Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
31-12-2024 01:07
Static task
static1
Behavioral task
behavioral1
Sample
P1_2024_056209_MQ04865_ENQ_1045.cmd
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
P1_2024_056209_MQ04865_ENQ_1045.cmd
Resource
win10v2004-20241007-en
General
-
Target
P1_2024_056209_MQ04865_ENQ_1045.cmd
-
Size
2.1MB
-
MD5
e74e6f735a0aabae7ea551ec00081be9
-
SHA1
e21c6050c4b5598be0db7fff9abefdfcb8a78f04
-
SHA256
e66a156bc6d1ef4b56a572c4133de2559388152dc36d1f35860e2defa566caaa
-
SHA512
e26c43246087b24b40642f7fb412210a0cce295ce3009136d08596bcc644f74f4734e7f1375f2117d89a8935636d002d7b6c3065cd9aa2380a50c96d54c093c0
-
SSDEEP
49152:W/UYHg0ZTx0dUH7eZArfNZ+k+lT+n++a++m+oj7+h+VLV++l++NGv++Ts+++ga+R:6
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 61 IoCs
resource yara_rule behavioral1/memory/1576-25999-0x0000000003360000-0x0000000004360000-memory.dmp modiloader_stage2 behavioral1/memory/1576-26011-0x0000000003360000-0x0000000004360000-memory.dmp modiloader_stage2 behavioral1/memory/1576-26012-0x0000000003360000-0x0000000004360000-memory.dmp modiloader_stage2 behavioral1/memory/1576-26063-0x0000000003360000-0x0000000004360000-memory.dmp modiloader_stage2 behavioral1/memory/1576-26061-0x0000000003360000-0x0000000004360000-memory.dmp modiloader_stage2 behavioral1/memory/1576-26060-0x0000000003360000-0x0000000004360000-memory.dmp modiloader_stage2 behavioral1/memory/1576-26058-0x0000000003360000-0x0000000004360000-memory.dmp modiloader_stage2 behavioral1/memory/1576-26056-0x0000000003360000-0x0000000004360000-memory.dmp modiloader_stage2 behavioral1/memory/1576-26055-0x0000000003360000-0x0000000004360000-memory.dmp modiloader_stage2 behavioral1/memory/1576-26053-0x0000000003360000-0x0000000004360000-memory.dmp modiloader_stage2 behavioral1/memory/1576-26052-0x0000000003360000-0x0000000004360000-memory.dmp modiloader_stage2 behavioral1/memory/1576-26050-0x0000000003360000-0x0000000004360000-memory.dmp modiloader_stage2 behavioral1/memory/1576-26049-0x0000000003360000-0x0000000004360000-memory.dmp modiloader_stage2 behavioral1/memory/1576-26047-0x0000000003360000-0x0000000004360000-memory.dmp modiloader_stage2 behavioral1/memory/1576-26045-0x0000000003360000-0x0000000004360000-memory.dmp modiloader_stage2 behavioral1/memory/1576-26043-0x0000000003360000-0x0000000004360000-memory.dmp modiloader_stage2 behavioral1/memory/1576-26041-0x0000000003360000-0x0000000004360000-memory.dmp modiloader_stage2 behavioral1/memory/1576-26040-0x0000000003360000-0x0000000004360000-memory.dmp modiloader_stage2 behavioral1/memory/1576-26038-0x0000000003360000-0x0000000004360000-memory.dmp modiloader_stage2 behavioral1/memory/1576-26036-0x0000000003360000-0x0000000004360000-memory.dmp modiloader_stage2 behavioral1/memory/1576-26034-0x0000000003360000-0x0000000004360000-memory.dmp modiloader_stage2 behavioral1/memory/1576-26033-0x0000000003360000-0x0000000004360000-memory.dmp modiloader_stage2 behavioral1/memory/1576-26031-0x0000000003360000-0x0000000004360000-memory.dmp modiloader_stage2 behavioral1/memory/1576-26029-0x0000000003360000-0x0000000004360000-memory.dmp modiloader_stage2 behavioral1/memory/1576-26028-0x0000000003360000-0x0000000004360000-memory.dmp modiloader_stage2 behavioral1/memory/1576-26026-0x0000000003360000-0x0000000004360000-memory.dmp