Analysis
-
max time kernel
141s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2024 19:34
Static task
static1
Behavioral task
behavioral1
Sample
Document.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Document.exe
Resource
win10v2004-20241007-en
General
-
Target
Document.exe
-
Size
815KB
-
MD5
2099ced146bc62bad4277e87e4e6b871
-
SHA1
6dc0251d79ed48fb7a1868376832c3251773a07a
-
SHA256
41ff8d49d11ea8b822e218dc07c1ad06769ae52912d10706412eeac3144a950a
-
SHA512
d0f08ec9c734d727e36b16b70a4ee2475611782c250c507eaa30d8d4044f2c74cf20b2320b350355d6366c125ea7030ae43bab4263e00efc6c9f7dac0037eed1
-
SSDEEP
12288:km+S04oKCCg7GyrwiXQVtTRsVFjYIZATZ0Br5iomW6pbZe:HXivCg7hwmQ7uVhl+Z0t5wpbZe
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 64 IoCs
resource yara_rule behavioral2/memory/4332-1-0x0000000003EC0000-0x0000000003EEA000-memory.dmp modiloader_stage2 behavioral2/memory/4332-44-0x0000000003EC0000-0x0000000003EEA000-memory.dmp modiloader_stage2 behavioral2/memory/4332-48-0x0000000003EC0000-0x0000000003EEA000-memory.dmp modiloader_stage2 behavioral2/memory/4332-68-0x0000000003EC0000-0x0000000003EEA000-memory.dmp modiloader_stage2 behavioral2/memory/4332-74-0x0000000003EC0000-0x0000000003EEA000-memory.dmp modiloader_stage2 behavioral2/memory/4332-77-0x0000000003EC0000-0x0000000003EEA000-memory.dmp modiloader_stage2 behavioral2/memory/4332-76-0x0000000003EC0000-0x0000000003EEA000-memory.dmp modiloader_stage2 behavioral2/memory/4332-75-0x0000000003EC0000-0x0000000003EEA000-memory.dmp modiloader_stage2 behavioral2/memory/4332-73-0x0000000003EC0000-0x0000000003EEA000-memory.dmp modiloader_stage2 behavioral2/memory/4332-72-0x0000000003EC0000-0x0000000003EEA000-memory.dmp modiloader_stage2 behavioral2/memory/4332-71-0x0000000003EC0000-0x0000000003EEA000-memory.dmp modiloader_stage2 behavioral2/memory/4332-70-0x0000000003EC0000-0x0000000003EEA000-memory.dmp modiloader_stage2 behavioral2/memory/4332-69-0x0000000003EC0000-0x0000000003EEA000-memory.dmp modiloader_stage2 behavioral2/memory/4332-66-0x0000000003EC0000-0x0000000003EEA000-memory.dmp modiloader_stage2 behavioral2/memory/4332-67-0x0000000003EC0000-0x0000000003EEA000-memory.dmp modiloader_stage2 behavioral2/memory/4332-65-0x0000000003EC0000-0x0000000003EEA000-memory.dmp modiloader_stage2 behavioral2/memory/4332-64-0x0000000003EC0000-0x0000000003EEA000-memory.dmp modiloader_stage2 behavioral2/memory/4332-63-0x0000000003EC0000-0x0000000003EEA000-memory.dmp modiloader_stage2 behavioral2/memory/4332-62-0x0000000003EC0000-0x0000000003EEA000-memory.dmp modiloader_stage2 behavioral2/memory/4332-61-0x0000000003EC0000-0x0000000003EEA000-memory.dmp modiloader_stage2 behavioral2/memory/4332-60-0x0000000003EC0000-0x0000000003EEA000-memory.dmp modiloader_stage2 behavioral2/memory/4332-59-0x0000000003EC0000-0x0000000003EEA000-memory.dmp modiloader_stage2 behavioral2/memory/4332-58-0x0000000003EC0000-0x0000000003EEA000-memory.dmp modiloader_stage2 behavioral2/memory/4332-57-0x0000000003EC0000-0x0000000003EEA000-memory.dmp modiloader_stage2 behavioral2/memory/4332-56-0x0000000003EC0000-0x0000000003EEA000-memory.dmp modiloader_stage2 behavioral2/memory/4332-55-0x0000000003EC0000-0x0000000003EEA000-memory.dmp modiloader_stage2 behavioral2/memory/4332-54-0x0000000003EC0000-0x0000000003EEA000-memory.dmp modiloader_stage2 behavioral2/memory/4332-53-0x0000000003EC0000-0x0000000003EEA000-memory.dmp modiloader_stage2 