Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-12-2024 14:16

General

  • Target

    PO#3_RKG367.bat

  • Size

    2.1MB

  • MD5

    deaa9cb6ee189b95d1ad718df32dac56

  • SHA1

    ba94e1e97609cfa1bd102fe1087fc714875c6c25

  • SHA256

    8f721d0dc987c60cb16a14ad166eab606b1b9401d6563241eb8ed359c24ad201

  • SHA512

    02908f9c7ce3a1d53af14de4465744585b23d31e99e08d2a64030f60eac5da5505c93e5fe4de91aeb77b85377d57b047ed8a5d5262fd08dcffa30943b0bb88e1

  • SSDEEP

    49152:dCPDyxXvtkfpoX/xXGkA++z8+j+Dl+T++evHN+C2+1r+E++eaU++p+++7C+z+++q:n

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 61 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PO#3_RKG367.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5060
    • C:\Windows\system32\findstr.exe
      findstr /e "'v" "C:\Users\Admin\AppData\Local\Temp\PO#3_RKG367.bat"
      2⤵
        PID:4428
      • C:\Windows\system32\cscript.exe
        cscript //nologo C:\Users\Admin\AppData\Local\Temp\x.vbs
        2⤵
          PID:4620
        • C:\Users\Admin\AppData\Local\Temp\x.exe
          C:\Users\Admin\AppData\Local\Temp\x.exe
          2⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2452
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c C:\Users\Public\Libraries\FX.cmd
            3⤵
            • System Location Discovery: System Language Discovery
            PID:988
          • C:\Users\Public\Libraries\rpkhzpuO.pif
            C:\Users\Public\Libraries\rpkhzpuO.pif
            3⤵
            • Executes dropped EXE
            PID:5060
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 5060 -s 12
              4⤵
              • Program crash
              PID:2812
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5060 -ip 5060
        1⤵
          PID:1792

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\x

          Filesize

          1.7MB

          MD5

          d8f15231457f0255e22b60c2d9cdacd4

          SHA1

          a804611c22a7211c9c7e9a684770afceab4f5e50

          SHA256

          7dbee10bc4091a95ffb8d063ee9369488a108f15d5e633011a094d93133071c1

          SHA512

          c746de769651617bad3ab210d3172b420016a5819f972ba915ad44ab3307400302486fc505c09cfca32c3a0521695b0e2f25043bc71c8c887a708a84c9c4828e

        • C:\Users\Admin\AppData\Local\Temp\x

          Filesize

          4KB

          MD5

          acf8bffa8dfef9653507e588de3dd9af

          SHA1

          1ab15a8ad3f28f20206a7bf627063a506fda44de

          SHA256

          f3fa80c19acea92f6ecc062a4a00affd70dde30983f1358ae881bb2de1a45951

          SHA512

          cf82b5278c0cb88e9104331e1b30de9abbc4e1079d724617bc36132afc0a33d191bfb0ccc1dadaa3c98040b1d292de9988da0c86af73c3aad11331199b19250f

        • C:\Users\Admin\AppData\Local\Temp\x.exe

          Filesize

          1.3MB

          MD5

          e337ecd5680d121d6dd649956dc716ca

          SHA1

          198eaa7905760aa3fee7d7329ec6354096c6ba63

          SHA256

          80af0ddc803bb3cd14029cd9cee39d81b15b21fc126912efbdd7824ba740669b

          SHA512

          75783a2850f451e4733f7cfbbf1a9451041c040bb64b7df7aa19abe2fffddf45291c4706c5f606ee6ad168779b25c0d88de2481fc563dab1531bfd907cc20c92

        • C:\Users\Admin\AppData\Local\Temp\x.vbs

          Filesize

          380B

          MD5

          ec9a2fb69a379d913a4e0a953cd3b97c

          SHA1

          a0303ed9f787c042071a1286bba43a5bbdd0679e

          SHA256

          cf8268d158bb819ef158ff6ccbed64d5e379148a0adb1f73a082a01d56d0286b

          SHA512

          fef8e24a680991046bd7dacd6079c7e48c3031fe46caae722ea93797ee16c052073ba97959e992ea71ac7ab72fbcedaa5cf4a410657aac4c10ad24de6935e9d6

        • C:\Users\Public\Libraries\FX.cmd

          Filesize

          8KB

          MD5

          60cd0be570decd49e4798554639a05ae

          SHA1

          bd7bed69d9ab9a20b5263d74921c453f38477bcb

          SHA256

          ca6a6c849496453990beceef8c192d90908c0c615fa0a1d01bcd464bad6966a5

          SHA512

          ab3dbdb4ed95a0cb4072b23dd241149f48ecff8a69f16d81648e825d9d81a55954e5dd9bc46d3d7408421df30c901b9ad1385d1e70793fa8d715c86c9e800c57

