Analysis

  • max time kernel
    91s
  • max time network
    131s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-12-2024 01:07

General

  • Target

    P1_2024_056209_MQ04865_ENQ_1045.cmd

  • Size

    2.1MB

  • MD5

    e74e6f735a0aabae7ea551ec00081be9

  • SHA1

    e21c6050c4b5598be0db7fff9abefdfcb8a78f04

  • SHA256

    e66a156bc6d1ef4b56a572c4133de2559388152dc36d1f35860e2defa566caaa

  • SHA512

    e26c43246087b24b40642f7fb412210a0cce295ce3009136d08596bcc644f74f4734e7f1375f2117d89a8935636d002d7b6c3065cd9aa2380a50c96d54c093c0

  • SSDEEP

    49152:W/UYHg0ZTx0dUH7eZArfNZ+k+lT+n++a++m+oj7+h+VLV++l++NGv++Ts+++ga+R:6

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 61 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\P1_2024_056209_MQ04865_ENQ_1045.cmd"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4892
    • C:\Windows\system32\findstr.exe
      findstr /e "'v" "C:\Users\Admin\AppData\Local\Temp\P1_2024_056209_MQ04865_ENQ_1045.cmd"
      2⤵
        PID:4216
      • C:\Windows\system32\cscript.exe
        cscript //nologo C:\Users\Admin\AppData\Local\Temp\x.vbs
        2⤵
          PID:4752
        • C:\Users\Admin\AppData\Local\Temp\x.exe
          C:\Users\Admin\AppData\Local\Temp\x.exe
          2⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1508
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c C:\Users\Public\Libraries\FX.cmd
            3⤵
            • System Location Discovery: System Language Discovery
            PID:3852
          • C:\Users\Public\Libraries\afvgxyoF.pif
            C:\Users\Public\Libraries\afvgxyoF.pif
            3⤵
            • Executes dropped EXE
            PID:2848
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2848 -s 12
              4⤵
              • Program crash
              PID:2772
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2848 -ip 2848
        1⤵
          PID:2192

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\x

          Filesize

          1.8MB

          MD5

          bf38536008977969fa57ff4fca96af75

          SHA1

          1ff7c41ce6d80f772f6fa32e667285587ee21cbd

          SHA256

          5171548d61d342b89a92969bb13e4431ea8acd46a7146f448ebdb49639f19e9f

          SHA512

          f14c7a41d2e1b40b735071648db81d8cac2e5180a2062351365109ce384bcb317d7bc7ecbfb416d7614c1cdcae8c29180f937585e87b6ef43bcca8bbbe4046f1

        • C:\Users\Admin\AppData\Local\Temp\x

          Filesize

          4KB

          MD5

          a3aecfbaa811e50bc13de5d114f63d3c

          SHA1

          4a97cb37fabecfb8b42f82ede45b0166cba929a8

          SHA256

          d0a93634d9d12cecb2096bf67ff5a89a7924c4da80b37cc96a3f5fdb62e1d478

          SHA512

          b57309945c0b621c1164bb8890193681b717a674ff1568b6e3958b1ce7cf13e202b8a12e196a543c7db82a6fd3ffb394543652fe322dbf71a22a4eaf98320afe

        • C:\Users\Admin\AppData\Local\Temp\x.exe

          Filesize

          1.3MB

          MD5

          d1f6b3bd433945255249291310f2e59e

          SHA1

          b5a2b9ec979e17c4d1074e7d1a23b550cce578d5

          SHA256

          7886e0dcb78a5d5e67f9d28272c24a29139accf9ff7616b659ffeb3eeaf1603a

          SHA512

          116e88e5e5b4db7086d5efe759a3b7883ded9cd691327e3f71aee61f0920805a21118d801231b7c091c4ee8e7beca6f5efadd577031336775bc93f2bcbec2b5b

        • C:\Users\Admin\AppData\Local\Temp\x.vbs

          Filesize

          380B

          MD5

          ec9a2fb69a379d913a4e0a953cd3b97c

          SHA1

          a0303ed9f787c042071a1286bba43a5bbdd0679e

          SHA256

          cf8268d158bb819ef158ff6ccbed64d5e379148a0adb1f73a082a01d56d0286b

          SHA512

          fef8e24a680991046bd7dacd6079c7e48c3031fe46caae722ea93797ee16c052073ba97959e992ea71ac7ab72fbcedaa5cf4a410657aac4c10ad24de6935e9d6

