Analysis
-
max time kernel
19s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-01-2025 20:10
Static task
static1
Behavioral task
behavioral1
Sample
9a956daabf610aee9cf60a4ae74b6168c53d7e4cc07f89a8d567e54685966aa4N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9a956daabf610aee9cf60a4ae74b6168c53d7e4cc07f89a8d567e54685966aa4N.exe
Resource
win10v2004-20241007-en
General
-
Target
9a956daabf610aee9cf60a4ae74b6168c53d7e4cc07f89a8d567e54685966aa4N.exe
-
Size
112KB
-
MD5
b2cf6e008cc4d8746c16228b5160b8d0
-
SHA1
de59a1608a8fd19751b032a5d6e06b03b84cb044
-
SHA256
9a956daabf610aee9cf60a4ae74b6168c53d7e4cc07f89a8d567e54685966aa4
-
SHA512
30b86ac6e31ff8bdc89dc51f35eb19f610515063c41c70b8e302556e6af44d28da8518873eb37498dbe92991d2ec9441ab1352b8e709faa1cb34d75ab6b65fd7
-
SSDEEP
1536:t2ovIa47CqIf2f3w41p7sDcX7juR/JSJw8EeNshUDGXJ:tVIr7zI+fAceoGxSKKo5
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 4 IoCs
resource yara_rule behavioral2/memory/4972-69-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 behavioral2/memory/4972-68-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 behavioral2/memory/4972-70-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 behavioral2/memory/4972-79-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 9a956daabf610aee9cf60a4ae74b6168c53d7e4cc07f89a8d567e54685966aa4N.exe -
Executes dropped EXE 3 IoCs
pid Process 2004 WAMain.exe 3120 WAMain.exe 4972 WAMain.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows WA = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\WAMain.exe" reg.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 1948 set thread context of 224 1948 9a956daabf610aee9cf60a4ae74b6168c53d7e4cc07f89a8d567e54685966aa4N.exe 83 PID 1948 set thread context of 208 1948 9a956daabf610aee9cf60a4ae74b6168c53d7e4cc07f89a8d567e54685966aa4N.exe 84 PID 2004 set thread context of 5048 2004 WAMain.exe 90 PID 2004 set thread context of 3120 2004 WAMain.exe 91 PID 2004 set thread context of 4972 2004 WAMain.exe 92 -
resource yara_rule behavioral2/memory/208-10-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/208-20-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/208-14-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/208-50-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4972-69-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/4972-68-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/4972-67-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/4972-63-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/4972-70-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/208-76-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3120-77-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4972-79-0x0000000000400000-0x0000000000414000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WAMain.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WAMain.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WAMain.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9a956daabf610aee9cf60a4ae74b6168c53d7e4cc07f89a8d567e54685966aa4N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9a956daabf610aee9cf60a4ae74b6168c53d7e4cc07f89a8d567e54685966aa4N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 224 svchost.exe 224 svchost.exe 224 svchost.exe 224 svchost.exe 224 svchost.exe 224 svchost.exe 224 svchost.exe 224 svchost.exe 224 svchost.exe 224 svchost.exe 224 svchost.exe 224 svchost.exe 224 svchost.exe 224 svchost.exe 224 svchost.exe 224 svchost.exe 224 