Analysis
-
max time kernel
91s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2024 01:07
Static task
static1
Behavioral task
behavioral1
Sample
P1_2024_056209_MQ04865_ENQ_1045.cmd
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
P1_2024_056209_MQ04865_ENQ_1045.cmd
Resource
win10v2004-20241007-en
General
-
Target
P1_2024_056209_MQ04865_ENQ_1045.cmd
-
Size
2.1MB
-
MD5
e74e6f735a0aabae7ea551ec00081be9
-
SHA1
e21c6050c4b5598be0db7fff9abefdfcb8a78f04
-
SHA256
e66a156bc6d1ef4b56a572c4133de2559388152dc36d1f35860e2defa566caaa
-
SHA512
e26c43246087b24b40642f7fb412210a0cce295ce3009136d08596bcc644f74f4734e7f1375f2117d89a8935636d002d7b6c3065cd9aa2380a50c96d54c093c0
-
SSDEEP
49152:W/UYHg0ZTx0dUH7eZArfNZ+k+lT+n++a++m+oj7+h+VLV++l++NGv++Ts+++ga+R:6
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 61 IoCs
resource yara_rule behavioral2/memory/1508-26000-0x0000000002C90000-0x0000000003C90000-memory.dmp modiloader_stage2 behavioral2/memory/1508-26011-0x0000000002C90000-0x0000000003C90000-memory.dmp modiloader_stage2 behavioral2/memory/1508-26010-0x0000000002C90000-0x0000000003C90000-memory.dmp modiloader_stage2 behavioral2/memory/1508-26009-0x0000000002C90000-0x0000000003C90000-memory.dmp modiloader_stage2 behavioral2/memory/1508-26005-0x0000000002C90000-0x0000000003C90000-memory.dmp modiloader_stage2 behavioral2/memory/1508-26008-0x0000000002C90000-0x0000000003C90000-memory.dmp modiloader_stage2 behavioral2/memory/1508-26007-0x0000000002C90000-0x0000000003C90000-memory.dmp modiloader_stage2 behavioral2/memory/1508-26006-0x0000000002C90000-0x0000000003C90000-memory.dmp modiloader_stage2 behavioral2/memory/1508-26046-0x0000000002C90000-0x0000000003C90000-memory.dmp modiloader_stage2 behavioral2/memory/1508-26021-0x0000000002C90000-0x0000000003C90000-memory.dmp modiloader_stage2 behavioral2/memory/1508-26045-0x0000000002C90000-0x0000000003C90000-memory.dmp modiloader_stage2 behavioral2/memory/1508-26063-0x0000000002C90000-0x0000000003C90000-memory.dmp modiloader_stage2 behavioral2/memory/1508-26062-0x0000000002C90000-0x0000000003C90000-memory.dmp modiloader_stage2 behavioral2/memory/1508-26060-0x0000000002C90000-0x0000000003C90000-memory.dmp modiloader_stage2 behavioral2/memory/1508-26058-0x0000000002C90000-0x0000000003C90000-memory.dmp modiloader_stage2 behavioral2/memory/1508-26056-0x0000000002C90000-0x0000000003C90000-memory.dmp modiloader_stage2 behavioral2/memory/1508-26054-0x0000000002C90000-0x0000000003C90000-memory.dmp modiloader_stage2 behavioral2/memory/1508-26052-0x0000000002C90000-0x0000000003C90000-memory.dmp modiloader_stage2 behavioral2/memory/1508-26051-0x0000000002C90000-0x0000000003C90000-memory.dmp modiloader_stage2 behavioral2/memory/1508-26049-0x0000000002C90000-0x0000000003C90000-memory.dmp modiloader_stage2 behavioral2/memory/1508-26047-0x0000000002C90000-0x0000000003C90000-memory.dmp modiloader_stage2 behavioral2/memory/1508-26044-0x0000000002C90000-0x0000000003C90000-memory.dmp modiloader_stage2 behavioral2/memory/1508-26042-0x0000000002C90000-0x0000000003C90000-memory.dmp modiloader_stage2 behavioral2/memory/1508-26041-0x0000000002C90000-0x0000000003C90000-memory.dmp modiloader_stage2 behavioral2/memory/1508-26040-0x0000000002C90000-0x0000000003C90000-memory.dmp modiloader_stage2 behavioral2/memory/1508-26039-0x0000000002C90000-0x0000000003C90000-memory.dmp modiloader_stage2 behavioral2/memory/1508-26038-0x0000000002C90000-0x0000000003C90000-memory.dmp modiloader_stage2 behavioral2/memory/1508-26037-0x0000000002C90000-0x0000000003C90000-memory.dmp modiloader_stage2 