Analysis
-
max time kernel
91s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-01-2025 13:47
Static task
static1
Behavioral task
behavioral1
Sample
51f83aa624022090d8cfaf8b67a1f51edba5af5131db322f4bda9521dafd922fN.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
51f83aa624022090d8cfaf8b67a1f51edba5af5131db322f4bda9521dafd922fN.exe
Resource
win10v2004-20241007-en
General
-
Target
51f83aa624022090d8cfaf8b67a1f51edba5af5131db322f4bda9521dafd922fN.exe
-
Size
112KB
-
MD5
2d4502477f58de2c67769ac8b1bfa730
-
SHA1
7a1a788b02be10003b9264be36d54356d1a8c791
-
SHA256
51f83aa624022090d8cfaf8b67a1f51edba5af5131db322f4bda9521dafd922f
-
SHA512
aee2322b8af644a76c6748072f84cf4a7ea4e1c5808e050f61b82ef751fbfae1eccb304741a6f279b655ba5660bc45024051c423f0b8a809113c57b354b2b81f
-
SSDEEP
1536:t2ovIa47CqIf2f3w41p7sDcX7juR/JSJw8EeNshUDGXJn:tVIr7zI+fAceoGxSKKo5n
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 3 IoCs
resource yara_rule behavioral2/memory/444-62-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 behavioral2/memory/444-61-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 behavioral2/memory/444-72-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 51f83aa624022090d8cfaf8b67a1f51edba5af5131db322f4bda9521dafd922fN.exe -
Executes dropped EXE 3 IoCs
pid Process 4196 WAMain.exe 1392 WAMain.exe 444 WAMain.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows WA = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\WAMain.exe" reg.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 4056 set thread context of 2608 4056 51f83aa624022090d8cfaf8b67a1f51edba5af5131db322f4bda9521dafd922fN.exe 83 PID 4056 set thread context of 5100 4056 51f83aa624022090d8cfaf8b67a1f51edba5af5131db322f4bda9521dafd922fN.exe 84 PID 4196 set thread context of 1396 4196 WAMain.exe 94 PID 4196 set thread context of 1392 4196 WAMain.exe 95 PID 4196 set thread context of 444 4196 WAMain.exe 96 -
resource yara_rule behavioral2/memory/5100-8-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/5100-11-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/5100-13-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/5100-42-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/444-62-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/444-61-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/444-60-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/444-56-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/5100-67-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/1392-68-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/444-72-0x0000000000400000-0x0000000000414000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2052 2608 WerFault.exe 83 2440 2608 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WAMain.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WAMain.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 51f83aa624022090d8cfaf8b67a1f51edba5af5131db322f4bda9521dafd922fN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 51f83aa624022090d8cfaf8b67a1f51edba5af5131db322f4bda9521dafd922fN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WAMain.