svchost.exe 224 svchost.exe 224 svchost.exe 224 svchost.exe 224 svchost.exe 224 svchost.exe 224 svchost.exe 224 svchost.exe 224 svchost.exe 224 svchost.exe 224 svchost.exe 224 svchost.exe 224 svchost.exe 224 svchost.exe 224 svchost.exe 224 svchost.exe 224 svchost.exe 224 svchost.exe 224 svchost.exe 224 svchost.exe 224 svchost.exe 224 svchost.exe 224 svchost.exe 224 svchost.exe 224 svchost.exe 224 svchost.exe 224 svchost.exe 224 svchost.exe 224 svchost.exe 224 svchost.exe 224 svchost.exe 224 svchost.exe 224 svchost.exe 224 svchost.exe 224 svchost.exe 224 svchost.exe 224 svchost.exe 224 svchost.exe 224 svchost.exe 224 svchost.exe 224 svchost.exe 224 svchost.exe 224 svchost.exe 224 svchost.exe 224 svchost.exe 224 svchost.exe 224 svchost.exe 224 svchost.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 3120 WAMain.exe Token: SeDebugPrivilege 3120 WAMain.exe Token: SeDebugPrivilege 3120 WAMain.exe Token: SeDebugPrivilege 3120 WAMain.exe Token: SeDebugPrivilege 3120 WAMain.exe Token: SeDebugPrivilege 3120 WAMain.exe Token: SeDebugPrivilege 3120 WAMain.exe Token: SeDebugPrivilege 3120 WAMain.exe Token: SeDebugPrivilege 3120 WAMain.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1948 9a956daabf610aee9cf60a4ae74b6168c53d7e4cc07f89a8d567e54685966aa4N.exe 224 svchost.exe 208 9a956daabf610aee9cf60a4ae74b6168c53d7e4cc07f89a8d567e54685966aa4N.exe 2004 WAMain.exe 5048 svchost.exe 3120 WAMain.exe -
Suspicious use of WriteProcessMemory 51 IoCs
description pid Process procid_target PID 1948 wrote to memory of 224 1948 9a956daabf610aee9cf60a4ae74b6168c53d7e4cc07f89a8d567e54685966aa4N.exe 83 PID 1948 wrote to memory of 224 1948 9a956daabf610aee9cf60a4ae74b6168c53d7e4cc07f89a8d567e54685966aa4N.exe 83 PID 1948 wrote to memory of 224 1948 9a956daabf610aee9cf60a4ae74b6168c53d7e4cc07f89a8d567e54685966aa4N.exe 83 PID 1948 wrote to memory of 224 1948 9a956daabf610aee9cf60a4ae74b6168c53d7e4cc07f89a8d567e54685966aa4N.exe 83 PID 1948 wrote to memory of 224 1948 9a956daabf610aee9cf60a4ae74b6168c53d7e4cc07f89a8d567e54685966aa4N.exe 83 PID 1948 wrote to memory of 224 1948 9a956daabf610aee9cf60a4ae74b6168c53d7e4cc07f89a8d567e54685966aa4N.exe 83 PID 1948 wrote to memory of 224 1948 9a956daabf610aee9cf60a4ae74b6168c53d7e4cc07f89a8d567e54685966aa4N.exe 83 PID 1948 wrote to memory of 224 1948 9a956daabf610aee9cf60a4ae74b6168c53d7e4cc07f89a8d567e54685966aa4N.exe 83 PID 1948 wrote to memory of 224 1948 9a956daabf610aee9cf60a4ae74b6168c53d7e4cc07f89a8d567e54685966aa4N.exe 83 PID 1948 wrote to memory of 208 1948 9a956daabf610aee9cf60a4ae74b6168c53d7e4cc07f89a8d567e54685966aa4N.exe 84 PID 1948 wrote to memory of 208 1948 9a956daabf610aee9cf60a4ae74b6168c53d7e4cc07f89a8d567e54685966aa4N.exe 84 PID 1948 wrote to memory of 208 1948 9a956daabf610aee9cf60a4ae74b6168c53d7e4cc07f89a8d567e54685966aa4N.exe 84 PID 1948 wrote to memory of 208 1948 9a956daabf610aee9cf60a4ae74b6168c53d7e4cc07f89a8d567e54685966aa4N.exe 84 PID 1948 wrote to memory of 208 1948 9a956daabf610aee9cf60a4ae74b6168c53d7e4cc07f89a8d567e54685966aa4N.exe 84 PID 1948 wrote to memory of 208 1948 9a956daabf610aee9cf60a4ae74b6168c53d7e4cc07f89a8d567e54685966aa4N.exe 84 PID 1948 wrote to memory of 208 1948 9a956daabf610aee9cf60a4ae74b6168c53d7e4cc07f89a8d567e54685966aa4N.exe 84 PID 1948 wrote to memory of 208 1948 9a956daabf610aee9cf60a4ae74b6168c53d7e4cc07f89a8d567e54685966aa4N.exe 84 PID 208 wrote to memory of 1716 208 9a956daabf610aee9cf60a4ae74b6168c53d7e4cc07f89a8d567e54685966aa4N.exe 85 