Analysis
-
max time kernel
106s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-01-2025 06:55
Static task
static1
Behavioral task
behavioral1
Sample
c75f3d90d62e30c121548a0d8265979a3529a69e6480691f27ce4a37dfd99fa2.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
c75f3d90d62e30c121548a0d8265979a3529a69e6480691f27ce4a37dfd99fa2.exe
Resource
win10v2004-20241007-en
General
-
Target
c75f3d90d62e30c121548a0d8265979a3529a69e6480691f27ce4a37dfd99fa2.exe
-
Size
112KB
-
MD5
e65ce9d461195c0ac9cbe3699131603b
-
SHA1
574d3ce37e4fb8ef782956bbd0a3cb1c43ea1b8e
-
SHA256
c75f3d90d62e30c121548a0d8265979a3529a69e6480691f27ce4a37dfd99fa2
-
SHA512
c2c90c962e3ca21823bff2fd6b4f80196888ac31e394924a54576f2c5eb17a1bc52519a9b12c7b5956fc2a4a9ea1228442d0c0c6b4c713bc449f78ccc96d3a35
-
SSDEEP
1536:t2ovIa47CqIf2f3w41p7sDcX7juR/JSJw8EeNshUDGXJ/:tVIr7zI+fAceoGxSKKo5/
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 4 IoCs
resource yara_rule behavioral2/memory/1896-65-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 behavioral2/memory/1896-63-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 behavioral2/memory/1896-66-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 behavioral2/memory/1896-71-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation c75f3d90d62e30c121548a0d8265979a3529a69e6480691f27ce4a37dfd99fa2.exe -
Executes dropped EXE 3 IoCs
pid Process 3436 WAMain.exe 4664 WAMain.exe 1896 WAMain.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows WA = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\WAMain.exe" reg.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 4692 set thread context of 3584 4692 c75f3d90d62e30c121548a0d8265979a3529a69e6480691f27ce4a37dfd99fa2.exe 82 PID 4692 set thread context of 4800 4692 c75f3d90d62e30c121548a0d8265979a3529a69e6480691f27ce4a37dfd99fa2.exe 83 PID 3436 set thread context of 936 3436 WAMain.exe 89 PID 3436 set thread context of 4664 3436 WAMain.exe 90 PID 3436 set thread context of 1896 3436 WAMain.exe 91 -
resource yara_rule behavioral2/memory/4800-13-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4800-18-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4800-9-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4800-49-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/1896-58-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/1896-65-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/1896-63-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/1896-62-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/1896-66-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/4800-68-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4664-70-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/1896-71-0x0000000000400000-0x0000000000414000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4652 936 WerFault.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WAMain.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WAMain.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WAMain.