modiloader_stage2 behavioral1/memory/1576-26024-0x0000000003360000-0x0000000004360000-memory.dmp modiloader_stage2 behavioral1/memory/1576-26023-0x0000000003360000-0x0000000004360000-memory.dmp modiloader_stage2 behavioral1/memory/1576-26021-0x0000000003360000-0x0000000004360000-memory.dmp modiloader_stage2 behavioral1/memory/1576-26019-0x0000000003360000-0x0000000004360000-memory.dmp modiloader_stage2 behavioral1/memory/1576-26017-0x0000000003360000-0x0000000004360000-memory.dmp modiloader_stage2 behavioral1/memory/1576-26015-0x0000000003360000-0x0000000004360000-memory.dmp modiloader_stage2 behavioral1/memory/1576-26014-0x0000000003360000-0x0000000004360000-memory.dmp modiloader_stage2 behavioral1/memory/1576-26010-0x0000000003360000-0x0000000004360000-memory.dmp modiloader_stage2 behavioral1/memory/1576-26008-0x0000000003360000-0x0000000004360000-memory.dmp modiloader_stage2 behavioral1/memory/1576-26007-0x0000000003360000-0x0000000004360000-memory.dmp modiloader_stage2 behavioral1/memory/1576-26059-0x0000000003360000-0x0000000004360000-memory.dmp modiloader_stage2 behavioral1/memory/1576-26057-0x0000000003360000-0x0000000004360000-memory.dmp modiloader_stage2 behavioral1/memory/1576-26054-0x0000000003360000-0x0000000004360000-memory.dmp modiloader_stage2 behavioral1/memory/1576-26006-0x0000000003360000-0x0000000004360000-memory.dmp modiloader_stage2 behavioral1/memory/1576-26051-0x0000000003360000-0x0000000004360000-memory.dmp modiloader_stage2 behavioral1/memory/1576-26048-0x0000000003360000-0x0000000004360000-memory.dmp modiloader_stage2 behavioral1/memory/1576-26046-0x0000000003360000-0x0000000004360000-memory.dmp modiloader_stage2 behavioral1/memory/1576-26044-0x0000000003360000-0x0000000004360000-memory.dmp modiloader_stage2 behavioral1/memory/1576-26042-0x0000000003360000-0x0000000004360000-memory.dmp modiloader_stage2 behavioral1/memory/1576-26039-0x0000000003360000-0x0000000004360000-memory.dmp modiloader_stage2 behavioral1/memory/1576-26037-0x0000000003360000-0x0000000004360000-memory.dmp modiloader_stage2 behavioral1/memory/1576-26035-0x0000000003360000-0x0000000004360000-memory.dmp modiloader_stage2 behavioral1/memory/1576-26032-0x0000000003360000-0x0000000004360000-memory.dmp modiloader_stage2 behavioral1/memory/1576-26030-0x0000000003360000-0x0000000004360000-memory.dmp modiloader_stage2 behavioral1/memory/1576-26027-0x0000000003360000-0x0000000004360000-memory.dmp modiloader_stage2 behavioral1/memory/1576-26005-0x0000000003360000-0x0000000004360000-memory.dmp modiloader_stage2 behavioral1/memory/1576-26025-0x0000000003360000-0x0000000004360000-memory.dmp modiloader_stage2 behavioral1/memory/1576-26022-0x0000000003360000-0x0000000004360000-memory.dmp modiloader_stage2 behavioral1/memory/1576-26020-0x0000000003360000-0x0000000004360000-memory.dmp modiloader_stage2 behavioral1/memory/1576-26018-0x0000000003360000-0x0000000004360000-memory.dmp modiloader_stage2 behavioral1/memory/1576-26016-0x0000000003360000-0x0000000004360000-memory.dmp modiloader_stage2 behavioral1/memory/1576-26013-0x0000000003360000-0x0000000004360000-memory.dmp modiloader_stage2 behavioral1/memory/1576-26003-0x0000000003360000-0x0000000004360000-memory.dmp modiloader_stage2 behavioral1/memory/1576-26009-0x0000000003360000-0x0000000004360000-memory.dmp modiloader_stage2 behavioral1/memory/1576-26004-0x0000000003360000-0x0000000004360000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 1576 x.exe -
