Analysis
-
max time kernel
7s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
26-12-2024 02:16
Static task
static1
Behavioral task
behavioral1
Sample
1305a3f5b494db69f764f7ec1478f01212da4ed2b589e9d19c667e7d8f2dd51e.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
1305a3f5b494db69f764f7ec1478f01212da4ed2b589e9d19c667e7d8f2dd51e.exe
Resource
win10v2004-20241007-en
General
-
Target
1305a3f5b494db69f764f7ec1478f01212da4ed2b589e9d19c667e7d8f2dd51e.exe
-
Size
112KB
-
MD5
1442e9fe5530ddb1cdae526a4ec8d273
-
SHA1
331f5f7e0b4d02edc3159e0470245378f260520d
-
SHA256
1305a3f5b494db69f764f7ec1478f01212da4ed2b589e9d19c667e7d8f2dd51e
-
SHA512
356f1dd67c8dee86556fb418f29d31b8b80727f4e37a09953d505f8d42b80c2d96abdf11e02ca5a43a535a85500eb5e2ce54ccc821859585d640497d5a6abcf1
-
SSDEEP
1536:t2ovIa47CqIf2f3w41p7sDcX7juR/JSJw8EeNshUDGXJi:tVIr7zI+fAceoGxSKKo5i
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral1/memory/1036-283-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 behavioral1/memory/1036-291-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 1028 WAMain.exe -
Loads dropped DLL 5 IoCs
pid Process 1676 1305a3f5b494db69f764f7ec1478f01212da4ed2b589e9d19c667e7d8f2dd51e.exe 1676 1305a3f5b494db69f764f7ec1478f01212da4ed2b589e9d19c667e7d8f2dd51e.exe 1676 1305a3f5b494db69f764f7ec1478f01212da4ed2b589e9d19c667e7d8f2dd51e.exe 1676 1305a3f5b494db69f764f7ec1478f01212da4ed2b589e9d19c667e7d8f2dd51e.exe 1676 1305a3f5b494db69f764f7ec1478f01212da4ed2b589e9d19c667e7d8f2dd51e.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows WA = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\WAMain.exe" reg.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3044 set thread context of 3064 3044 1305a3f5b494db69f764f7ec1478f01212da4ed2b589e9d19c667e7d8f2dd51e.exe 30 PID 3044 set thread context of 1676 3044 1305a3f5b494db69f764f7ec1478f01212da4ed2b589e9d19c667e7d8f2dd51e.exe 31 -
resource yara_rule behavioral1/memory/1676-128-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1676-119-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1676-115-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1676-113-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1036-283-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/1676-288-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1036-291-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/2136-290-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1305a3f5b494db69f764f7ec1478f01212da4ed2b589e9d19c667e7d8f2dd51e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1305a3f5b494db69f764f7ec1478f01212da4ed2b589e9d19c667e7d8f2dd51e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WAMain.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe 3064 svchost.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3044 1305a3f5b494db69f764f7ec1478f01212da4ed2b589e9d19c667e7d8f2dd51e.exe 3064 svchost.exe 1676 1305a3f5b494db69f764f7ec1478f01212da4ed2b589e9d19c667e7d8f2dd51e.exe 1028 WAMain.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3044 wrote to memory of 3064 3044 1305a3f5b494db69f764f7ec1478f01212da4ed2b589e9d19c667e7d8f2dd51e.exe 30 PID 3044 wrote to memory of 3064 3044 1305a3f5b494db69f764f7ec1478f01212da4ed2b589e9d19c667e7d8f2dd51e.exe 30 PID 3044 wrote to memory of 3064 3044 1305a3f5b494db69f764f7ec1478f01212da4ed2b589e9d19c667e7d8f2dd51e.exe 30 PID 3044 wrote to memory of 3064 3044 1305a3f5b494db69f764f7ec1478f01212da4ed2b589e9d19c667e7d8f2dd51e.exe 30 PID 3044 wrote to memory of 3064 3044 1305a3f5b494db69f764f7ec1478f01212da4ed2b589e9d19c667e7d8f2dd51e.exe 30 PID 3044 wrote to memory of 3064 3044 1305a3f5b494db69f764f7ec1478f01212da4ed2b589e9d19c667e7d8f2dd51e.exe 30 PID 3044 wrote to memory of 3064 3044 1305a3f5b494db69f764f7ec1478f01212da4ed2b589e9d19c667e7d8f2dd51e.exe 30 PID 3044 wrote to memory of 