        • C:\Users\Public\Libraries\rpkhzpuO.pif

          Filesize

          171KB

          MD5

          22331abcc9472cc9dc6f37faf333aa2c

          SHA1

          2a001c30ba79a19ceaf6a09c3567c70311760aa4

          SHA256

          bdfa725ec2a2c8ea5861d9b4c2f608e631a183fca7916c1e07a28b656cc8ec0c

          SHA512

          c7f5baad732424b975a426867d3d8b5424aa830aa172ed0ff0ef630070bf2b4213750e123a36d8c5a741e22d3999ca1d7e77c62d4b77d6295b20a38114b7843c

        • memory/2452-25100-0x0000000002440000-0x0000000002441000-memory.dmp

          Filesize

          4KB

        • memory/2452-25101-0x0000000002C40000-0x0000000003C40000-memory.dmp

          Filesize

          16.0MB

        • memory/2452-25102-0x0000000002C40000-0x0000000003C40000-memory.dmp

          Filesize

          16.0MB

        • memory/2452-25105-0x0000000002440000-0x0000000002441000-memory.dmp

          Filesize

          4KB

        • memory/2452-25104-0x0000000000400000-0x000000000054B000-memory.dmp

          Filesize

          1.3MB

        • memory/2452-25107-0x0000000002C40000-0x0000000003C40000-memory.dmp

          Filesize

          16.0MB

        • memory/2452-25110-0x0000000002C40000-0x0000000003C40000-memory.dmp

          Filesize

          16.0MB

        • memory/2452-25118-0x0000000002C40000-0x0000000003C40000-memory.dmp

          Filesize

          16.0MB

        • memory/2452-25136-0x0000000002C40000-0x0000000003C40000-memory.dmp

          Filesize

          16.0MB

        • memory/2452-25166-0x0000000002C40000-0x0000000003C40000-memory.dmp

          Filesize

          16.0MB

        • memory/2452-25165-0x0000000002C40000-0x0000000003C40000-memory.dmp

          Filesize

          16.0MB

        • memory/2452-25164-0x0000000002C40000-0x0000000003C40000-memory.dmp

          Filesize

          16.0MB

        • memory/2452-25162-0x0000000002C40000-0x0000000003C40000-memory.dmp

          Filesize

          16.0MB

        • memory/2452-25161-0x0000000002C40000-0x0000000003C40000-memory.dmp

          Filesize

          16.0MB

        • memory/2452-25160-0x0000000002C40000-0x0000000003C40000-memory.dmp

          Filesize

          16.0MB

        • memory/2452-25159-0x0000000002C40000-0x0000000003C40000-memory.dmp

          Filesize

          16.0MB

        • memory/2452-25157-0x0000000002C40000-0x0000000003C40000-memory.dmp

          Filesize

          16.0MB

        • memory/2452-25156-0x0000000002C40000-0x0000000003C40000-memory.dmp

          Filesize

          16.0MB

        • memory/2452-25155-0x0000000002C40000-0x0000000003C40000-memory.dmp

          Filesize

          16.0MB

        • memory/2452-25154-0x0000000002C40000-0x0000000003C40000-memory.dmp

          Filesize

          16.0MB

        • memory/2452-25152-0x0000000002C40000-0x0000000003C40000-memory.dmp

          Filesize

          16.0MB

        • memory/2452-25149-0x0000000002C40000-0x0000000003C40000-memory.dmp

          Filesize

          16.0MB

        • memory/2452-25150-0x0000000002C40000-0x0000000003C40000-memory.dmp

          Filesize

          16.0MB

        • memory/2452-25148-0x0000000002C40000-0x0000000003C40000-memory.dmp

          Filesize

          16.0MB

        • memory/2452-25147-0x0000000002C40000-0x0000000003C40000-memory.dmp

          Filesize

          16.0MB

        • memory/2452-25146-0x0000000002C40000-0x0000000003C40000-memory.dmp

          Filesize

          16.0MB

        • memory/2452-25145-0x0000000002C40000-0x0000000003C40000-memory.dmp

          Filesize

          16.0MB

        • memory/2452-25144-0x0000000002C40000-0x0000000003C40000-memory.dmp

          Filesize

          16.0MB

        • memory/2452-25143-0x0000000002C40000-0x0000000003C40000-memory.dmp

          Filesize

          16.0MB

        • memory/2452-25142-0x0000000002C40000-0x0000000003C40000-memory.dmp

          Filesize

          16.0MB

        • memory/2452-25139-0x0000000002C40000-0x0000000003C40000-memory.dmp

