Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/12/2024, 01:11

General

  • Target

    P1_2024_056209_MQ04865_ENQ_1045.cmd

  • Size

    2.1MB

  • MD5

    e74e6f735a0aabae7ea551ec00081be9

  • SHA1

    e21c6050c4b5598be0db7fff9abefdfcb8a78f04

  • SHA256

    e66a156bc6d1ef4b56a572c4133de2559388152dc36d1f35860e2defa566caaa

  • SHA512

    e26c43246087b24b40642f7fb412210a0cce295ce3009136d08596bcc644f74f4734e7f1375f2117d89a8935636d002d7b6c3065cd9aa2380a50c96d54c093c0

  • SSDEEP

    49152:W/UYHg0ZTx0dUH7eZArfNZ+k+lT+n++a++m+oj7+h+VLV++l++NGv++Ts+++ga+R:6

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 61 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\P1_2024_056209_MQ04865_ENQ_1045.cmd"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4304
    • C:\Windows\system32\findstr.exe
      findstr /e "'v" "C:\Users\Admin\AppData\Local\Temp\P1_2024_056209_MQ04865_ENQ_1045.cmd"
      2⤵
        PID:3224
      • C:\Windows\system32\cscript.exe
        cscript //nologo C:\Users\Admin\AppData\Local\Temp\x.vbs
        2⤵
          PID:4624
        • C:\Users\Admin\AppData\Local\Temp\x.exe
          C:\Users\Admin\AppData\Local\Temp\x.exe
          2⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4344
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c C:\Users\Public\Libraries\FX.cmd
            3⤵
            • System Location Discovery: System Language Discovery
            PID:632
          • C:\Users\Public\Libraries\afvgxyoF.pif
            C:\Users\Public\Libraries\afvgxyoF.pif
            3⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:4624

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\x

              Filesize

              1.8MB

              MD5

              bf38536008977969fa57ff4fca96af75

              SHA1

              1ff7c41ce6d80f772f6fa32e667285587ee21cbd

              SHA256

              5171548d61d342b89a92969bb13e4431ea8acd46a7146f448ebdb49639f19e9f

              SHA512

              f14c7a41d2e1b40b735071648db81d8cac2e5180a2062351365109ce384bcb317d7bc7ecbfb416d7614c1cdcae8c29180f937585e87b6ef43bcca8bbbe4046f1

            • C:\Users\Admin\AppData\Local\Temp\x

              Filesize

              4KB

              MD5

              a3aecfbaa811e50bc13de5d114f63d3c

              SHA1

              4a97cb37fabecfb8b42f82ede45b0166cba929a8

              SHA256

              d0a93634d9d12cecb2096bf67ff5a89a7924c4da80b37cc96a3f5fdb62e1d478

              SHA512

              b57309945c0b621c1164bb8890193681b717a674ff1568b6e3958b1ce7cf13e202b8a12e196a543c7db82a6fd3ffb394543652fe322dbf71a22a4eaf98320afe

            • C:\Users\Admin\AppData\Local\Temp\x.exe

              Filesize

              1.3MB

              MD5

              d1f6b3bd433945255249291310f2e59e

              SHA1

              b5a2b9ec979e17c4d1074e7d1a23b550cce578d5

              SHA256

              7886e0dcb78a5d5e67f9d28272c24a29139accf9ff7616b659ffeb3eeaf1603a

              SHA512

              116e88e5e5b4db7086d5efe759a3b7883ded9cd691327e3f71aee61f0920805a21118d801231b7c091c4ee8e7beca6f5efadd577031336775bc93f2bcbec2b5b

            • C:\Users\Admin\AppData\Local\Temp\x.vbs

              Filesize

              380B

              MD5

              ec9a2fb69a379d913a4e0a953cd3b97c

              SHA1

              a0303ed9f787c042071a1286bba43a5bbdd0679e

              SHA256

              cf8268d158bb819ef158ff6ccbed64d5e379148a0adb1f73a082a01d56d0286b

              SHA512

              fef8e24a680991046bd7dacd6079c7e48c3031fe46caae722ea93797ee16c052073ba97959e992ea71ac7ab72fbcedaa5cf4a410657aac4c10ad24de6935e9d6

            • C:\Users\Public\Libraries\FX.cmd

              Filesize

              8KB

              MD5

              60cd0be570decd49e4798554639a05ae

              SHA1

              bd7bed69d9ab9a20b5263d74921c453f38477bcb

              SHA256

              ca6a6c849496453990beceef8c192d90908c0c615fa0a1d01bcd464bad6966a5

              SHA512

              ab3dbdb4ed95a0cb4072b23dd241149f48ecff8a69f16d81648e825d9d81a55954e5dd9bc46d3d7408421df30c901b9ad1385d1e70793fa8d715c86c9e800c57