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1396 svchost.exe 1396 svchost.exe 1396 svchost.exe 1396 svchost.exe 1396 svchost.exe 1396 svchost.exe 1396 svchost.exe 1396 svchost.exe 1396 svchost.exe 1396 svchost.exe 1396 svchost.exe 1396 svchost.exe 1396 svchost.exe 1396 svchost.exe 1396 svchost.exe 1396 svchost.exe 1396 svchost.exe 1396 svchost.exe 1396 svchost.exe 1396 svchost.exe 1396 svchost.exe 1396 svchost.exe 1396 svchost.exe 1396 svchost.exe 1396 svchost.exe 1396 svchost.exe 1396 svchost.exe 1396 svchost.exe 1396 svchost.exe 1396 svchost.exe 1396 svchost.exe 1396 svchost.exe 1396 svchost.exe 1396 svchost.exe 1396 svchost.exe 1396 svchost.exe 1396 svchost.exe 1396 svchost.exe 1396 svchost.exe 1396 svchost.exe 1396 svchost.exe 1396 svchost.exe 1396 svchost.exe 1396 svchost.exe 1396 svchost.exe 1396 svchost.exe 1396 svchost.exe 1396 svchost.exe 1396 svchost.exe 1396 svchost.exe 1396 svchost.exe 1396 svchost.exe 1396 svchost.exe 1396 svchost.exe 1396 svchost.exe 1396 svchost.exe 1396 svchost.exe 1396 svchost.exe 1396 svchost.exe 1396 svchost.exe 1396 svchost.exe 1396 svchost.exe 1396 svchost.exe 1396 svchost.exe -
Suspicious use of AdjustPrivilegeToken 58 IoCs
description pid Process Token: SeDebugPrivilege 1392 WAMain.exe Token: SeDebugPrivilege 1392 WAMain.exe Token: SeDebugPrivilege 1392 WAMain.exe Token: SeDebugPrivilege 1392 WAMain.exe Token: SeDebugPrivilege 1392 WAMain.exe Token: SeDebugPrivilege 1392 WAMain.exe Token: SeDebugPrivilege 1392 WAMain.exe Token: SeDebugPrivilege 1392 WAMain.exe Token: SeDebugPrivilege 1392 WAMain.exe Token: SeDebugPrivilege 1392 WAMain.exe Token: SeDebugPrivilege 1392 WAMain.exe Token: SeDebugPrivilege 1392 WAMain.exe Token: SeDebugPrivilege 1392 WAMain.exe Token: SeDebugPrivilege 1392 WAMain.exe Token: SeDebugPrivilege 1392 WAMain.exe Token: SeDebugPrivilege 1392 WAMain.exe Token: SeDebugPrivilege 1392 WAMain.exe Token: SeDebugPrivilege 1392 WAMain.exe Token: SeDebugPrivilege 1392 WAMain.exe Token: SeDebugPrivilege 1392 WAMain.exe Token: SeDebugPrivilege 1392 WAMain.exe Token: SeDebugPrivilege 1392 WAMain.exe Token: SeDebugPrivilege 1392 WAMain.exe Token: SeDebugPrivilege 1392 WAMain.exe Token: SeDebugPrivilege 1392 WAMain.exe Token: SeDebugPrivilege 1392 WAMain.exe Token: SeDebugPrivilege 1392 WAMain.exe Token: SeDebugPrivilege 1392 WAMain.exe Token: SeDebugPrivilege 1392 WAMain.exe Token: SeDebugPrivilege 1392 WAMain.exe Token: SeDebugPrivilege 1392 WAMain.exe Token: SeDebugPrivilege 1392 WAMain.exe Token: SeDebugPrivilege 1392 WAMain.exe Token: SeDebugPrivilege 1392 WAMain.exe Token: SeDebugPrivilege 1392 WAMain.exe Token: SeDebugPrivilege 1392 WAMain.exe Token: SeDebugPrivilege 1392 WAMain.exe Token: SeDebugPrivilege 1392 WAMain.exe Token: SeDebugPrivilege 1392 WAMain.exe Token: SeDebugPrivilege 1392 WAMain.exe Token: SeDebugPrivilege 1392 WAMain.exe Token: SeDebugPrivilege 1392 WAMain.exe Token: SeDebugPrivilege 1392 WAMain.exe Token: SeDebugPrivilege 1392 WAMain.exe Token: SeDebugPrivilege 1392 WAMain.exe Token: SeDebugPrivilege 1392 WAMain.exe Token: SeDebugPrivilege 1392 WAMain.exe Token: SeDebugPrivilege 1392 WAMain.exe Token: SeDebugPrivilege 1392 WAMain.exe Token: SeDebugPrivilege 1392 WAMain.exe Token: SeDebugPrivilege 1392 WAMain.exe Token: SeDebugPrivilege 1392 WAMain.exe Token: SeDebugPrivilege 1392 WAMain.exe Token: SeDebugPrivilege 1392 WAMain.exe Token: SeDebugPrivilege 1392 WAMain.exe Token: SeDebugPrivilege 1392 WAMain.exe Token: SeDebugPrivilege 1392 WAMain.exe Token: SeDebugPrivilege 1392 WAMain.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 4056 51f83aa624022090d8cfaf8b67a1f51edba5af5131db322f4bda9521dafd922fN.exe 5100 51f83aa624022090d8cfaf8b67a1f51edba5af5131db322f4bda9521dafd922fN.exe 4196 WAMain.exe 1396 svchost.exe 1392 WAMain.exe -