          Filesize

          16.0MB

        • memory/2452-25134-0x0000000002C40000-0x0000000003C40000-memory.dmp

          Filesize

          16.0MB

        • memory/2452-25132-0x0000000002C40000-0x0000000003C40000-memory.dmp

          Filesize

          16.0MB

        • memory/2452-25163-0x0000000002C40000-0x0000000003C40000-memory.dmp

          Filesize

          16.0MB

        • memory/2452-25128-0x0000000002C40000-0x0000000003C40000-memory.dmp

          Filesize

          16.0MB

        • memory/2452-25158-0x0000000002C40000-0x0000000003C40000-memory.dmp

          Filesize

          16.0MB

        • memory/2452-25126-0x0000000002C40000-0x0000000003C40000-memory.dmp

          Filesize

          16.0MB

        • memory/2452-25153-0x0000000002C40000-0x0000000003C40000-memory.dmp

          Filesize

          16.0MB

        • memory/2452-25151-0x0000000002C40000-0x0000000003C40000-memory.dmp

          Filesize

          16.0MB

        • memory/2452-25124-0x0000000002C40000-0x0000000003C40000-memory.dmp

          Filesize

          16.0MB

        • memory/2452-25123-0x0000000002C40000-0x0000000003C40000-memory.dmp

          Filesize

          16.0MB

        • memory/2452-25121-0x0000000002C40000-0x0000000003C40000-memory.dmp

          Filesize

          16.0MB

        • memory/2452-25141-0x0000000002C40000-0x0000000003C40000-memory.dmp

          Filesize

          16.0MB

        • memory/2452-25120-0x0000000002C40000-0x0000000003C40000-memory.dmp

          Filesize

          16.0MB

        • memory/2452-25140-0x0000000002C40000-0x0000000003C40000-memory.dmp

          Filesize

          16.0MB

        • memory/2452-25138-0x0000000002C40000-0x0000000003C40000-memory.dmp

          Filesize

          16.0MB

        • memory/2452-25137-0x0000000002C40000-0x0000000003C40000-memory.dmp

          Filesize

          16.0MB

        • memory/2452-25135-0x0000000002C40000-0x0000000003C40000-memory.dmp

          Filesize

          16.0MB

        • memory/2452-25117-0x0000000002C40000-0x0000000003C40000-memory.dmp

          Filesize

          16.0MB

        • memory/2452-25133-0x0000000002C40000-0x0000000003C40000-memory.dmp

          Filesize

          16.0MB

        • memory/2452-25116-0x0000000002C40000-0x0000000003C40000-memory.dmp

          Filesize

          16.0MB

        • memory/2452-25131-0x0000000002C40000-0x0000000003C40000-memory.dmp

          Filesize

          16.0MB

        • memory/2452-25130-0x0000000002C40000-0x0000000003C40000-memory.dmp

          Filesize

          16.0MB

        • memory/2452-25115-0x0000000002C40000-0x0000000003C40000-memory.dmp

          Filesize

          16.0MB

        • memory/2452-25129-0x0000000002C40000-0x0000000003C40000-memory.dmp

          Filesize

          16.0MB

        • memory/2452-25127-0x0000000002C40000-0x0000000003C40000-memory.dmp

          Filesize

          16.0MB

        • memory/2452-25114-0x0000000002C40000-0x0000000003C40000-memory.dmp

          Filesize

          16.0MB

        • memory/2452-25125-0x0000000002C40000-0x0000000003C40000-memory.dmp

          Filesize

          16.0MB

        • memory/2452-25113-0x0000000002C40000-0x0000000003C40000-memory.dmp

          Filesize

          16.0MB

        • memory/2452-25122-0x0000000002C40000-0x0000000003C40000-memory.dmp

          Filesize

          16.0MB

        • memory/2452-25112-0x0000000002C40000-0x0000000003C40000-memory.dmp

          Filesize

          16.0MB

        • memory/2452-25111-0x0000000002C40000-0x0000000003C40000-memory.dmp

          Filesize

          16.0MB

        • memory/2452-25119-0x0000000002C40000-0x0000000003C40000-memory.dmp

          Filesize

          16.0MB

        • memory/2452-25109-0x0000000002C40000-0x0000000003C40000-memory.dmp

          Filesize

          16.0MB

        • memory/2452-25108-0x0000000002C40000-0x0000000003C40000-memory.dmp

          Filesize

          16.0MB