Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-12-2024 06:09
Static task
static1
Behavioral task
behavioral1
Sample
spoolsv.COM.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
spoolsv.COM.exe
Resource
win10v2004-20241007-en
General
-
Target
spoolsv.COM.exe
-
Size
995KB
-
MD5
dfd15a4158ab979660435d6f3e95a3ec
-
SHA1
6d5566cddfb4b99e82a6babdbd4536a24e8f6f73
-
SHA256
baa12b649fddd77ef62ecd2b3169fab9bb5fbe78404175485f9a7fb48dc4456d
-
SHA512
f33677b419f307c8970c0024e45162bc83e63141878ec2d15b59011261cb30aa412076b62b80fd4e9b99713a689c10699ea8682f67754b2569c83b22b1225e02
-
SSDEEP
24576:Mt8U4ln77mcFj7LF6iNQj0KyEB1zcwfPM6d:0wnRQj0KyEB1zcwfPMA
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 61 IoCs
resource yara_rule behavioral2/memory/4680-2-0x0000000002B30000-0x0000000003B30000-memory.dmp modiloader_stage2 behavioral2/memory/4680-6-0x0000000002B30000-0x0000000003B30000-memory.dmp modiloader_stage2 behavioral2/memory/4680-12-0x0000000002B30000-0x0000000003B30000-memory.dmp modiloader_stage2 behavioral2/memory/4680-33-0x0000000002B30000-0x0000000003B30000-memory.dmp modiloader_stage2 behavioral2/memory/4680-56-0x0000000002B30000-0x0000000003B30000-memory.dmp modiloader_stage2 behavioral2/memory/4680-65-0x0000000002B30000-0x0000000003B30000-memory.dmp modiloader_stage2 behavioral2/memory/4680-64-0x0000000002B30000-0x0000000003B30000-memory.dmp modiloader_stage2 behavioral2/memory/4680-63-0x0000000002B30000-0x0000000003B30000-memory.dmp modiloader_stage2 behavioral2/memory/4680-62-0x0000000002B30000-0x0000000003B30000-memory.dmp modiloader_stage2 behavioral2/memory/4680-61-0x0000000002B30000-0x0000000003B30000-memory.dmp modiloader_stage2 behavioral2/memory/4680-60-0x0000000002B30000-0x0000000003B30000-memory.dmp modiloader_stage2 behavioral2/memory/4680-59-0x0000000002B30000-0x0000000003B30000-memory.dmp modiloader_stage2 behavioral2/memory/4680-55-0x0000000002B30000-0x0000000003B30000-memory.dmp modiloader_stage2 behavioral2/memory/4680-54-0x0000000002B30000-0x0000000003B30000-memory.dmp modiloader_stage2 behavioral2/memory/4680-51-0x0000000002B30000-0x0000000003B30000-memory.dmp modiloader_stage2 behavioral2/memory/4680-50-0x0000000002B30000-0x0000000003B30000-memory.dmp modiloader_stage2 behavioral2/memory/4680-47-0x0000000002B30000-0x0000000003B30000-memory.dmp modiloader_stage2 behavioral2/memory/4680-45-0x0000000002B30000-0x0000000003B30000-memory.dmp modiloader_stage2 behavioral2/memory/4680-43-0x0000000002B30000-0x0000000003B30000-memory.dmp modiloader_stage2 behavioral2/memory/4680-66-0x0000000002B30000-0x0000000003B30000-memory.dmp modiloader_stage2 behavioral2/memory/4680-41-0x0000000002B30000-0x0000000003B30000-memory.dmp modiloader_stage2 behavioral2/memory/4680-39-0x0000000002B30000-0x0000000003B30000-memory.dmp modiloader_stage2 behavioral2/memory/4680-38-0x0000000002B30000-0x0000000003B30000-memory.dmp modiloader_stage2 behavioral2/memory/4680-37-0x0000000002B30000-0x0000000003B30000-memory.dmp modiloader_stage2 behavioral2/memory/4680-58-0x0000000002B30000-0x0000000003B30000-memory.dmp modiloader_stage2 behavioral2/memory/4680-34-0x0000000002B30000-0x0000000003B30000-memory.dmp modiloader_stage2 behavioral2/memory/4680-57-0x0000000002B30000-0x0000000003B30000-memory.dmp modiloader_stage2 behavioral2/memory/4680-32-0x0000000002B30000-0x0000000003B30000-memory.dmp