Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-01-2025 07:28
Static task
static1
Behavioral task
behavioral1
Sample
INQUIRY LIST 292.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
INQUIRY LIST 292.vbs
Resource
win10v2004-20241007-en
General
-
Target
INQUIRY LIST 292.vbs
-
Size
1.1MB
-
MD5
2f5edacbfdae7a51267deeb8e937bfec
-
SHA1
d0ce895b7a4e55fe7f12121878a5818850f1dc00
-
SHA256
07898f8cb7e07bd6b86fd09cfff5898eb246a44524b3dda7a39e3de32667490b
-
SHA512
fb8c8d268dd5f4b0c619213a0c36c3132574d04c8780eb4c5623af08c7aea7d12fdc1dcab4903908b099b2874a34f8d9804af746978a93af488a95a101d0d392
-
SSDEEP
24576:uR3Gv4DQo4o3Hj6R3EpqvdG5Np4kJL7a5ZKCmjLpvi:HBo4o3kE4w2kw5w4
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 61 IoCs
resource yara_rule behavioral1/memory/2132-9-0x0000000003180000-0x0000000004180000-memory.dmp modiloader_stage2 behavioral1/memory/2132-22-0x0000000003180000-0x0000000004180000-memory.dmp modiloader_stage2 behavioral1/memory/2132-14-0x0000000003180000-0x0000000004180000-memory.dmp modiloader_stage2 behavioral1/memory/2132-26-0x0000000003180000-0x0000000004180000-memory.dmp modiloader_stage2 behavioral1/memory/2132-28-0x0000000003180000-0x0000000004180000-memory.dmp modiloader_stage2 behavioral1/memory/2132-15-0x0000000003180000-0x0000000004180000-memory.dmp modiloader_stage2 behavioral1/memory/2132-32-0x0000000003180000-0x0000000004180000-memory.dmp modiloader_stage2 behavioral1/memory/2132-35-0x0000000003180000-0x0000000004180000-memory.dmp modiloader_stage2 behavioral1/memory/2132-39-0x0000000003180000-0x0000000004180000-memory.dmp modiloader_stage2 behavioral1/memory/2132-41-0x0000000003180000-0x0000000004180000-memory.dmp modiloader_stage2 behavioral1/memory/2132-44-0x0000000003180000-0x0000000004180000-memory.dmp modiloader_stage2 behavioral1/memory/2132-47-0x0000000003180000-0x0000000004180000-memory.dmp modiloader_stage2 behavioral1/memory/2132-49-0x0000000003180000-0x0000000004180000-memory.dmp modiloader_stage2 behavioral1/memory/2132-52-0x0000000003180000-0x0000000004180000-memory.dmp modiloader_stage2 behavioral1/memory/2132-55-0x0000000003180000-0x0000000004180000-memory.dmp modiloader_stage2 behavioral1/memory/2132-58-0x0000000003180000-0x0000000004180000-memory.dmp modiloader_stage2 behavioral1/memory/2132-61-0x0000000003180000-0x0000000004180000-memory.dmp modiloader_stage2 behavioral1/memory/2132-64-0x0000000003180000-0x0000000004180000-memory.dmp modiloader_stage2 behavioral1/memory/2132-67-0x0000000003180000-0x0000000004180000-memory.dmp modiloader_stage2 behavioral1/memory/2132-70-0x0000000003180000-0x0000000004180000-memory.dmp modiloader_stage2 behavioral1/memory/2132-73-0x0000000003180000-0x0000000004180000-memory.dmp modiloader_stage2 behavioral1/memory/2132-76-0x0000000003180000-0x0000000004180000-memory.dmp modiloader_stage2 behavioral1/memory/2132-79-0x0000000003180000-0x0000000004180000-memory.dmp modiloader_stage2 behavioral1/memory/2132-81-0x0000000003180000-0x0000000004180000-memory.dmp modiloader_stage2 behavioral1/memory/2132-84-0x0000000003180000-0x0000000004180000-memory.dmp modiloader_stage2 behavioral1/memory/2132-87-0x0000000003180000-0x0000000004180000-memory.dmp modiloader_stage2 behavioral1/memory/2132-31-0x0000000003180000-0x0000000004180000-memory.dmp modiloader_stage2 behavioral1/memory/2132-34-0x0000000003180000-0x0000000004180000-memory.dmp modiloader_stage2 behavioral1/memory/2132-40-0x0000000003180000-0x0000000004180000-memory.dmp modiloader_stage2 behavioral1/memory/2132-16-0x0000000003180000-0x0000000004180000-memory.dmp modiloader_stage2 behavioral1/memory/2132-43-0x0000000003180000-0x0000000004180000-memory.dmp modiloader_stage2 behavioral1/memory/2132-46-0x0000000003180000-0x0000000004180000-memory.dmp modiloader_stage2 behavioral1/memory/2132-17-0x0000000003180000-0x0000000004180000-memory.dmp modiloader_stage2 