            • C:\Users\Public\Libraries\afvgxyoF.pif

              Filesize

              171KB

              MD5

              22331abcc9472cc9dc6f37faf333aa2c

              SHA1

              2a001c30ba79a19ceaf6a09c3567c70311760aa4

              SHA256

              bdfa725ec2a2c8ea5861d9b4c2f608e631a183fca7916c1e07a28b656cc8ec0c

              SHA512

              c7f5baad732424b975a426867d3d8b5424aa830aa172ed0ff0ef630070bf2b4213750e123a36d8c5a741e22d3999ca1d7e77c62d4b77d6295b20a38114b7843c

            • memory/4344-25998-0x0000000002330000-0x0000000002331000-memory.dmp

              Filesize

              4KB

            • memory/4344-25999-0x0000000002D00000-0x0000000003D00000-memory.dmp

              Filesize

              16.0MB

            • memory/4344-26000-0x0000000002D00000-0x0000000003D00000-memory.dmp

              Filesize

              16.0MB

            • memory/4344-26003-0x0000000002330000-0x0000000002331000-memory.dmp

              Filesize

              4KB

            • memory/4344-26002-0x0000000000400000-0x0000000000556000-memory.dmp

              Filesize

              1.3MB

            • memory/4344-26006-0x0000000002D00000-0x0000000003D00000-memory.dmp

              Filesize

              16.0MB

            • memory/4344-26009-0x0000000002D00000-0x0000000003D00000-memory.dmp

              Filesize

              16.0MB

            • memory/4344-26015-0x0000000002D00000-0x0000000003D00000-memory.dmp

              Filesize

              16.0MB

            • memory/4344-26024-0x0000000002D00000-0x0000000003D00000-memory.dmp

              Filesize

              16.0MB

            • memory/4344-26039-0x0000000002D00000-0x0000000003D00000-memory.dmp

              Filesize

              16.0MB

            • memory/4344-26063-0x0000000002D00000-0x0000000003D00000-memory.dmp

              Filesize

              16.0MB

            • memory/4344-26065-0x0000000002D00000-0x0000000003D00000-memory.dmp

              Filesize

              16.0MB

            • memory/4344-26062-0x0000000002D00000-0x0000000003D00000-memory.dmp

              Filesize

              16.0MB

            • memory/4344-26061-0x0000000002D00000-0x0000000003D00000-memory.dmp

              Filesize

              16.0MB

            • memory/4344-26060-0x0000000002D00000-0x0000000003D00000-memory.dmp

              Filesize

              16.0MB

            • memory/4344-26059-0x0000000002D00000-0x0000000003D00000-memory.dmp

              Filesize

              16.0MB

            • memory/4344-26058-0x0000000002D00000-0x0000000003D00000-memory.dmp

              Filesize

              16.0MB

            • memory/4344-26056-0x0000000002D00000-0x0000000003D00000-memory.dmp

              Filesize

              16.0MB

            • memory/4344-26053-0x0000000002D00000-0x0000000003D00000-memory.dmp

              Filesize

              16.0MB

            • memory/4344-26051-0x0000000002D00000-0x0000000003D00000-memory.dmp

              Filesize

              16.0MB

            • memory/4344-26049-0x0000000002D00000-0x0000000003D00000-memory.dmp

              Filesize

              16.0MB

            • memory/4344-26048-0x0000000002D00000-0x0000000003D00000-memory.dmp

              Filesize

              16.0MB

            • memory/4344-26042-0x0000000002D00000-0x0000000003D00000-memory.dmp

              Filesize

              16.0MB

            • memory/4344-26041-0x0000000002D00000-0x0000000003D00000-memory.dmp

              Filesize

              16.0MB

            • memory/4344-26040-0x0000000002D00000-0x0000000003D00000-memory.dmp

              Filesize

              16.0MB

            • memory/4344-26037-0x0000000002D00000-0x0000000003D00000-memory.dmp

              Filesize

              16.0MB

            • memory/4344-26035-0x0000000002D00000-0x0000000003D00000-memory.dmp

              Filesize

              16.0MB

            • memory/4344-26057-0x0000000002D00000-0x0000000003D00000-memory.dmp

              Filesize

              16.0MB

            • memory/4344-26055-0x0000000002D00000-0x0000000003D00000-memory.dmp

              Filesize

              16.0MB

            • memory/4344-26034-0x0000000002D00000-0x0000000003D00000-memory.dmp

              Filesize

              16.0MB

            • memory/4344-26033-0x0000000002D00000-0x0000000003D00000-memory.dmp

              Filesize

              16.0MB