behavioral2/memory/4332-52-0x0000000003EC0000-0x0000000003EEA000-memory.dmp modiloader_stage2 behavioral2/memory/4332-51-0x0000000003EC0000-0x0000000003EEA000-memory.dmp modiloader_stage2 behavioral2/memory/4332-50-0x0000000003EC0000-0x0000000003EEA000-memory.dmp modiloader_stage2 behavioral2/memory/4332-49-0x0000000003EC0000-0x0000000003EEA000-memory.dmp modiloader_stage2 behavioral2/memory/4332-47-0x0000000003EC0000-0x0000000003EEA000-memory.dmp modiloader_stage2 behavioral2/memory/4332-46-0x0000000003EC0000-0x0000000003EEA000-memory.dmp modiloader_stage2 behavioral2/memory/4332-45-0x0000000003EC0000-0x0000000003EEA000-memory.dmp modiloader_stage2 behavioral2/memory/4332-43-0x0000000003EC0000-0x0000000003EEA000-memory.dmp modiloader_stage2 behavioral2/memory/4332-42-0x0000000003EC0000-0x0000000003EEA000-memory.dmp modiloader_stage2 behavioral2/memory/4332-41-0x0000000003EC0000-0x0000000003EEA000-memory.dmp modiloader_stage2 behavioral2/memory/4332-40-0x0000000003EC0000-0x0000000003EEA000-memory.dmp modiloader_stage2 behavioral2/memory/4332-38-0x0000000003EC0000-0x0000000003EEA000-memory.dmp modiloader_stage2 behavioral2/memory/4332-36-0x0000000003EC0000-0x0000000003EEA000-memory.dmp modiloader_stage2 behavioral2/memory/4332-37-0x0000000003EC0000-0x0000000003EEA000-memory.dmp modiloader_stage2 behavioral2/memory/4332-35-0x0000000003EC0000-0x0000000003EEA000-memory.dmp modiloader_stage2 behavioral2/memory/4332-34-0x0000000003EC0000-0x0000000003EEA000-memory.dmp modiloader_stage2 behavioral2/memory/4332-33-0x0000000003EC0000-0x0000000003EEA000-memory.dmp modiloader_stage2 behavioral2/memory/4332-32-0x0000000003EC0000-0x0000000003EEA000-memory.dmp modiloader_stage2 behavioral2/memory/4332-31-0x0000000003EC0000-0x0000000003EEA000-memory.dmp modiloader_stage2 behavioral2/memory/4332-30-0x0000000003EC0000-0x0000000003EEA000-memory.dmp modiloader_stage2 behavioral2/memory/4332-29-0x0000000003EC0000-0x0000000003EEA000-memory.dmp modiloader_stage2 behavioral2/memory/4332-28-0x0000000003EC0000-0x0000000003EEA000-memory.dmp modiloader_stage2 behavioral2/memory/4332-27-0x0000000003EC0000-0x0000000003EEA000-memory.dmp modiloader_stage2 behavioral2/memory/4332-25-0x0000000003EC0000-0x0000000003EEA000-memory.dmp modiloader_stage2 behavioral2/memory/4332-26-0x0000000003EC0000-0x0000000003EEA000-memory.dmp modiloader_stage2 behavioral2/memory/4332-24-0x0000000003EC0000-0x0000000003EEA000-memory.dmp modiloader_stage2 behavioral2/memory/4332-23-0x0000000003EC0000-0x0000000003EEA000-memory.dmp modiloader_stage2 behavioral2/memory/4332-20-0x0000000003EC0000-0x0000000003EEA000-memory.dmp modiloader_stage2 behavioral2/memory/4332-22-0x0000000003EC0000-0x0000000003EEA000-memory.dmp modiloader_stage2 behavioral2/memory/4332-21-0x0000000003EC0000-0x0000000003EEA000-memory.dmp modiloader_stage2 behavioral2/memory/4332-19-0x0000000003EC0000-0x0000000003EEA000-memory.dmp modiloader_stage2 behavioral2/memory/4332-18-0x0000000003EC0000-0x0000000003EEA000-memory.dmp modiloader_stage2 behavioral2/memory/4332-17-0x0000000003EC0000-0x0000000003EEA000-memory.dmp modiloader_stage2 behavioral2/memory/4332-16-0x0000000003EC0000-0x0000000003EEA000-memory.dmp modiloader_stage2 behavioral2/memory/4332-15-0x0000000003EC0000-0x0000000003EEA000-memory.dmp modiloader_stage2 behavioral2/memory/4332-14-0x0000000003EC0000-0x0000000003EEA000-memory.dmp modiloader_stage2 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Document.exe