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c75f3d90d62e30c121548a0d8265979a3529a69e6480691f27ce4a37dfd99fa2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c75f3d90d62e30c121548a0d8265979a3529a69e6480691f27ce4a37dfd99fa2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3584 svchost.exe 3584 svchost.exe 3584 svchost.exe 3584 svchost.exe 3584 svchost.exe 3584 svchost.exe 3584 svchost.exe 3584 svchost.exe 3584 svchost.exe 3584 svchost.exe 3584 svchost.exe 3584 svchost.exe 3584 svchost.exe 3584 svchost.exe 3584 svchost.exe 3584 svchost.exe 3584 svchost.exe 3584 svchost.exe 3584 svchost.exe 3584 svchost.exe 3584 svchost.exe 3584 svchost.exe 3584 svchost.exe 3584 svchost.exe 3584 svchost.exe 3584 svchost.exe 3584 svchost.exe 3584 svchost.exe 3584 svchost.exe 3584 svchost.exe 3584 svchost.exe 3584 svchost.exe 3584 svchost.exe 3584 svchost.exe 3584 svchost.exe 3584 svchost.exe 3584 svchost.exe 3584 svchost.exe 3584 svchost.exe 3584 svchost.exe 3584 svchost.exe 3584 svchost.exe 3584 svchost.exe 3584 svchost.exe 3584 svchost.exe 3584 svchost.exe 3584 svchost.exe 3584 svchost.exe 3584 svchost.exe 3584 svchost.exe 3584 svchost.exe 3584 svchost.exe 3584 svchost.exe 3584 svchost.exe 3584 svchost.exe 3584 svchost.exe 3584 svchost.exe 3584 svchost.exe 3584 svchost.exe 3584 svchost.exe 3584 svchost.exe 3584 svchost.exe 3584 svchost.exe 3584 svchost.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4664 WAMain.exe Token: SeDebugPrivilege 4664 WAMain.exe Token: SeDebugPrivilege 4664 WAMain.exe Token: SeDebugPrivilege 4664 WAMain.exe Token: SeDebugPrivilege 4664 WAMain.exe Token: SeDebugPrivilege 4664 WAMain.exe Token: SeDebugPrivilege 4664 WAMain.exe Token: SeDebugPrivilege 4664 WAMain.exe Token: SeDebugPrivilege 4664 WAMain.exe Token: SeDebugPrivilege 4664 WAMain.exe Token: SeDebugPrivilege 4664 WAMain.exe Token: SeDebugPrivilege 4664 WAMain.exe Token: SeDebugPrivilege 4664 WAMain.exe Token: SeDebugPrivilege 4664 WAMain.exe Token: SeDebugPrivilege 4664 WAMain.exe Token: SeDebugPrivilege 4664 WAMain.exe Token: SeDebugPrivilege 4664 WAMain.exe Token: SeDebugPrivilege 4664 WAMain.exe Token: SeDebugPrivilege 4664 WAMain.exe Token: SeDebugPrivilege 4664 WAMain.exe Token: SeDebugPrivilege 4664 WAMain.exe Token: SeDebugPrivilege 4664 WAMain.exe Token: SeDebugPrivilege 4664 WAMain.exe Token: SeDebugPrivilege 4664 WAMain.exe Token: SeDebugPrivilege 4664 WAMain.exe Token: SeDebugPrivilege 4664 WAMain.exe Token: SeDebugPrivilege 4664 WAMain.exe Token: SeDebugPrivilege 4664 WAMain.exe Token: SeDebugPrivilege 4664 WAMain.exe Token: SeDebugPrivilege 4664 WAMain.exe Token: SeDebugPrivilege 4664 WAMain.exe Token: SeDebugPrivilege 4664 WAMain.exe Token: SeDebugPrivilege 4664 WAMain.exe Token: SeDebugPrivilege 4664 WAMain.exe Token: SeDebugPrivilege 4664 WAMain.exe Token: SeDebugPrivilege 4664 WAMain.exe Token: SeDebugPrivilege 4664 WAMain.exe Token: SeDebugPrivilege 4664 WAMain.exe Token: SeDebugPrivilege 4664 WAMain.exe Token: SeDebugPrivilege 4664 WAMain.exe Token: SeDebugPrivilege 4664 WAMain.exe Token: SeDebugPrivilege 4664 WAMain.exe Token: SeDebugPrivilege 4664 WAMain.exe Token: SeDebugPrivilege 4664 WAMain.exe Token: SeDebugPrivilege 4664 WAMain.exe Token: SeDebugPrivilege 4664 WAMain.exe Token: SeDebugPrivilege 4664 WAMain.exe Token: SeDebugPrivilege 4664 