Suspicious use of WriteProcessMemory 51 IoCs
description pid Process procid_target PID 4056 wrote to memory of 2608 4056 51f83aa624022090d8cfaf8b67a1f51edba5af5131db322f4bda9521dafd922fN.exe 83 PID 4056 wrote to memory of 2608 4056 51f83aa624022090d8cfaf8b67a1f51edba5af5131db322f4bda9521dafd922fN.exe 83 PID 4056 wrote to memory of 2608 4056 51f83aa624022090d8cfaf8b67a1f51edba5af5131db322f4bda9521dafd922fN.exe 83 PID 4056 wrote to memory of 2608 4056 51f83aa624022090d8cfaf8b67a1f51edba5af5131db322f4bda9521dafd922fN.exe 83 PID 4056 wrote to memory of 2608 4056 51f83aa624022090d8cfaf8b67a1f51edba5af5131db322f4bda9521dafd922fN.exe 83 PID 4056 wrote to memory of 2608 4056 51f83aa624022090d8cfaf8b67a1f51edba5af5131db322f4bda9521dafd922fN.exe 83 PID 4056 wrote to memory of 2608 4056 51f83aa624022090d8cfaf8b67a1f51edba5af5131db322f4bda9521dafd922fN.exe 83 PID 4056 wrote to memory of 2608 4056 51f83aa624022090d8cfaf8b67a1f51edba5af5131db322f4bda9521dafd922fN.exe 83 PID 4056 wrote to memory of 2608 4056 51f83aa624022090d8cfaf8b67a1f51edba5af5131db322f4bda9521dafd922fN.exe 83 PID 4056 wrote to memory of 5100 4056 51f83aa624022090d8cfaf8b67a1f51edba5af5131db322f4bda9521dafd922fN.exe 84 PID 4056 wrote to memory of 5100 4056 51f83aa624022090d8cfaf8b67a1f51edba5af5131db322f4bda9521dafd922fN.exe 84 PID 4056 wrote to memory of 5100 4056 51f83aa624022090d8cfaf8b67a1f51edba5af5131db322f4bda9521dafd922fN.exe 84 PID 4056 wrote to memory of 5100 4056 51f83aa624022090d8cfaf8b67a1f51edba5af5131db322f4bda9521dafd922fN.exe 84 PID 4056 wrote to memory of 5100 4056 51f83aa624022090d8cfaf8b67a1f51edba5af5131db322f4bda9521dafd922fN.exe 84 PID 4056 wrote to memory of 5100 4056 51f83aa624022090d8cfaf8b67a1f51edba5af5131db322f4bda9521dafd922fN.exe 84 PID 4056 wrote to memory of 5100 4056 51f83aa624022090d8cfaf8b67a1f51edba5af5131db322f4bda9521dafd922fN.exe 84 PID 4056 wrote to memory of 5100 4056 51f83aa624022090d8cfaf8b67a1f51edba5af5131db322f4bda9521dafd922fN.exe 84 PID 5100 wrote to memory of 1876 5100 51f83aa624022090d8cfaf8b67a1f51edba5af5131db322f4bda9521dafd922fN.exe 88 PID 5100 wrote to memory of 1876 5100 51f83aa624022090d8cfaf8b67a1f51edba5af5131db322f4bda9521dafd922fN.exe 88 PID 5100 wrote to memory of 1876 5100 51f83aa624022090d8cfaf8b67a1f51edba5af5131db322f4bda9521dafd922fN.exe 88 PID 1876 wrote to memory of 1388 1876 cmd.exe 92 PID 1876 wrote to memory of 1388 1876 cmd.exe 92 PID 1876 wrote to memory of 1388 1876 cmd.exe 92 PID 5100 wrote to memory of 4196 5100 51f83aa624022090d8cfaf8b67a1f51edba5af5131db322f4bda9521dafd922fN.exe 93 PID 5100 wrote to memory of 4196 5100 51f83aa624022090d8cfaf8b67a1f51edba5af5131db322f4bda9521dafd922fN.exe 93 PID 5100 wrote to memory of 4196 5100 