behavioral1/memory/2132-53-0x0000000003180000-0x0000000004180000-memory.dmp modiloader_stage2 behavioral1/memory/2132-56-0x0000000003180000-0x0000000004180000-memory.dmp modiloader_stage2 behavioral1/memory/2132-18-0x0000000003180000-0x0000000004180000-memory.dmp modiloader_stage2 behavioral1/memory/2132-60-0x0000000003180000-0x0000000004180000-memory.dmp modiloader_stage2 behavioral1/memory/2132-65-0x0000000003180000-0x0000000004180000-memory.dmp modiloader_stage2 behavioral1/memory/2132-19-0x0000000003180000-0x0000000004180000-memory.dmp modiloader_stage2 behavioral1/memory/2132-20-0x0000000003180000-0x0000000004180000-memory.dmp modiloader_stage2 behavioral1/memory/2132-66-0x0000000003180000-0x0000000004180000-memory.dmp modiloader_stage2 behavioral1/memory/2132-63-0x0000000003180000-0x0000000004180000-memory.dmp modiloader_stage2 behavioral1/memory/2132-59-0x0000000003180000-0x0000000004180000-memory.dmp modiloader_stage2 behavioral1/memory/2132-57-0x0000000003180000-0x0000000004180000-memory.dmp modiloader_stage2 behavioral1/memory/2132-54-0x0000000003180000-0x0000000004180000-memory.dmp modiloader_stage2 behavioral1/memory/2132-51-0x0000000003180000-0x0000000004180000-memory.dmp modiloader_stage2 behavioral1/memory/2132-50-0x0000000003180000-0x0000000004180000-memory.dmp modiloader_stage2 behavioral1/memory/2132-48-0x0000000003180000-0x0000000004180000-memory.dmp modiloader_stage2 behavioral1/memory/2132-45-0x0000000003180000-0x0000000004180000-memory.dmp modiloader_stage2 behavioral1/memory/2132-42-0x0000000003180000-0x0000000004180000-memory.dmp modiloader_stage2 behavioral1/memory/2132-38-0x0000000003180000-0x0000000004180000-memory.dmp modiloader_stage2 behavioral1/memory/2132-37-0x0000000003180000-0x0000000004180000-memory.dmp modiloader_stage2 behavioral1/memory/2132-36-0x0000000003180000-0x0000000004180000-memory.dmp modiloader_stage2 behavioral1/memory/2132-33-0x0000000003180000-0x0000000004180000-memory.dmp modiloader_stage2 behavioral1/memory/2132-30-0x0000000003180000-0x0000000004180000-memory.dmp modiloader_stage2 behavioral1/memory/2132-29-0x0000000003180000-0x0000000004180000-memory.dmp modiloader_stage2 behavioral1/memory/2132-27-0x0000000003180000-0x0000000004180000-memory.dmp modiloader_stage2 behavioral1/memory/2132-25-0x0000000003180000-0x0000000004180000-memory.dmp modiloader_stage2 behavioral1/memory/2132-24-0x0000000003180000-0x0000000004180000-memory.dmp modiloader_stage2 behavioral1/memory/2132-23-0x0000000003180000-0x0000000004180000-memory.dmp modiloader_stage2 behavioral1/memory/2132-21-0x0000000003180000-0x0000000004180000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 2132 x.exe -
Loads dropped DLL 3 IoCs
pid Process 1100 WerFault.exe 1100 WerFault.exe 1100 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1100 2132 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language x.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2132 2072 WScript.exe 30 PID 2072 wrote to memory of 2132 2072 WScript.exe 30 PID 2072 wrote to memory of 2132 2072 WScript.exe 30 PID 2072 wrote to memory of 2132 2072 WScript.exe 30 PID 2132 wrote to memory of 1100 2132 x.exe 32 PID 2132 wrote to memory of 1100 2132 x.exe 32 PID 2132 wrote to memory of 1100 2132 x.exe 32 PID 2132 wrote to memory of 1100 2132 x.exe 32
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\INQUIRY LIST 292.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\x.exe"C:\Users\Admin\AppData\Local\Temp\x.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2132 -s 7283⤵
- Loads dropped DLL
- Program crash
PID:1100
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
834KB
MD54692aee744a1b1fab794ff334a77a462
SHA1e5f8e1b159208ff1898e08f5c6a81cd0f0953981
SHA25600140069b6c9f47f98c8e82b448d5f6abdf33354b9bc6becf4b61df72f5ed184
SHA5120755ff15408dd053187b88adc965ff88e71b0b22555000c488e15a415499e9598b9a361f9ef49be066452970cecfc6ecba302cfc956fa9419ddefe1e2978b5d4