to memory of 2732 2520 aa95fde20adaa37c7641579e37edaca8e5a672e28aa6d735005b664c11bc21e5N.exe 84 PID 2520 wrote to memory of 2732 2520 aa95fde20adaa37c7641579e37edaca8e5a672e28aa6d735005b664c11bc21e5N.exe 84 PID 2520 wrote to memory of 2732 2520 aa95fde20adaa37c7641579e37edaca8e5a672e28aa6d735005b664c11bc21e5N.exe 84 PID 2520 wrote to memory of 4816 2520 aa95fde20adaa37c7641579e37edaca8e5a672e28aa6d735005b664c11bc21e5N.exe 85 PID 2520 wrote to memory of 4816 2520 aa95fde20adaa37c7641579e37edaca8e5a672e28aa6d735005b664c11bc21e5N.exe 85 PID 2520 wrote to memory of 4816 2520 aa95fde20adaa37c7641579e37edaca8e5a672e28aa6d735005b664c11bc21e5N.exe 85 PID 2520 wrote to memory of 4816 2520 aa95fde20adaa37c7641579e37edaca8e5a672e28aa6d735005b664c11bc21e5N.exe 85 PID 2520 wrote to memory of 4816 2520 aa95fde20adaa37c7641579e37edaca8e5a672e28aa6d735005b664c11bc21e5N.exe 85 PID 2520 wrote to memory of 4816 2520 aa95fde20adaa37c7641579e37edaca8e5a672e28aa6d735005b664c11bc21e5N.exe 85 PID 2520 wrote to memory of 4816 2520 aa95fde20adaa37c7641579e37edaca8e5a672e28aa6d735005b664c11bc21e5N.exe 85 PID 2520 wrote to memory of 4816 2520 aa95fde20adaa37c7641579e37edaca8e5a672e28aa6d735005b664c11bc21e5N.exe 85 PID 4816 wrote to memory of 3664 4816 aa95fde20adaa37c7641579e37edaca8e5a672e28aa6d735005b664c11bc21e5N.exe 86 PID 4816 wrote to memory of 3664 4816 aa95fde20adaa37c7641579e37edaca8e5a672e28aa6d735005b664c11bc21e5N.exe 86 PID 4816 wrote to memory of 3664 4816 aa95fde20adaa37c7641579e37edaca8e5a672e28aa6d735005b664c11bc21e5N.exe 86 PID 3664 wrote to memory of 1336 3664 cmd.exe 89 PID 3664 wrote to memory of 1336 3664 cmd.exe 89 PID 3664 wrote to memory of 1336 3664 cmd.exe 89 PID 4816 wrote to memory of 2560 4816 aa95fde20adaa37c7641579e37edaca8e5a672e28aa6d735005b664c11bc21e5N.exe 90 PID 4816 wrote to memory of 2560 4816 aa95fde20adaa37c7641579e37edaca8e5a672e28aa6d735005b664c11bc21e5N.exe 90 PID 4816 wrote to memory of 2560 4816 aa95fde20adaa37c7641579e37edaca8e5a672e28aa6d735005b664c11bc21e5N.exe 90 PID 2560 wrote to memory of 4600 2560 WAMain.exe 91 PID 2560 wrote to memory of 4600 2560 WAMain.exe 91 PID 2560 wrote to memory of 4600 2560 WAMain.exe 91 PID 2560 wrote to memory of 4600 2560 WAMain.exe 91 PID 2560 wrote to memory of 4600 2560 WAMain.exe 91 PID 2560 wrote to memory of 4600 2560 WAMain.exe 91 PID 2560 wrote to memory of 4600 2560 WAMain.exe 91 PID 2560 wrote to memory of 4600 2560 WAMain.exe 91 PID 2560 wrote to memory of 4600 2560 WAMain.exe 91 PID 2560 wrote to memory of 3480 2560 WAMain.exe 92 PID 2560 wrote to memory of 3480 2560 WAMain.exe 92 PID 2560 wrote to memory of 3480 2560 WAMain.exe 92 PID 2560 wrote to memory of 3480 2560 WAMain.exe 92 PID 2560 wrote to memory of 3480 2560 WAMain.exe 92 PID 2560 wrote to memory of 3480 2560 WAMain.exe 92 PID 2560 wrote to memory of 3480 2560 WAMain.exe 92 PID 2560 wrote to memory of 3480 2560 WAMain.exe 92 PID 2560 wrote to memory of 624 2560 WAMain.exe 94 PID 2560 wrote to memory of 624 2560 WAMain.exe 94 PID 2560 wrote to memory of 624 2560 WAMain.exe 94 PID 2560 wrote to memory of 624 2560 WAMain.exe 94 PID 2560 wrote to memory of 624 2560 WAMain.exe 94 PID 2560 wrote to memory of 624 2560 WAMain.exe 94 PID 2560 wrote to memory of 624 2560 WAMain.exe 94 PID 2560 wrote to memory of 624 2560 WAMain.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa95fde20adaa37c7641579e37edaca8e5a672e28aa6d735005b664c11bc21e5N.exe"C:\Users\Admin\AppData\Local\Temp\aa95fde20adaa37c7641579e37edaca8e5a672e28aa6d735005b664c11bc21e5N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2732
-
-
C:\Users\Admin\AppData\Local\Temp\aa95fde20adaa37c7641579e37edaca8e5a672e28aa6d735005b664c11bc21e5N.exe"C:\Users\Admin\AppData\Local\Temp\aa95fde20adaa37c7641579e37edaca8e5a672e28aa6d735005b664c11bc21e5N.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\OKLWT.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows WA" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1336
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"4⤵PID:4600
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4600 -s 1565⤵
- Program crash
PID:512
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3480
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:624
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4600 -ip 46001⤵PID:4808
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148B
MD53a4614705555abb049c3298e61170b7f
SHA1c8686410756f346d9551256a5b878b04770950ba
SHA256cff0663c8cfadf83b80583a871c313ffc5d950cb503809cb4a482f400c5d846b
SHA51265ce6fec00e6934f21635e7ccd74757f31ed4b0ddb52bd80d3ea9abeba56340128d23151ef7d9f5daacb5d61e4a4cca50dbb3a43132e350522311ee06e829007
-
Filesize
112KB
MD5e73057f4a066704694058fef93cc6faa
SHA130793acf55613307fefc5ed279b8dfe6302de5f8
SHA25644fa592d1d08e2e4634df1a7e492960788632b819da576ffca38b8a12da81c30
SHA512cb350598c2688f412bc6865e21c4f877480c90dcf8f6ad6c6af977ea2eb380cb84695deb146714cba2129376ddbbdea78a5274202c9c911990700abc0b3b153f