WAMain.exe Token: SeDebugPrivilege 4664 WAMain.exe Token: SeDebugPrivilege 4664 WAMain.exe Token: SeDebugPrivilege 4664 WAMain.exe Token: SeDebugPrivilege 4664 WAMain.exe Token: SeDebugPrivilege 4664 WAMain.exe Token: SeDebugPrivilege 4664 WAMain.exe Token: SeDebugPrivilege 4664 WAMain.exe Token: SeDebugPrivilege 4664 WAMain.exe Token: SeDebugPrivilege 4664 WAMain.exe Token: SeDebugPrivilege 4664 WAMain.exe Token: SeDebugPrivilege 4664 WAMain.exe Token: SeDebugPrivilege 4664 WAMain.exe Token: SeDebugPrivilege 4664 WAMain.exe Token: SeDebugPrivilege 4664 WAMain.exe Token: SeDebugPrivilege 4664 WAMain.exe Token: SeDebugPrivilege 4664 WAMain.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 4692 c75f3d90d62e30c121548a0d8265979a3529a69e6480691f27ce4a37dfd99fa2.exe 3584 svchost.exe 4800 c75f3d90d62e30c121548a0d8265979a3529a69e6480691f27ce4a37dfd99fa2.exe 3436 WAMain.exe 4664 WAMain.exe -
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 4692 wrote to memory of 3584 4692 c75f3d90d62e30c121548a0d8265979a3529a69e6480691f27ce4a37dfd99fa2.exe 82 PID 4692 wrote to memory of 3584 4692 c75f3d90d62e30c121548a0d8265979a3529a69e6480691f27ce4a37dfd99fa2.exe 82 PID 4692 wrote to memory of 3584 4692 c75f3d90d62e30c121548a0d8265979a3529a69e6480691f27ce4a37dfd99fa2.exe 82 PID 4692 wrote to memory of 3584 4692 c75f3d90d62e30c121548a0d8265979a3529a69e6480691f27ce4a37dfd99fa2.exe 82 PID 4692 wrote to memory of 3584 4692 c75f3d90d62e30c121548a0d8265979a3529a69e6480691f27ce4a37dfd99fa2.exe 82 PID 4692 wrote to memory of 3584 4692 c75f3d90d62e30c121548a0d8265979a3529a69e6480691f27ce4a37dfd99fa2.exe 82 PID 4692 wrote to memory of 3584 4692 c75f3d90d62e30c121548a0d8265979a3529a69e6480691f27ce4a37dfd99fa2.exe 82 PID 4692 wrote to memory of 3584 4692 c75f3d90d62e30c121548a0d8265979a3529a69e6480691f27ce4a37dfd99fa2.exe 82 PID 4692 wrote to memory of 3584 4692 c75f3d90d62e30c121548a0d8265979a3529a69e6480691f27ce4a37dfd99fa2.exe 82 PID 4692 wrote to memory of 4800 4692 c75f3d90d62e30c121548a0d8265979a3529a69e6480691f27ce4a37dfd99fa2.exe 83 PID 4692 wrote to memory of 4800 4692 c75f3d90d62e30c121548a0d8265979a3529a69e6480691f27ce4a37dfd99fa2.exe 83 PID 4692 wrote to memory of 4800 4692 c75f3d90d62e30c121548a0d8265979a3529a69e6480691f27ce4a37dfd99fa2.exe 83 PID 4692 wrote to memory of 4800 4692 c75f3d90d62e30c121548a0d8265979a3529a69e6480691f27ce4a37dfd99fa2.exe 83 PID 4692 wrote to memory of 4800 4692 c75f3d90d62e30c121548a0d8265979a3529a69e6480691f27ce4a37dfd99fa2.exe 83 PID 4692 wrote to memory of 4800 4692 c75f3d90d62e30c121548a0d8265979a3529a69e6480691f27ce4a37dfd99fa2.exe 83 PID 4692 wrote to memory of 4800 4692 c75f3d90d62e30c121548a0d8265979a3529a69e6480691f27ce4a37dfd99fa2.exe 83 PID 4692 wrote to memory of 4800 4692 c75f3d90d62e30c121548a0d8265979a3529a69e6480691f27ce4a37dfd99fa2.exe 83 PID 4800 wrote to memory of 1476 4800 c75f3d90d62e30c121548a0d8265979a3529a69e6480691f27ce4a37dfd99fa2.exe 84 PID 4800 wrote to memory of 1476 4800 c75f3d90d62e30c121548a0d8265979a3529a69e6480691f27ce4a37dfd99fa2.exe 84 PID 4800 wrote to memory of 1476 4800 c75f3d90d62e30c121548a0d8265979a3529a69e6480691f27ce4a37dfd99fa2.exe 84 PID 1476 wrote