            • memory/4344-26054-0x0000000002D00000-0x0000000003D00000-memory.dmp

              Filesize

              16.0MB

            • memory/4344-26032-0x0000000002D00000-0x0000000003D00000-memory.dmp

              Filesize

              16.0MB

            • memory/4344-26052-0x0000000002D00000-0x0000000003D00000-memory.dmp

              Filesize

              16.0MB

            • memory/4344-26031-0x0000000002D00000-0x0000000003D00000-memory.dmp

              Filesize

              16.0MB

            • memory/4344-26050-0x0000000002D00000-0x0000000003D00000-memory.dmp

              Filesize

              16.0MB

            • memory/4344-26030-0x0000000002D00000-0x0000000003D00000-memory.dmp

              Filesize

              16.0MB

            • memory/4344-26029-0x0000000002D00000-0x0000000003D00000-memory.dmp

              Filesize

              16.0MB

            • memory/4344-26047-0x0000000002D00000-0x0000000003D00000-memory.dmp

              Filesize

              16.0MB

            • memory/4344-26028-0x0000000002D00000-0x0000000003D00000-memory.dmp

              Filesize

              16.0MB

            • memory/4344-26046-0x0000000002D00000-0x0000000003D00000-memory.dmp

              Filesize

              16.0MB

            • memory/4344-26045-0x0000000002D00000-0x0000000003D00000-memory.dmp

              Filesize

              16.0MB

            • memory/4344-26027-0x0000000002D00000-0x0000000003D00000-memory.dmp

              Filesize

              16.0MB

            • memory/4344-26044-0x0000000002D00000-0x0000000003D00000-memory.dmp

              Filesize

              16.0MB

            • memory/4344-26026-0x0000000002D00000-0x0000000003D00000-memory.dmp

              Filesize

              16.0MB

            • memory/4344-26043-0x0000000002D00000-0x0000000003D00000-memory.dmp

              Filesize

              16.0MB

            • memory/4344-26025-0x0000000002D00000-0x0000000003D00000-memory.dmp

              Filesize

              16.0MB

            • memory/4344-26038-0x0000000002D00000-0x0000000003D00000-memory.dmp

              Filesize

              16.0MB

            • memory/4344-26023-0x0000000002D00000-0x0000000003D00000-memory.dmp

              Filesize

              16.0MB

            • memory/4344-26036-0x0000000002D00000-0x0000000003D00000-memory.dmp

              Filesize

              16.0MB

            • memory/4344-26022-0x0000000002D00000-0x0000000003D00000-memory.dmp

              Filesize

              16.0MB

            • memory/4344-26021-0x0000000002D00000-0x0000000003D00000-memory.dmp

              Filesize

              16.0MB

            • memory/4344-26020-0x0000000002D00000-0x0000000003D00000-memory.dmp

              Filesize

              16.0MB

            • memory/4344-26019-0x0000000002D00000-0x0000000003D00000-memory.dmp

              Filesize

              16.0MB

            • memory/4344-26018-0x0000000002D00000-0x0000000003D00000-memory.dmp

              Filesize

              16.0MB

            • memory/4344-26017-0x0000000002D00000-0x0000000003D00000-memory.dmp

              Filesize

              16.0MB

            • memory/4344-26016-0x0000000002D00000-0x0000000003D00000-memory.dmp

              Filesize

              16.0MB

            • memory/4344-26014-0x0000000002D00000-0x0000000003D00000-memory.dmp

              Filesize

              16.0MB

            • memory/4344-26013-0x0000000002D00000-0x0000000003D00000-memory.dmp

              Filesize

              16.0MB

            • memory/4344-26012-0x0000000002D00000-0x0000000003D00000-memory.dmp

              Filesize

              16.0MB

            • memory/4344-26010-0x0000000002D00000-0x0000000003D00000-memory.dmp

              Filesize

              16.0MB

            • memory/4344-26011-0x0000000002D00000-0x0000000003D00000-memory.dmp

              Filesize

              16.0MB

            • memory/4344-26008-0x0000000002D00000-0x0000000003D00000-memory.dmp

              Filesize

              16.0MB

            • memory/4344-26007-0x0000000002D00000-0x0000000003D00000-memory.dmp

              Filesize

              16.0MB

            • memory/4344-26005-0x0000000002D00000-0x0000000003D00000-memory.dmp

              Filesize

              16.0MB

            • memory/4624-26415-0x0000000000400000-0x0000000000552000-memory.dmp

              Filesize

              1.3MB