modiloader_stage2 behavioral2/memory/4680-53-0x0000000002B30000-0x0000000003B30000-memory.dmp modiloader_stage2 behavioral2/memory/4680-31-0x0000000002B30000-0x0000000003B30000-memory.dmp modiloader_stage2 behavioral2/memory/4680-52-0x0000000002B30000-0x0000000003B30000-memory.dmp modiloader_stage2 behavioral2/memory/4680-30-0x0000000002B30000-0x0000000003B30000-memory.dmp modiloader_stage2 behavioral2/memory/4680-49-0x0000000002B30000-0x0000000003B30000-memory.dmp modiloader_stage2 behavioral2/memory/4680-29-0x0000000002B30000-0x0000000003B30000-memory.dmp modiloader_stage2 behavioral2/memory/4680-48-0x0000000002B30000-0x0000000003B30000-memory.dmp modiloader_stage2 behavioral2/memory/4680-28-0x0000000002B30000-0x0000000003B30000-memory.dmp modiloader_stage2 behavioral2/memory/4680-46-0x0000000002B30000-0x0000000003B30000-memory.dmp modiloader_stage2 behavioral2/memory/4680-27-0x0000000002B30000-0x0000000003B30000-memory.dmp modiloader_stage2 behavioral2/memory/4680-26-0x0000000002B30000-0x0000000003B30000-memory.dmp modiloader_stage2 behavioral2/memory/4680-44-0x0000000002B30000-0x0000000003B30000-memory.dmp modiloader_stage2 behavioral2/memory/4680-25-0x0000000002B30000-0x0000000003B30000-memory.dmp modiloader_stage2 behavioral2/memory/4680-42-0x0000000002B30000-0x0000000003B30000-memory.dmp modiloader_stage2 behavioral2/memory/4680-24-0x0000000002B30000-0x0000000003B30000-memory.dmp modiloader_stage2 behavioral2/memory/4680-40-0x0000000002B30000-0x0000000003B30000-memory.dmp modiloader_stage2 behavioral2/memory/4680-23-0x0000000002B30000-0x0000000003B30000-memory.dmp modiloader_stage2 behavioral2/memory/4680-22-0x0000000002B30000-0x0000000003B30000-memory.dmp modiloader_stage2 behavioral2/memory/4680-21-0x0000000002B30000-0x0000000003B30000-memory.dmp modiloader_stage2 behavioral2/memory/4680-20-0x0000000002B30000-0x0000000003B30000-memory.dmp modiloader_stage2 behavioral2/memory/4680-19-0x0000000002B30000-0x0000000003B30000-memory.dmp modiloader_stage2 behavioral2/memory/4680-18-0x0000000002B30000-0x0000000003B30000-memory.dmp modiloader_stage2 behavioral2/memory/4680-17-0x0000000002B30000-0x0000000003B30000-memory.dmp modiloader_stage2 behavioral2/memory/4680-16-0x0000000002B30000-0x0000000003B30000-memory.dmp modiloader_stage2 behavioral2/memory/4680-15-0x0000000002B30000-0x0000000003B30000-memory.dmp modiloader_stage2 behavioral2/memory/4680-14-0x0000000002B30000-0x0000000003B30000-memory.dmp modiloader_stage2 behavioral2/memory/4680-13-0x0000000002B30000-0x0000000003B30000-memory.dmp modiloader_stage2 behavioral2/memory/4680-11-0x0000000002B30000-0x0000000003B30000-memory.dmp modiloader_stage2 behavioral2/memory/4680-10-0x0000000002B30000-0x0000000003B30000-memory.dmp modiloader_stage2 behavioral2/memory/4680-9-0x0000000002B30000-0x0000000003B30000-memory.dmp modiloader_stage2 behavioral2/memory/4680-8-0x0000000002B30000-0x0000000003B30000-memory.dmp modiloader_stage2 behavioral2/memory/4680-7-0x0000000002B30000-0x0000000003B30000-memory.dmp modiloader_stage2 behavioral2/memory/4680-5-0x0000000002B30000-0x0000000003B30000-memory.dmp modiloader_stage2 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.COM.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 19 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)