51f83aa624022090d8cfaf8b67a1f51edba5af5131db322f4bda9521dafd922fN.exe 93 PID 4196 wrote to memory of 1396 4196 WAMain.exe 94 PID 4196 wrote to memory of 1396 4196 WAMain.exe 94 PID 4196 wrote to memory of 1396 4196 WAMain.exe 94 PID 4196 wrote to memory of 1396 4196 WAMain.exe 94 PID 4196 wrote to memory of 1396 4196 WAMain.exe 94 PID 4196 wrote to memory of 1396 4196 WAMain.exe 94 PID 4196 wrote to memory of 1396 4196 WAMain.exe 94 PID 4196 wrote to memory of 1396 4196 WAMain.exe 94 PID 4196 wrote to memory of 1396 4196 WAMain.exe 94 PID 4196 wrote to memory of 1392 4196 WAMain.exe 95 PID 4196 wrote to memory of 1392 4196 WAMain.exe 95 PID 4196 wrote to memory of 1392 4196 WAMain.exe 95 PID 4196 wrote to memory of 1392 4196 WAMain.exe 95 PID 4196 wrote to memory of 1392 4196 WAMain.exe 95 PID 4196 wrote to memory of 1392 4196 WAMain.exe 95 PID 4196 wrote to memory of 1392 4196 WAMain.exe 95 PID 4196 wrote to memory of 1392 4196 WAMain.exe 95 PID 4196 wrote to memory of 444 4196 WAMain.exe 96 PID 4196 wrote to memory of 444 4196 WAMain.exe 96 PID 4196 wrote to memory of 444 4196 WAMain.exe 96 PID 4196 wrote to memory of 444 4196 WAMain.exe 96 PID 4196 wrote to memory of 444 4196 WAMain.exe 96 PID 4196 wrote to memory of 444 4196 WAMain.exe 96 PID 4196 wrote to memory of 444 4196 WAMain.exe 96 PID 4196 wrote to memory of 444 4196 WAMain.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\51f83aa624022090d8cfaf8b67a1f51edba5af5131db322f4bda9521dafd922fN.exe"C:\Users\Admin\AppData\Local\Temp\51f83aa624022090d8cfaf8b67a1f51edba5af5131db322f4bda9521dafd922fN.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"2⤵PID:2608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2608 -s 123⤵
- Program crash
PID:2052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2608 -s 523⤵
- Program crash
PID:2440
-
-
-
C:\Users\Admin\AppData\Local\Temp\51f83aa624022090d8cfaf8b67a1f51edba5af5131db322f4bda9521dafd922fN.exe"C:\Users\Admin\AppData\Local\Temp\51f83aa624022090d8cfaf8b67a1f51edba5af5131db322f4bda9521dafd922fN.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\NAMUM.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows WA" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1388
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4196 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1396
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1392
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:444
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2608 -ip 26081⤵PID:4488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2608 -ip 26081⤵PID:2216
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148B
MD53a4614705555abb049c3298e61170b7f
SHA1c8686410756f346d9551256a5b878b04770950ba
SHA256cff0663c8cfadf83b80583a871c313ffc5d950cb503809cb4a482f400c5d846b
SHA51265ce6fec00e6934f21635e7ccd74757f31ed4b0ddb52bd80d3ea9abeba56340128d23151ef7d9f5daacb5d61e4a4cca50dbb3a43132e350522311ee06e829007
-
Filesize
112KB
MD5611ef83aaf4f236c04f0c1bc0cc79d71
SHA1774ce38a6db55ead12afe483ef14267632d0cfa3
SHA25692a57c526f17bfd4ee5e2ffd0e4a3977ca5d50a8607065aadb8a8ce733403d97
SHA512c31231d59ba898cbc0268a6ec9c4cc8aff460c88706407cb16c1363239b9e9294b6c9f3b73e07c36316b3c19c51ee37492019dffac96a78da1b933be7a2c1c84