to memory of 1104 1476 cmd.exe 87 PID 1476 wrote to memory of 1104 1476 cmd.exe 87 PID 1476 wrote to memory of 1104 1476 cmd.exe 87 PID 4800 wrote to memory of 3436 4800 c75f3d90d62e30c121548a0d8265979a3529a69e6480691f27ce4a37dfd99fa2.exe 88 PID 4800 wrote to memory of 3436 4800 c75f3d90d62e30c121548a0d8265979a3529a69e6480691f27ce4a37dfd99fa2.exe 88 PID 4800 wrote to memory of 3436 4800 c75f3d90d62e30c121548a0d8265979a3529a69e6480691f27ce4a37dfd99fa2.exe 88 PID 3436 wrote to memory of 936 3436 WAMain.exe 89 PID 3436 wrote to memory of 936 3436 WAMain.exe 89 PID 3436 wrote to memory of 936 3436 WAMain.exe 89 PID 3436 wrote to memory of 936 3436 WAMain.exe 89 PID 3436 wrote to memory of 4664 3436 WAMain.exe 90 PID 3436 wrote to memory of 4664 3436 WAMain.exe 90 PID 3436 wrote to memory of 4664 3436 WAMain.exe 90 PID 3436 wrote to memory of 4664 3436 WAMain.exe 90 PID 3436 wrote to memory of 4664 3436 WAMain.exe 90 PID 3436 wrote to memory of 4664 3436 WAMain.exe 90 PID 3436 wrote to memory of 4664 3436 WAMain.exe 90 PID 3436 wrote to memory of 4664 3436 WAMain.exe 90 PID 3436 wrote to memory of 1896 3436 WAMain.exe 91 PID 3436 wrote to memory of 1896 3436 WAMain.exe 91 PID 3436 wrote to memory of 1896 3436 WAMain.exe 91 PID 3436 wrote to memory of 1896 3436 WAMain.exe 91 PID 3436 wrote to memory of 1896 3436 WAMain.exe 91 PID 3436 wrote to memory of 1896 3436 WAMain.exe 91 PID 3436 wrote to memory of 1896 3436 WAMain.exe 91 PID 3436 wrote to memory of 1896 3436 WAMain.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\c75f3d90d62e30c121548a0d8265979a3529a69e6480691f27ce4a37dfd99fa2.exe"C:\Users\Admin\AppData\Local\Temp\c75f3d90d62e30c121548a0d8265979a3529a69e6480691f27ce4a37dfd99fa2.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3584
-
-
C:\Users\Admin\AppData\Local\Temp\c75f3d90d62e30c121548a0d8265979a3529a69e6480691f27ce4a37dfd99fa2.exe"C:\Users\Admin\AppData\Local\Temp\c75f3d90d62e30c121548a0d8265979a3529a69e6480691f27ce4a37dfd99fa2.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\CIAQI.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows WA" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1104
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"4⤵PID:936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 936 -s 845⤵
- Program crash
PID:4652
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4664
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1896
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 376 -p 936 -ip 9361⤵PID:1664
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148B
MD53a4614705555abb049c3298e61170b7f
SHA1c8686410756f346d9551256a5b878b04770950ba
SHA256cff0663c8cfadf83b80583a871c313ffc5d950cb503809cb4a482f400c5d846b
SHA51265ce6fec00e6934f21635e7ccd74757f31ed4b0ddb52bd80d3ea9abeba56340128d23151ef7d9f5daacb5d61e4a4cca50dbb3a43132e350522311ee06e829007
-
Filesize
112KB
MD5954a620311b6e071d50db314472a8f09
SHA18c6f418f94aa526a5dd594eb495435b89aa855a4
SHA256c8f56942cce8f37b0a8bab515c3499b386a28e178660544ab3750f2b756d5658
SHA5120fedb5b4f1cd61e34521b5e37abe22abbf849130727f7d229e042ef8d006e029617ededd5a7a4622f15690f072b6136b447d1a7c6d671e8aea3961face83c07f