Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    31-12-2024 01:07

General

  • Target

    P1_2024_056209_MQ04865_ENQ_1045.cmd

  • Size

    2.1MB

  • MD5

    e74e6f735a0aabae7ea551ec00081be9

  • SHA1

    e21c6050c4b5598be0db7fff9abefdfcb8a78f04

  • SHA256

    e66a156bc6d1ef4b56a572c4133de2559388152dc36d1f35860e2defa566caaa

  • SHA512

    e26c43246087b24b40642f7fb412210a0cce295ce3009136d08596bcc644f74f4734e7f1375f2117d89a8935636d002d7b6c3065cd9aa2380a50c96d54c093c0

  • SSDEEP

    49152:W/UYHg0ZTx0dUH7eZArfNZ+k+lT+n++a++m+oj7+h+VLV++l++NGv++Ts+++ga+R:6

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 61 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\P1_2024_056209_MQ04865_ENQ_1045.cmd"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2172
    • C:\Windows\system32\findstr.exe
      findstr /e "'v" "C:\Users\Admin\AppData\Local\Temp\P1_2024_056209_MQ04865_ENQ_1045.cmd"
      2⤵
        PID:2732
      • C:\Windows\system32\cscript.exe
        cscript //nologo C:\Users\Admin\AppData\Local\Temp\x.vbs
        2⤵
          PID:2676
        • C:\Users\Admin\AppData\Local\Temp\x.exe
          C:\Users\Admin\AppData\Local\Temp\x.exe
          2⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: CmdExeWriteProcessMemorySpam
          • Suspicious use of WriteProcessMemory
          PID:1576
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1576 -s 708
            3⤵
            • Loads dropped DLL
            • Program crash
            PID:2748

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\x

        Filesize

        1.8MB

        MD5

        bf38536008977969fa57ff4fca96af75

        SHA1

        1ff7c41ce6d80f772f6fa32e667285587ee21cbd

        SHA256

        5171548d61d342b89a92969bb13e4431ea8acd46a7146f448ebdb49639f19e9f

        SHA512

        f14c7a41d2e1b40b735071648db81d8cac2e5180a2062351365109ce384bcb317d7bc7ecbfb416d7614c1cdcae8c29180f937585e87b6ef43bcca8bbbe4046f1

      • C:\Users\Admin\AppData\Local\Temp\x

        Filesize

        432B

        MD5

        5b3e845f0bb101a3be7f00b0c419a57a

        SHA1

        3d9274d21fff1b5b9fa81db542c581d1087d6a09

        SHA256

        1d0fc61581539e0a702a41e6fa46ae6bbd3a0aca7db342a16823fcd5f3c9e71b

        SHA512

        fed2982e6b76cb311aa7ba655f31f3b264dff6c56aa62bb216555e650b46c622b3005bd2d18b039dbd4ca2558d7ae203c975168f24f9058361155bf49aac01cd

      • C:\Users\Admin\AppData\Local\Temp\x

        Filesize

        4KB

        MD5

        a3aecfbaa811e50bc13de5d114f63d3c

        SHA1

        4a97cb37fabecfb8b42f82ede45b0166cba929a8

        SHA256

        d0a93634d9d12cecb2096bf67ff5a89a7924c4da80b37cc96a3f5fdb62e1d478

        SHA512

        b57309945c0b621c1164bb8890193681b717a674ff1568b6e3958b1ce7cf13e202b8a12e196a543c7db82a6fd3ffb394543652fe322dbf71a22a4eaf98320afe

      • C:\Users\Admin\AppData\Local\Temp\x.exe

        Filesize

        1.3MB

        MD5

        d1f6b3bd433945255249291310f2e59e

        SHA1

        b5a2b9ec979e17c4d1074e7d1a23b550cce578d5

        SHA256

        7886e0dcb78a5d5e67f9d28272c24a29139accf9ff7616b659ffeb3eeaf1603a

        SHA512

        116e88e5e5b4db7086d5efe759a3b7883ded9cd691327e3f71aee61f0920805a21118d801231b7c091c4ee8e7beca6f5efadd577031336775bc93f2bcbec2b5b