PID 208 wrote to memory of 1716 208 9a956daabf610aee9cf60a4ae74b6168c53d7e4cc07f89a8d567e54685966aa4N.exe 85 PID 208 wrote to memory of 1716 208 9a956daabf610aee9cf60a4ae74b6168c53d7e4cc07f89a8d567e54685966aa4N.exe 85 PID 1716 wrote to memory of 3896 1716 cmd.exe 88 PID 1716 wrote to memory of 3896 1716 cmd.exe 88 PID 1716 wrote to memory of 3896 1716 cmd.exe 88 PID 208 wrote to memory of 2004 208 9a956daabf610aee9cf60a4ae74b6168c53d7e4cc07f89a8d567e54685966aa4N.exe 89 PID 208 wrote to memory of 2004 208 9a956daabf610aee9cf60a4ae74b6168c53d7e4cc07f89a8d567e54685966aa4N.exe 89 PID 208 wrote to memory of 2004 208 9a956daabf610aee9cf60a4ae74b6168c53d7e4cc07f89a8d567e54685966aa4N.exe 89 PID 2004 wrote to memory of 5048 2004 WAMain.exe 90 PID 2004 wrote to memory of 5048 2004 WAMain.exe 90 PID 2004 wrote to memory of 5048 2004 WAMain.exe 90 PID 2004 wrote to memory of 5048 2004 WAMain.exe 90 PID 2004 wrote to memory of 5048 2004 WAMain.exe 90 PID 2004 wrote to memory of 5048 2004 WAMain.exe 90 PID 2004 wrote to memory of 5048 2004 WAMain.exe 90 PID 2004 wrote to memory of 5048 2004 WAMain.exe 90 PID 2004 wrote to memory of 5048 2004 WAMain.exe 90 PID 2004 wrote to memory of 3120 2004 WAMain.exe 91 PID 2004 wrote to memory of 3120 2004 WAMain.exe 91 PID 2004 wrote to memory of 3120 2004 WAMain.exe 91 PID 2004 wrote to memory of 3120 2004 WAMain.exe 91 PID 2004 wrote to memory of 3120 2004 WAMain.exe 91 PID 2004 wrote to memory of 3120 2004 WAMain.exe 91 PID 2004 wrote to memory of 3120 2004 WAMain.exe 91 PID 2004 wrote to memory of 3120 2004 WAMain.exe 91 PID 2004 wrote to memory of 4972 2004 WAMain.exe 92 PID 2004 wrote to memory of 4972 2004 WAMain.exe 92 PID 2004 wrote to memory of 4972 2004 WAMain.exe 92 PID 2004 wrote to memory of 4972 2004 WAMain.exe 92 PID 2004 wrote to memory of 4972 2004 WAMain.exe 92 PID 2004 wrote to memory of 4972 2004 WAMain.exe 92 PID 2004 wrote to memory of 4972 2004 WAMain.exe 92 PID 2004 wrote to memory of 4972 2004 WAMain.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\9a956daabf610aee9cf60a4ae74b6168c53d7e4cc07f89a8d567e54685966aa4N.exe"C:\Users\Admin\AppData\Local\Temp\9a956daabf610aee9cf60a4ae74b6168c53d7e4cc07f89a8d567e54685966aa4N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:224
-
-
C:\Users\Admin\AppData\Local\Temp\9a956daabf610aee9cf60a4ae74b6168c53d7e4cc07f89a8d567e54685966aa4N.exe"C:\Users\Admin\AppData\Local\Temp\9a956daabf610aee9cf60a4ae74b6168c53d7e4cc07f89a8d567e54685966aa4N.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JWXAK.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows WA" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3896
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5048
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3120
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4972
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148B
MD53a4614705555abb049c3298e61170b7f
SHA1c8686410756f346d9551256a5b878b04770950ba
SHA256cff0663c8cfadf83b80583a871c313ffc5d950cb503809cb4a482f400c5d846b
SHA51265ce6fec00e6934f21635e7ccd74757f31ed4b0ddb52bd80d3ea9abeba56340128d23151ef7d9f5daacb5d61e4a4cca50dbb3a43132e350522311ee06e829007
-
Filesize
112KB
MD50bf1f120d66df32d52ec90b096f4ad1a
SHA16998721f25a99712b2d361add0f4c9e9b922b7ee
SHA2566d0231440e2d1e048f9a32b70579a90b05f36cb6aee97e36d9f0ba14a36309b3
SHA512bcd808cdf5af30a1fc40ae7daea26096f8521d01ee7e83e4a337122be6dbea5e5a3f19f7d25e937bfc7e0d7a2542d81ad34f86cec3947c05f16deda7b08bb64c