        • C:\Users\Public\Libraries\FX.cmd

          Filesize

          8KB

          MD5

          60cd0be570decd49e4798554639a05ae

          SHA1

          bd7bed69d9ab9a20b5263d74921c453f38477bcb

          SHA256

          ca6a6c849496453990beceef8c192d90908c0c615fa0a1d01bcd464bad6966a5

          SHA512

          ab3dbdb4ed95a0cb4072b23dd241149f48ecff8a69f16d81648e825d9d81a55954e5dd9bc46d3d7408421df30c901b9ad1385d1e70793fa8d715c86c9e800c57

        • C:\Users\Public\Libraries\afvgxyoF.pif

          Filesize

          171KB

          MD5

          22331abcc9472cc9dc6f37faf333aa2c

          SHA1

          2a001c30ba79a19ceaf6a09c3567c70311760aa4

          SHA256

          bdfa725ec2a2c8ea5861d9b4c2f608e631a183fca7916c1e07a28b656cc8ec0c

          SHA512

          c7f5baad732424b975a426867d3d8b5424aa830aa172ed0ff0ef630070bf2b4213750e123a36d8c5a741e22d3999ca1d7e77c62d4b77d6295b20a38114b7843c

        • memory/1508-25998-0x0000000000750000-0x0000000000751000-memory.dmp

          Filesize

          4KB

        • memory/1508-25999-0x0000000002C90000-0x0000000003C90000-memory.dmp

          Filesize

          16.0MB

        • memory/1508-26000-0x0000000002C90000-0x0000000003C90000-memory.dmp

          Filesize

          16.0MB

        • memory/1508-26003-0x0000000000750000-0x0000000000751000-memory.dmp

          Filesize

          4KB

        • memory/1508-26002-0x0000000000400000-0x0000000000556000-memory.dmp

          Filesize

          1.3MB

        • memory/1508-26011-0x0000000002C90000-0x0000000003C90000-memory.dmp

          Filesize

          16.0MB

        • memory/1508-26010-0x0000000002C90000-0x0000000003C90000-memory.dmp

          Filesize

          16.0MB

        • memory/1508-26009-0x0000000002C90000-0x0000000003C90000-memory.dmp

          Filesize

          16.0MB

        • memory/1508-26005-0x0000000002C90000-0x0000000003C90000-memory.dmp

          Filesize

          16.0MB

        • memory/1508-26008-0x0000000002C90000-0x0000000003C90000-memory.dmp

          Filesize

          16.0MB

        • memory/1508-26007-0x0000000002C90000-0x0000000003C90000-memory.dmp

          Filesize

          16.0MB

        • memory/1508-26006-0x0000000002C90000-0x0000000003C90000-memory.dmp

          Filesize

          16.0MB

        • memory/1508-26046-0x0000000002C90000-0x0000000003C90000-memory.dmp

          Filesize

          16.0MB

        • memory/1508-26021-0x0000000002C90000-0x0000000003C90000-memory.dmp

          Filesize

          16.0MB

        • memory/1508-26045-0x0000000002C90000-0x0000000003C90000-memory.dmp

          Filesize

          16.0MB

        • memory/1508-26063-0x0000000002C90000-0x0000000003C90000-memory.dmp

          Filesize

          16.0MB

        • memory/1508-26062-0x0000000002C90000-0x0000000003C90000-memory.dmp

          Filesize

          16.0MB

        • memory/1508-26060-0x0000000002C90000-0x0000000003C90000-memory.dmp

          Filesize

          16.0MB

        • memory/1508-26058-0x0000000002C90000-0x0000000003C90000-memory.dmp

          Filesize

          16.0MB

        • memory/1508-26056-0x0000000002C90000-0x0000000003C90000-memory.dmp

          Filesize

          16.0MB

        • memory/1508-26054-0x0000000002C90000-0x0000000003C90000-memory.dmp

          Filesize

          16.0MB

        • memory/1508-26052-0x0000000002C90000-0x0000000003C90000-memory.dmp

          Filesize

          16.0MB

        • memory/1508-26051-0x0000000002C90000-0x0000000003C90000-memory.dmp

          Filesize

          16.0MB

        • memory/1508-26049-0x0000000002C90000-0x0000000003C90000-memory.dmp

          Filesize

          16.0MB

        • memory/1508-26047-0x0000000002C90000-0x0000000003C90000-memory.dmp

          Filesize

          16.0MB

        • memory/1508-26044-0x0000000002C90000-0x0000000003C90000-memory.dmp

          Filesize

          16.0MB

        • memory/1508-26042-0x0000000002C90000-0x0000000003C90000-memory.dmp

          Filesize

          16.0MB

        • memory/1508-26041-0x0000000002C90000-0x0000000003C90000-memory.dmp

          Filesize

          16.0MB

        • memory/1508-26040-0x0000000002C90000-0x0000000003C90000-memory.dmp

