Analysis

  • max time kernel
    145s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-12-2024 10:21

General

  • Target

    RFQ_MOLECOR_14416 URGENTE,pdf.exe

  • Size

    742KB

  • MD5

    6bce7c8b1a25460c5037c2d38afe14f9

  • SHA1

    5875151673b30398910e0e950e06f5018fdbd642

  • SHA256

    92b00706984c7c417625397155bc04772ad6a821a271e1ad490dda20643d387d

  • SHA512

    cb2be4f9eebe6aed03fb2c6569ec679b9eae29836d94a2b44bd59d4d1eec9f3c9e2247c4afaf6f6b4863b439cd780da5c3e656472257e5d699c3c4df0678a6eb

  • SSDEEP

    12288:vFtHRwMpWIIyKj9X1WxQ3jC0CJVYT+R0ws8YxX2ujF5JjFWVJq2O:vFtxwR9uwvQYYdsU+TJ581O

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader First Stage 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\RFQ_MOLECOR_14416 URGENTE,pdf.exe
    "C:\Users\Admin\AppData\Local\Temp\RFQ_MOLECOR_14416 URGENTE,pdf.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2696
    • C:\Users\Admin\AppData\Local\Temp\RFQ_MOLECOR_14416 URGENTE,pdf.exe
      "C:\Users\Admin\AppData\Local\Temp\RFQ_MOLECOR_14416 URGENTE,pdf.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4092

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2696-0-0x0000000002250000-0x0000000002251000-memory.dmp

    Filesize

    4KB

  • memory/2696-1-0x0000000010410000-0x000000001042B000-memory.dmp

    Filesize

    108KB

  • memory/2696-17-0x0000000002250000-0x0000000002251000-memory.dmp

    Filesize

    4KB

  • memory/4092-3-0x0000000000600000-0x0000000000601000-memory.dmp

    Filesize

    4KB

  • memory/4092-2-0x00000000001C0000-0x00000000001C1000-memory.dmp

    Filesize

    4KB

  • memory/4092-274-0x0000000010410000-0x000000001042B000-memory.dmp

    Filesize

    108KB

  • memory/4092-277-0x0000000010410000-0x000000001042B000-memory.dmp

    Filesize

    108KB