Loads dropped DLL 3 IoCs
pid Process 2748 WerFault.exe 2748 WerFault.exe 2748 WerFault.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2748 1576 WerFault.exe 34 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language x.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 1576 x.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2732 2172 cmd.exe 32 PID 2172 wrote to memory of 2732 2172 cmd.exe 32 PID 2172 wrote to memory of 2732 2172 cmd.exe 32 PID 2172 wrote to memory of 2676 2172 cmd.exe 33 PID 2172 wrote to memory of 2676 2172 cmd.exe 33 PID 2172 wrote to memory of 2676 2172 cmd.exe 33 PID 2172 wrote to memory of 1576 2172 cmd.exe 34 PID 2172 wrote to memory of 1576 2172 cmd.exe 34 PID 2172 wrote to memory of 1576 2172 cmd.exe 34 PID 2172 wrote to memory of 1576 2172 cmd.exe 34 PID 1576 wrote to memory of 2748 1576 x.exe 35 PID 1576 wrote to memory of 2748 1576 x.exe 35 PID 1576 wrote to memory of 2748 1576 x.exe 35 PID 1576 wrote to memory of 2748 1576 x.exe 35
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\P1_2024_056209_MQ04865_ENQ_1045.cmd"1⤵
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\system32\findstr.exefindstr /e "'v" "C:\Users\Admin\AppData\Local\Temp\P1_2024_056209_MQ04865_ENQ_1045.cmd"2⤵PID:2732
-
-
C:\Windows\system32\cscript.execscript //nologo C:\Users\Admin\AppData\Local\Temp\x.vbs2⤵PID:2676
-
-
C:\Users\Admin\AppData\Local\Temp\x.exeC:\Users\Admin\AppData\Local\Temp\x.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1576 -s 7083⤵
- Loads dropped DLL
- Program crash
PID:2748
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5bf38536008977969fa57ff4fca96af75
SHA11ff7c41ce6d80f772f6fa32e667285587ee21cbd
SHA2565171548d61d342b89a92969bb13e4431ea8acd46a7146f448ebdb49639f19e9f
SHA512f14c7a41d2e1b40b735071648db81d8cac2e5180a2062351365109ce384bcb317d7bc7ecbfb416d7614c1cdcae8c29180f937585e87b6ef43bcca8bbbe4046f1
-
Filesize
432B
MD55b3e845f0bb101a3be7f00b0c419a57a
SHA13d9274d21fff1b5b9fa81db542c581d1087d6a09
SHA2561d0fc61581539e0a702a41e6fa46ae6bbd3a0aca7db342a16823fcd5f3c9e71b
SHA512fed2982e6b76cb311aa7ba655f31f3b264dff6c56aa62bb216555e650b46c622b3005bd2d18b039dbd4ca2558d7ae203c975168f24f9058361155bf49aac01cd
-
Filesize
4KB
MD5a3aecfbaa811e50bc13de5d114f63d3c
SHA14a97cb37fabecfb8b42f82ede45b0166cba929a8
SHA256d0a93634d9d12cecb2096bf67ff5a89a7924c4da80b37cc96a3f5fdb62e1d478
SHA512b57309945c0b621c1164bb8890193681b717a674ff1568b6e3958b1ce7cf13e202b8a12e196a543c7db82a6fd3ffb394543652fe322dbf71a22a4eaf98320afe
-
Filesize
1.3MB
MD5d1f6b3bd433945255249291310f2e59e
SHA1b5a2b9ec979e17c4d1074e7d1a23b550cce578d5
SHA2567886e0dcb78a5d5e67f9d28272c24a29139accf9ff7616b659ffeb3eeaf1603a
SHA512116e88e5e5b4db7086d5efe759a3b7883ded9cd691327e3f71aee61f0920805a21118d801231b7c091c4ee8e7beca6f5efadd577031336775bc93f2bcbec2b5b
-
Filesize
380B
MD5ec9a2fb69a379d913a4e0a953cd3b97c
SHA1a0303ed9f787c042071a1286bba43a5bbdd0679e
SHA256cf8268d158bb819ef158ff6ccbed64d5e379148a0adb1f73a082a01d56d0286b
SHA512fef8e24a680991046bd7dacd6079c7e48c3031fe46caae722ea93797ee16c052073ba97959e992ea71ac7ab72fbcedaa5cf4a410657aac4c10ad24de6935e9d6