Analysis

  • max time kernel
    7s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    26-12-2024 02:16

General

  • Target

    1305a3f5b494db69f764f7ec1478f01212da4ed2b589e9d19c667e7d8f2dd51e.exe

  • Size

    112KB

  • MD5

    1442e9fe5530ddb1cdae526a4ec8d273

  • SHA1

    331f5f7e0b4d02edc3159e0470245378f260520d

  • SHA256

    1305a3f5b494db69f764f7ec1478f01212da4ed2b589e9d19c667e7d8f2dd51e

  • SHA512

    356f1dd67c8dee86556fb418f29d31b8b80727f4e37a09953d505f8d42b80c2d96abdf11e02ca5a43a535a85500eb5e2ce54ccc821859585d640497d5a6abcf1

  • SSDEEP

    1536:t2ovIa47CqIf2f3w41p7sDcX7juR/JSJw8EeNshUDGXJi:tVIr7zI+fAceoGxSKKo5i

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1305a3f5b494db69f764f7ec1478f01212da4ed2b589e9d19c667e7d8f2dd51e.exe
    "C:\Users\Admin\AppData\Local\Temp\1305a3f5b494db69f764f7ec1478f01212da4ed2b589e9d19c667e7d8f2dd51e.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3044
    • C:\Windows\SysWOW64\svchost.exe
      "C:\Windows\system32\svchost.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3064
    • C:\Users\Admin\AppData\Local\Temp\1305a3f5b494db69f764f7ec1478f01212da4ed2b589e9d19c667e7d8f2dd51e.exe
      "C:\Users\Admin\AppData\Local\Temp\1305a3f5b494db69f764f7ec1478f01212da4ed2b589e9d19c667e7d8f2dd51e.exe"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1676
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\YGUTF.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2700
        • C:\Windows\SysWOW64\reg.exe
          REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows WA" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe" /f
          4⤵
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          PID:2680
      • C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1028
        • C:\Windows\SysWOW64\svchost.exe
          "C:\Windows\system32\svchost.exe"
          4⤵
            PID:976
          • C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"
            4⤵
              PID:2136
            • C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe
              "C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"
              4⤵
                PID:1036

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\YGUTF.bat

          Filesize

          148B

          MD5

          3a4614705555abb049c3298e61170b7f

          SHA1

          c8686410756f346d9551256a5b878b04770950ba

          SHA256

          cff0663c8cfadf83b80583a871c313ffc5d950cb503809cb4a482f400c5d846b

          SHA512

          65ce6fec00e6934f21635e7ccd74757f31ed4b0ddb52bd80d3ea9abeba56340128d23151ef7d9f5daacb5d61e4a4cca50dbb3a43132e350522311ee06e829007

        • \Users\Admin\AppData\Roaming\Microsoft\WAMain.exe

          Filesize

          112KB

          MD5

          79295a2f440f14ac6ea018c0c376c763

          SHA1

          027cc629202db121f31f722ad21efe9e7d4dec3f

          SHA256

          f1b4c66ba8483c951bd1d164cb1df190e2de46a900721b281981b0286208ee51

          SHA512

          3a8c7a970c0105ae6a24f78289874b66465c216d7ae38fde8244a30e75fef9d3ba439c26a3301f4f9886e6df482e4e18f02e5d7a45ea67b55fb1f3101f4a7647

        • memory/1036-291-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB

        • memory/1036-283-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB

        • memory/1676-128-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/1676-288-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/1676-111-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/1676-113-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/1676-115-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/1676-117-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/1676-119-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/2136-290-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/3044-43-0x0000000002300000-0x0000000002302000-memory.dmp

          Filesize

          8KB

        • memory/3044-2-0x00000000003B0000-0x00000000003B1000-memory.dmp

          Filesize

          4KB

        • memory/3044-90-0x0000000002480000-0x0000000002482000-memory.dmp

          Filesize

          8KB

        • memory/3044-4-0x00000000003B0000-0x00000000003B1000-memory.dmp

          Filesize

          4KB

        • memory/3044-8-0x00000000003D0000-0x00000000003D1000-memory.dmp

          Filesize

          4KB

        • memory/3044-14-0x0000000001B40000-0x0000000001B41000-memory.dmp

          Filesize

          4KB

        • memory/3044-82-0x0000000002490000-0x0000000002491000-memory.dmp

          Filesize

          4KB

        • memory/3044-20-0x0000000001BA0000-0x0000000001BA1000-memory.dmp

          Filesize

          4KB

        • memory/3044-75-0x0000000002470000-0x0000000002472000-memory.dmp

          Filesize

          8KB

        • memory/3044-64-0x0000000002330000-0x0000000002332000-memory.dmp

          Filesize

          8KB

        • memory/3044-38-0x0000000002300000-0x0000000002302000-memory.dmp

          Filesize

          8KB

        • memory/3044-91-0x00000000024B0000-0x00000000024B2000-memory.dmp

          Filesize

          8KB

        • memory/3044-50-0x0000000002310000-0x0000000002312000-memory.dmp

          Filesize

          8KB

        • memory/3044-28-0x00000000022C0000-0x00000000022C1000-memory.dmp

          Filesize

          4KB

        • memory/3044-32-0x00000000022E0000-0x00000000022E1000-memory.dmp

          Filesize

          4KB

        • memory/3064-109-0x0000000000400000-0x000000000040C000-memory.dmp

          Filesize

          48KB

        • memory/3064-110-0x0000000000400000-0x000000000040C000-memory.dmp

          Filesize

          48KB

        • memory/3064-94-0x0000000000400000-0x000000000040C000-memory.dmp

          Filesize

          48KB

        • memory/3064-129-0x0000000000400000-0x000000000040C000-memory.dmp

          Filesize

          48KB

        • memory/3064-289-0x0000000000400000-0x000000000040C000-memory.dmp

          Filesize

          48KB

        • memory/3064-96-0x0000000000400000-0x000000000040C000-memory.dmp

          Filesize

          48KB

        • memory/3064-92-0x0000000000400000-0x000000000040C000-memory.dmp

          Filesize

          48KB