behavioral2/memory/1508-26035-0x0000000002C90000-0x0000000003C90000-memory.dmp modiloader_stage2 behavioral2/memory/1508-26033-0x0000000002C90000-0x0000000003C90000-memory.dmp modiloader_stage2 behavioral2/memory/1508-26032-0x0000000002C90000-0x0000000003C90000-memory.dmp modiloader_stage2 behavioral2/memory/1508-26030-0x0000000002C90000-0x0000000003C90000-memory.dmp modiloader_stage2 behavioral2/memory/1508-26064-0x0000000002C90000-0x0000000003C90000-memory.dmp modiloader_stage2 behavioral2/memory/1508-26028-0x0000000002C90000-0x0000000003C90000-memory.dmp modiloader_stage2 behavioral2/memory/1508-26027-0x0000000002C90000-0x0000000003C90000-memory.dmp modiloader_stage2 behavioral2/memory/1508-26061-0x0000000002C90000-0x0000000003C90000-memory.dmp modiloader_stage2 behavioral2/memory/1508-26059-0x0000000002C90000-0x0000000003C90000-memory.dmp modiloader_stage2 behavioral2/memory/1508-26026-0x0000000002C90000-0x0000000003C90000-memory.dmp modiloader_stage2 behavioral2/memory/1508-26057-0x0000000002C90000-0x0000000003C90000-memory.dmp modiloader_stage2 behavioral2/memory/1508-26055-0x0000000002C90000-0x0000000003C90000-memory.dmp modiloader_stage2 behavioral2/memory/1508-26025-0x0000000002C90000-0x0000000003C90000-memory.dmp modiloader_stage2 behavioral2/memory/1508-26024-0x0000000002C90000-0x0000000003C90000-memory.dmp modiloader_stage2 behavioral2/memory/1508-26053-0x0000000002C90000-0x0000000003C90000-memory.dmp modiloader_stage2 behavioral2/memory/1508-26050-0x0000000002C90000-0x0000000003C90000-memory.dmp modiloader_stage2 behavioral2/memory/1508-26022-0x0000000002C90000-0x0000000003C90000-memory.dmp modiloader_stage2 behavioral2/memory/1508-26048-0x0000000002C90000-0x0000000003C90000-memory.dmp modiloader_stage2 behavioral2/memory/1508-26043-0x0000000002C90000-0x0000000003C90000-memory.dmp modiloader_stage2 behavioral2/memory/1508-26020-0x0000000002C90000-0x0000000003C90000-memory.dmp modiloader_stage2 behavioral2/memory/1508-26019-0x0000000002C90000-0x0000000003C90000-memory.dmp modiloader_stage2 behavioral2/memory/1508-26018-0x0000000002C90000-0x0000000003C90000-memory.dmp modiloader_stage2 behavioral2/memory/1508-26017-0x0000000002C90000-0x0000000003C90000-memory.dmp modiloader_stage2 behavioral2/memory/1508-26036-0x0000000002C90000-0x0000000003C90000-memory.dmp modiloader_stage2 behavioral2/memory/1508-26016-0x0000000002C90000-0x0000000003C90000-memory.dmp modiloader_stage2 behavioral2/memory/1508-26034-0x0000000002C90000-0x0000000003C90000-memory.dmp modiloader_stage2 behavioral2/memory/1508-26031-0x0000000002C90000-0x0000000003C90000-memory.dmp modiloader_stage2 behavioral2/memory/1508-26015-0x0000000002C90000-0x0000000003C90000-memory.dmp modiloader_stage2 behavioral2/memory/1508-26029-0x0000000002C90000-0x0000000003C90000-memory.dmp modiloader_stage2 behavioral2/memory/1508-26014-0x0000000002C90000-0x0000000003C90000-memory.dmp modiloader_stage2 behavioral2/memory/1508-26013-0x0000000002C90000-0x0000000003C90000-memory.dmp modiloader_stage2 behavioral2/memory/1508-26012-0x0000000002C90000-0x0000000003C90000-memory.dmp modiloader_stage2 behavioral2/memory/1508-26023-0x0000000002C90000-0x0000000003C90000-memory.dmp modiloader_stage2 -
Executes dropped EXE 2 IoCs
pid Process 1508 x.exe 2848 afvgxyoF.pif -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Foyxgvfa = "C:\\Users\\Public\\Foyxgvfa.url" x.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1508 set thread context of 2848 1508 x.exe 105 -
Program crash 1 IoCs