      • C:\Users\Admin\AppData\Local\Temp\x.vbs

        Filesize

        380B

        MD5

        ec9a2fb69a379d913a4e0a953cd3b97c

        SHA1

        a0303ed9f787c042071a1286bba43a5bbdd0679e

        SHA256

        cf8268d158bb819ef158ff6ccbed64d5e379148a0adb1f73a082a01d56d0286b

        SHA512

        fef8e24a680991046bd7dacd6079c7e48c3031fe46caae722ea93797ee16c052073ba97959e992ea71ac7ab72fbcedaa5cf4a410657aac4c10ad24de6935e9d6

      • memory/1576-25997-0x00000000002A0000-0x00000000002A1000-memory.dmp

        Filesize

        4KB

      • memory/1576-25998-0x0000000003360000-0x0000000004360000-memory.dmp

        Filesize

        16.0MB

      • memory/1576-25999-0x0000000003360000-0x0000000004360000-memory.dmp

        Filesize

        16.0MB

      • memory/1576-26001-0x0000000000400000-0x0000000000556000-memory.dmp

        Filesize

        1.3MB

      • memory/1576-26011-0x0000000003360000-0x0000000004360000-memory.dmp

        Filesize

        16.0MB

      • memory/1576-26012-0x0000000003360000-0x0000000004360000-memory.dmp

        Filesize

        16.0MB

      • memory/1576-26063-0x0000000003360000-0x0000000004360000-memory.dmp

        Filesize

        16.0MB

      • memory/1576-26061-0x0000000003360000-0x0000000004360000-memory.dmp

        Filesize

        16.0MB

      • memory/1576-26060-0x0000000003360000-0x0000000004360000-memory.dmp

        Filesize

        16.0MB

      • memory/1576-26058-0x0000000003360000-0x0000000004360000-memory.dmp

        Filesize

        16.0MB

      • memory/1576-26056-0x0000000003360000-0x0000000004360000-memory.dmp

        Filesize

        16.0MB

      • memory/1576-26055-0x0000000003360000-0x0000000004360000-memory.dmp

        Filesize

        16.0MB

      • memory/1576-26053-0x0000000003360000-0x0000000004360000-memory.dmp

        Filesize

        16.0MB

      • memory/1576-26052-0x0000000003360000-0x0000000004360000-memory.dmp

        Filesize

        16.0MB

      • memory/1576-26050-0x0000000003360000-0x0000000004360000-memory.dmp

        Filesize

        16.0MB

      • memory/1576-26049-0x0000000003360000-0x0000000004360000-memory.dmp

        Filesize

        16.0MB

      • memory/1576-26047-0x0000000003360000-0x0000000004360000-memory.dmp

        Filesize

        16.0MB

      • memory/1576-26045-0x0000000003360000-0x0000000004360000-memory.dmp

        Filesize

        16.0MB

      • memory/1576-26043-0x0000000003360000-0x0000000004360000-memory.dmp

        Filesize

        16.0MB

      • memory/1576-26041-0x0000000003360000-0x0000000004360000-memory.dmp

        Filesize

        16.0MB

      • memory/1576-26040-0x0000000003360000-0x0000000004360000-memory.dmp

        Filesize

        16.0MB

      • memory/1576-26038-0x0000000003360000-0x0000000004360000-memory.dmp

        Filesize

        16.0MB

      • memory/1576-26036-0x0000000003360000-0x0000000004360000-memory.dmp

        Filesize

        16.0MB

      • memory/1576-26034-0x0000000003360000-0x0000000004360000-memory.dmp

        Filesize

        16.0MB

      • memory/1576-26033-0x0000000003360000-0x0000000004360000-memory.dmp

        Filesize

        16.0MB

      • memory/1576-26031-0x0000000003360000-0x0000000004360000-memory.dmp

        Filesize

        16.0MB

      • memory/1576-26029-0x0000000003360000-0x0000000004360000-memory.dmp

        Filesize

        16.0MB

      • memory/1576-26028-0x0000000003360000-0x0000000004360000-memory.dmp

        Filesize

        16.0MB

      • memory/1576-26026-0x0000000003360000-0x0000000004360000-memory.dmp

        Filesize

        16.0MB

      • memory/1576-26024-0x0000000003360000-0x0000000004360000-memory.dmp

        Filesize

        16.0MB

