Analysis
-
max time kernel
91s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2024 19:48
Behavioral task
behavioral1
Sample
ec85f4520e8ec91b5e30d7ad6f102b336ab8a9d70c6373e01558b61f9bc59826.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
ec85f4520e8ec91b5e30d7ad6f102b336ab8a9d70c6373e01558b61f9bc59826.exe
Resource
win10v2004-20241007-en
General
-
Target
ec85f4520e8ec91b5e30d7ad6f102b336ab8a9d70c6373e01558b61f9bc59826.exe
-
Size
692KB
-
MD5
b64b1e63547843deede385c2cf59ad6a
-
SHA1
d64d6b01e55f0a77c61aa3c7a42c4ecf2d4469c3
-
SHA256
ec85f4520e8ec91b5e30d7ad6f102b336ab8a9d70c6373e01558b61f9bc59826
-
SHA512
365080074ffa12e043dad961f4f1b815f355423a5e2ecc6ae15579369509137d7f07e7039a29bb9c50ab4f650eacc7cebc42a9c0265a25c8cf74719bf43cc6d1
-
SSDEEP
12288:ZRRtGgozqi5paO0lp9USQVUSyrkA4pZ6J+v5NdTgxWaSTA1:Lf2eas1USImapIwPuIaSTm
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 4 IoCs
resource yara_rule behavioral2/memory/4088-0-0x0000000000400000-0x00000000004B8000-memory.dmp modiloader_stage2 behavioral2/files/0x00090000000228f4-4.dat modiloader_stage2 behavioral2/memory/4088-8-0x0000000000400000-0x00000000004B8000-memory.dmp modiloader_stage2 behavioral2/memory/1720-10-0x0000000000400000-0x00000000004B8000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 1720 svchsot.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\svchsot.exe ec85f4520e8ec91b5e30d7ad6f102b336ab8a9d70c6373e01558b61f9bc59826.exe File opened for modification C:\Windows\SysWOW64\svchsot.exe ec85f4520e8ec91b5e30d7ad6f102b336ab8a9d70c6373e01558b61f9bc59826.exe File opened for modification C:\Windows\SysWOW64\svchsot.exe svchsot.exe File created C:\Windows\SysWOW64\DaverDel.bat ec85f4520e8ec91b5e30d7ad6f102b336ab8a9d70c6373e01558b61f9bc59826.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ec85f4520e8ec91b5e30d7ad6f102b336ab8a9d70c6373e01558b61f9bc59826.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchsot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4088 wrote to memory of 1720 4088 ec85f4520e8ec91b5e30d7ad6f102b336ab8a9d70c6373e01558b61f9bc59826.exe 81 PID 4088 wrote to memory of 1720 4088 ec85f4520e8ec91b5e30d7ad6f102b336ab8a9d70c6373e01558b61f9bc59826.exe 81 PID 4088 wrote to memory of 1720 4088 ec85f4520e8ec91b5e30d7ad6f102b336ab8a9d70c6373e01558b61f9bc59826.exe 81 PID 4088 wrote to memory of 1572 4088 ec85f4520e8ec91b5e30d7ad6f102b336ab8a9d70c6373e01558b61f9bc59826.exe 82 PID 4088 wrote to memory of 1572 4088 ec85f4520e8ec91b5e30d7ad6f102b336ab8a9d70c6373e01558b61f9bc59826.exe 82 PID 4088 wrote to memory of 1572 4088 ec85f4520e8ec91b5e30d7ad6f102b336ab8a9d70c6373e01558b61f9bc59826.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec85f4520e8ec91b5e30d7ad6f102b336ab8a9d70c6373e01558b61f9bc59826.exe"C:\Users\Admin\AppData\Local\Temp\ec85f4520e8ec91b5e30d7ad6f102b336ab8a9d70c6373e01558b61f9bc59826.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Windows\SysWOW64\svchsot.exeC:\Windows\system32\svchsot.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1720
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\DaverDel.bat2⤵
- System Location Discovery: System Language Discovery
PID:1572
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
248B
MD507fc5ce4d70d286e4ea6b9073a54a4b9
SHA109d0776e0e5c7e19d1a4668ff9caa2e56681a931
SHA256da60a5b39e17c7eb742c495027f29ce3c3bed2cdc40873a5a31943da026480dd
SHA512277dac35bdd51235e80e64d5da5d5ba6c2550e0d89ab263689dfc258f66c83c8e89ae706b5b0e2e67774739f568c1ae95adf82ee58e96c28076783b38eac8ffe
-
Filesize
692KB
MD5b64b1e63547843deede385c2cf59ad6a
SHA1d64d6b01e55f0a77c61aa3c7a42c4ecf2d4469c3
SHA256ec85f4520e8ec91b5e30d7ad6f102b336ab8a9d70c6373e01558b61f9bc59826
SHA512365080074ffa12e043dad961f4f1b815f355423a5e2ecc6ae15579369509137d7f07e7039a29bb9c50ab4f650eacc7cebc42a9c0265a25c8cf74719bf43cc6d1