          Filesize

          16.0MB

        • memory/1508-26039-0x0000000002C90000-0x0000000003C90000-memory.dmp

          Filesize

          16.0MB

        • memory/1508-26038-0x0000000002C90000-0x0000000003C90000-memory.dmp

          Filesize

          16.0MB

        • memory/1508-26037-0x0000000002C90000-0x0000000003C90000-memory.dmp

          Filesize

          16.0MB

        • memory/1508-26035-0x0000000002C90000-0x0000000003C90000-memory.dmp

          Filesize

          16.0MB

        • memory/1508-26033-0x0000000002C90000-0x0000000003C90000-memory.dmp

          Filesize

          16.0MB

        • memory/1508-26032-0x0000000002C90000-0x0000000003C90000-memory.dmp

          Filesize

          16.0MB

        • memory/1508-26030-0x0000000002C90000-0x0000000003C90000-memory.dmp

          Filesize

          16.0MB

        • memory/1508-26064-0x0000000002C90000-0x0000000003C90000-memory.dmp

          Filesize

          16.0MB

        • memory/1508-26028-0x0000000002C90000-0x0000000003C90000-memory.dmp

          Filesize

          16.0MB

        • memory/1508-26027-0x0000000002C90000-0x0000000003C90000-memory.dmp

          Filesize

          16.0MB

        • memory/1508-26061-0x0000000002C90000-0x0000000003C90000-memory.dmp

          Filesize

          16.0MB

        • memory/1508-26059-0x0000000002C90000-0x0000000003C90000-memory.dmp

          Filesize

          16.0MB

        • memory/1508-26026-0x0000000002C90000-0x0000000003C90000-memory.dmp

          Filesize

          16.0MB

        • memory/1508-26057-0x0000000002C90000-0x0000000003C90000-memory.dmp

          Filesize

          16.0MB

        • memory/1508-26055-0x0000000002C90000-0x0000000003C90000-memory.dmp

          Filesize

          16.0MB

        • memory/1508-26025-0x0000000002C90000-0x0000000003C90000-memory.dmp

          Filesize

          16.0MB

        • memory/1508-26024-0x0000000002C90000-0x0000000003C90000-memory.dmp

          Filesize

          16.0MB

        • memory/1508-26053-0x0000000002C90000-0x0000000003C90000-memory.dmp

          Filesize

          16.0MB

        • memory/1508-26050-0x0000000002C90000-0x0000000003C90000-memory.dmp

          Filesize

          16.0MB

        • memory/1508-26022-0x0000000002C90000-0x0000000003C90000-memory.dmp

          Filesize

          16.0MB

        • memory/1508-26048-0x0000000002C90000-0x0000000003C90000-memory.dmp

          Filesize

          16.0MB

        • memory/1508-26043-0x0000000002C90000-0x0000000003C90000-memory.dmp

          Filesize

          16.0MB

        • memory/1508-26020-0x0000000002C90000-0x0000000003C90000-memory.dmp

          Filesize

          16.0MB

        • memory/1508-26019-0x0000000002C90000-0x0000000003C90000-memory.dmp

          Filesize

          16.0MB

        • memory/1508-26018-0x0000000002C90000-0x0000000003C90000-memory.dmp

          Filesize

          16.0MB

        • memory/1508-26017-0x0000000002C90000-0x0000000003C90000-memory.dmp

          Filesize

          16.0MB

        • memory/1508-26036-0x0000000002C90000-0x0000000003C90000-memory.dmp

          Filesize

          16.0MB

        • memory/1508-26016-0x0000000002C90000-0x0000000003C90000-memory.dmp

          Filesize

          16.0MB

        • memory/1508-26034-0x0000000002C90000-0x0000000003C90000-memory.dmp

          Filesize

          16.0MB

        • memory/1508-26031-0x0000000002C90000-0x0000000003C90000-memory.dmp

          Filesize

          16.0MB

        • memory/1508-26015-0x0000000002C90000-0x0000000003C90000-memory.dmp

          Filesize

          16.0MB

        • memory/1508-26029-0x0000000002C90000-0x0000000003C90000-memory.dmp

          Filesize

          16.0MB

        • memory/1508-26014-0x0000000002C90000-0x0000000003C90000-memory.dmp

          Filesize

          16.0MB

        • memory/1508-26013-0x0000000002C90000-0x0000000003C90000-memory.dmp

          Filesize

          16.0MB

        • memory/1508-26012-0x0000000002C90000-0x0000000003C90000-memory.dmp

          Filesize

          16.0MB

        • memory/1508-26023-0x0000000002C90000-0x0000000003C90000-memory.dmp

          Filesize

          16.0MB