      • memory/1576-26023-0x0000000003360000-0x0000000004360000-memory.dmp

        Filesize

        16.0MB

      • memory/1576-26021-0x0000000003360000-0x0000000004360000-memory.dmp

        Filesize

        16.0MB

      • memory/1576-26019-0x0000000003360000-0x0000000004360000-memory.dmp

        Filesize

        16.0MB

      • memory/1576-26017-0x0000000003360000-0x0000000004360000-memory.dmp

        Filesize

        16.0MB

      • memory/1576-26015-0x0000000003360000-0x0000000004360000-memory.dmp

        Filesize

        16.0MB

      • memory/1576-26014-0x0000000003360000-0x0000000004360000-memory.dmp

        Filesize

        16.0MB

      • memory/1576-26010-0x0000000003360000-0x0000000004360000-memory.dmp

        Filesize

        16.0MB

      • memory/1576-26008-0x0000000003360000-0x0000000004360000-memory.dmp

        Filesize

        16.0MB

      • memory/1576-26007-0x0000000003360000-0x0000000004360000-memory.dmp

        Filesize

        16.0MB

      • memory/1576-26059-0x0000000003360000-0x0000000004360000-memory.dmp

        Filesize

        16.0MB

      • memory/1576-26057-0x0000000003360000-0x0000000004360000-memory.dmp

        Filesize

        16.0MB

      • memory/1576-26054-0x0000000003360000-0x0000000004360000-memory.dmp

        Filesize

        16.0MB

      • memory/1576-26006-0x0000000003360000-0x0000000004360000-memory.dmp

        Filesize

        16.0MB

      • memory/1576-26051-0x0000000003360000-0x0000000004360000-memory.dmp

        Filesize

        16.0MB

      • memory/1576-26048-0x0000000003360000-0x0000000004360000-memory.dmp

        Filesize

        16.0MB

      • memory/1576-26046-0x0000000003360000-0x0000000004360000-memory.dmp

        Filesize

        16.0MB

      • memory/1576-26044-0x0000000003360000-0x0000000004360000-memory.dmp

        Filesize

        16.0MB

      • memory/1576-26042-0x0000000003360000-0x0000000004360000-memory.dmp

        Filesize

        16.0MB

      • memory/1576-26039-0x0000000003360000-0x0000000004360000-memory.dmp

        Filesize

        16.0MB

      • memory/1576-26037-0x0000000003360000-0x0000000004360000-memory.dmp

        Filesize

        16.0MB

      • memory/1576-26035-0x0000000003360000-0x0000000004360000-memory.dmp

        Filesize

        16.0MB

      • memory/1576-26032-0x0000000003360000-0x0000000004360000-memory.dmp

        Filesize

        16.0MB

      • memory/1576-26030-0x0000000003360000-0x0000000004360000-memory.dmp

        Filesize

        16.0MB

      • memory/1576-26027-0x0000000003360000-0x0000000004360000-memory.dmp

        Filesize

        16.0MB

      • memory/1576-26005-0x0000000003360000-0x0000000004360000-memory.dmp

        Filesize

        16.0MB

      • memory/1576-26025-0x0000000003360000-0x0000000004360000-memory.dmp

        Filesize

        16.0MB

      • memory/1576-26022-0x0000000003360000-0x0000000004360000-memory.dmp

        Filesize

        16.0MB

      • memory/1576-26020-0x0000000003360000-0x0000000004360000-memory.dmp

        Filesize

        16.0MB

      • memory/1576-26018-0x0000000003360000-0x0000000004360000-memory.dmp

        Filesize

        16.0MB

      • memory/1576-26016-0x0000000003360000-0x0000000004360000-memory.dmp

        Filesize

        16.0MB

      • memory/1576-26013-0x0000000003360000-0x0000000004360000-memory.dmp

        Filesize

        16.0MB

      • memory/1576-26003-0x0000000003360000-0x0000000004360000-memory.dmp

        Filesize

        16.0MB

      • memory/1576-26009-0x0000000003360000-0x0000000004360000-memory.dmp

        Filesize

        16.0MB

      • memory/1576-26004-0x0000000003360000-0x0000000004360000-memory.dmp

        Filesize

        16.0MB