3064 3044 1305a3f5b494db69f764f7ec1478f01212da4ed2b589e9d19c667e7d8f2dd51e.exe 30 PID 3044 wrote to memory of 3064 3044 1305a3f5b494db69f764f7ec1478f01212da4ed2b589e9d19c667e7d8f2dd51e.exe 30 PID 3044 wrote to memory of 3064 3044 1305a3f5b494db69f764f7ec1478f01212da4ed2b589e9d19c667e7d8f2dd51e.exe 30 PID 3044 wrote to memory of 1676 3044 1305a3f5b494db69f764f7ec1478f01212da4ed2b589e9d19c667e7d8f2dd51e.exe 31 PID 3044 wrote to memory of 1676 3044 1305a3f5b494db69f764f7ec1478f01212da4ed2b589e9d19c667e7d8f2dd51e.exe 31 PID 3044 wrote to memory of 1676 3044 1305a3f5b494db69f764f7ec1478f01212da4ed2b589e9d19c667e7d8f2dd51e.exe 31 PID 3044 wrote to memory of 1676 3044 1305a3f5b494db69f764f7ec1478f01212da4ed2b589e9d19c667e7d8f2dd51e.exe 31 PID 3044 wrote to memory of 1676 3044 1305a3f5b494db69f764f7ec1478f01212da4ed2b589e9d19c667e7d8f2dd51e.exe 31 PID 3044 wrote to memory of 1676 3044 1305a3f5b494db69f764f7ec1478f01212da4ed2b589e9d19c667e7d8f2dd51e.exe 31 PID 3044 wrote to memory of 1676 3044 1305a3f5b494db69f764f7ec1478f01212da4ed2b589e9d19c667e7d8f2dd51e.exe 31 PID 3044 wrote to memory of 1676 3044 1305a3f5b494db69f764f7ec1478f01212da4ed2b589e9d19c667e7d8f2dd51e.exe 31 PID 1676 wrote to memory of 2700 1676 1305a3f5b494db69f764f7ec1478f01212da4ed2b589e9d19c667e7d8f2dd51e.exe 32 PID 1676 wrote to memory of 2700 1676 1305a3f5b494db69f764f7ec1478f01212da4ed2b589e9d19c667e7d8f2dd51e.exe 32 PID 1676 wrote to memory of 2700 1676 1305a3f5b494db69f764f7ec1478f01212da4ed2b589e9d19c667e7d8f2dd51e.exe 32 PID 1676 wrote to memory of 2700 1676 1305a3f5b494db69f764f7ec1478f01212da4ed2b589e9d19c667e7d8f2dd51e.exe 32 PID 2700 wrote to memory of 2680 2700 cmd.exe 34 PID 2700 wrote to memory of 2680 2700 cmd.exe 34 PID 2700 wrote to memory of 2680 2700 cmd.exe 34 PID 2700 wrote to memory of 2680 2700 cmd.exe 34 PID 1676 wrote to memory of 1028 1676 1305a3f5b494db69f764f7ec1478f01212da4ed2b589e9d19c667e7d8f2dd51e.exe 35 PID 1676 wrote to memory of 1028 1676 1305a3f5b494db69f764f7ec1478f01212da4ed2b589e9d19c667e7d8f2dd51e.exe 35 PID 1676 wrote to memory of 1028 1676 1305a3f5b494db69f764f7ec1478f01212da4ed2b589e9d19c667e7d8f2dd51e.exe 35 PID 1676 wrote to memory of 1028 1676 1305a3f5b494db69f764f7ec1478f01212da4ed2b589e9d19c667e7d8f2dd51e.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\1305a3f5b494db69f764f7ec1478f01212da4ed2b589e9d19c667e7d8f2dd51e.exe"C:\Users\Admin\AppData\Local\Temp\1305a3f5b494db69f764f7ec1478f01212da4ed2b589e9d19c667e7d8f2dd51e.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3064
-
-
C:\Users\Admin\AppData\Local\Temp\1305a3f5b494db69f764f7ec1478f01212da4ed2b589e9d19c667e7d8f2dd51e.exe"C:\Users\Admin\AppData\Local\Temp\1305a3f5b494db69f764f7ec1478f01212da4ed2b589e9d19c667e7d8f2dd51e.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\YGUTF.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows WA" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2680
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1028 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"4⤵PID:976
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"4⤵PID:2136
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"4⤵PID:1036
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148B
MD53a4614705555abb049c3298e61170b7f
SHA1c8686410756f346d9551256a5b878b04770950ba
SHA256cff0663c8cfadf83b80583a871c313ffc5d950cb503809cb4a482f400c5d846b
SHA51265ce6fec00e6934f21635e7ccd74757f31ed4b0ddb52bd80d3ea9abeba56340128d23151ef7d9f5daacb5d61e4a4cca50dbb3a43132e350522311ee06e829007
-
Filesize
112KB
MD579295a2f440f14ac6ea018c0c376c763
SHA1027cc629202db121f31f722ad21efe9e7d4dec3f
SHA256f1b4c66ba8483c951bd1d164cb1df190e2de46a900721b281981b0286208ee51
SHA5123a8c7a970c0105ae6a24f78289874b66465c216d7ae38fde8244a30e75fef9d3ba439c26a3301f4f9886e6df482e4e18f02e5d7a45ea67b55fb1f3101f4a7647