pid pid_target Process procid_target 2772 2848 WerFault.exe 105 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language x.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 37 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4892 wrote to memory of 4216 4892 cmd.exe 96 PID 4892 wrote to memory of 4216 4892 cmd.exe 96 PID 4892 wrote to memory of 4752 4892 cmd.exe 97 PID 4892 wrote to memory of 4752 4892 cmd.exe 97 PID 4892 wrote to memory of 1508 4892 cmd.exe 98 PID 4892 wrote to memory of 1508 4892 cmd.exe 98 PID 4892 wrote to memory of 1508 4892 cmd.exe 98 PID 1508 wrote to memory of 3852 1508 x.exe 103 PID 1508 wrote to memory of 3852 1508 x.exe 103 PID 1508 wrote to memory of 3852 1508 x.exe 103 PID 1508 wrote to memory of 2848 1508 x.exe 105 PID 1508 wrote to memory of 2848 1508 x.exe 105 PID 1508 wrote to memory of 2848 1508 x.exe 105 PID 1508 wrote to memory of 2848 1508 x.exe 105 PID 1508 wrote to memory of 2848 1508 x.exe 105
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\P1_2024_056209_MQ04865_ENQ_1045.cmd"1⤵
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Windows\system32\findstr.exefindstr /e "'v" "C:\Users\Admin\AppData\Local\Temp\P1_2024_056209_MQ04865_ENQ_1045.cmd"2⤵PID:4216
-
-
C:\Windows\system32\cscript.execscript //nologo C:\Users\Admin\AppData\Local\Temp\x.vbs2⤵PID:4752
-
-
C:\Users\Admin\AppData\Local\Temp\x.exeC:\Users\Admin\AppData\Local\Temp\x.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Public\Libraries\FX.cmd3⤵
- System Location Discovery: System Language Discovery
PID:3852
-
-
C:\Users\Public\Libraries\afvgxyoF.pifC:\Users\Public\Libraries\afvgxyoF.pif3⤵
- Executes dropped EXE
PID:2848 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2848 -s 124⤵
- Program crash
PID:2772
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2848 -ip 28481⤵PID:2192
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5bf38536008977969fa57ff4fca96af75
SHA11ff7c41ce6d80f772f6fa32e667285587ee21cbd
SHA2565171548d61d342b89a92969bb13e4431ea8acd46a7146f448ebdb49639f19e9f
SHA512f14c7a41d2e1b40b735071648db81d8cac2e5180a2062351365109ce384bcb317d7bc7ecbfb416d7614c1cdcae8c29180f937585e87b6ef43bcca8bbbe4046f1
-
Filesize
4KB
MD5a3aecfbaa811e50bc13de5d114f63d3c
SHA14a97cb37fabecfb8b42f82ede45b0166cba929a8
SHA256d0a93634d9d12cecb2096bf67ff5a89a7924c4da80b37cc96a3f5fdb62e1d478
SHA512b57309945c0b621c1164bb8890193681b717a674ff1568b6e3958b1ce7cf13e202b8a12e196a543c7db82a6fd3ffb394543652fe322dbf71a22a4eaf98320afe
-
Filesize
1.3MB
MD5d1f6b3bd433945255249291310f2e59e
SHA1b5a2b9ec979e17c4d1074e7d1a23b550cce578d5
SHA2567886e0dcb78a5d5e67f9d28272c24a29139accf9ff7616b659ffeb3eeaf1603a
SHA512116e88e5e5b4db7086d5efe759a3b7883ded9cd691327e3f71aee61f0920805a21118d801231b7c091c4ee8e7beca6f5efadd577031336775bc93f2bcbec2b5b
-
Filesize
380B
MD5ec9a2fb69a379d913a4e0a953cd3b97c
SHA1a0303ed9f787c042071a1286bba43a5bbdd0679e
SHA256cf8268d158bb819ef158ff6ccbed64d5e379148a0adb1f73a082a01d56d0286b
SHA512fef8e24a680991046bd7dacd6079c7e48c3031fe46caae722ea93797ee16c052073ba97959e992ea71ac7ab72fbcedaa5cf4a410657aac4c10ad24de6935e9d6
-
Filesize
8KB
MD560cd0be570decd49e4798554639a05ae
SHA1bd7bed69d9ab9a20b5263d74921c453f38477bcb
SHA256ca6a6c849496453990beceef8c192d90908c0c615fa0a1d01bcd464bad6966a5
SHA512ab3dbdb4ed95a0cb4072b23dd241149f48ecff8a69f16d81648e825d9d81a55954e5dd9bc46d3d7408421df30c901b9ad1385d1e70793fa8d715c86c9e800c57
-
Filesize
171KB
MD522331abcc9472cc9dc6f37faf333aa2c
SHA12a001c30ba79a19ceaf6a09c3567c70311760aa4
SHA256bdfa725ec2a2c8ea5861d9b4c2f608e631a183fca7916c1e07a28b656cc8ec0c
SHA512c7f5baad732424b975a426867d3d8b5424aa830aa172ed0ff0ef630070bf2b4213750e123a36d8c5a741e22d3999ca1d7e77c62d4b77d6295b20a38114b7843c