Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16/01/2025, 07:32
Static task
static1
Behavioral task
behavioral1
Sample
INQUIRYLIST292.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
INQUIRYLIST292.vbs
Resource
win10v2004-20241007-en
General
-
Target
INQUIRYLIST292.vbs
-
Size
1.1MB
-
MD5
2f5edacbfdae7a51267deeb8e937bfec
-
SHA1
d0ce895b7a4e55fe7f12121878a5818850f1dc00
-
SHA256
07898f8cb7e07bd6b86fd09cfff5898eb246a44524b3dda7a39e3de32667490b
-
SHA512
fb8c8d268dd5f4b0c619213a0c36c3132574d04c8780eb4c5623af08c7aea7d12fdc1dcab4903908b099b2874a34f8d9804af746978a93af488a95a101d0d392
-
SSDEEP
24576:uR3Gv4DQo4o3Hj6R3EpqvdG5Np4kJL7a5ZKCmjLpvi:HBo4o3kE4w2kw5w4
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 61 IoCs
resource yara_rule behavioral1/memory/2404-9-0x00000000031A0000-0x00000000041A0000-memory.dmp modiloader_stage2 behavioral1/memory/2404-16-0x00000000031A0000-0x00000000041A0000-memory.dmp modiloader_stage2 behavioral1/memory/2404-68-0x00000000031A0000-0x00000000041A0000-memory.dmp modiloader_stage2 behavioral1/memory/2404-64-0x00000000031A0000-0x00000000041A0000-memory.dmp modiloader_stage2 behavioral1/memory/2404-60-0x00000000031A0000-0x00000000041A0000-memory.dmp modiloader_stage2 behavioral1/memory/2404-59-0x00000000031A0000-0x00000000041A0000-memory.dmp modiloader_stage2 behavioral1/memory/2404-57-0x00000000031A0000-0x00000000041A0000-memory.dmp modiloader_stage2 behavioral1/memory/2404-55-0x00000000031A0000-0x00000000041A0000-memory.dmp modiloader_stage2 behavioral1/memory/2404-54-0x00000000031A0000-0x00000000041A0000-memory.dmp modiloader_stage2 behavioral1/memory/2404-52-0x00000000031A0000-0x00000000041A0000-memory.dmp modiloader_stage2 behavioral1/memory/2404-50-0x00000000031A0000-0x00000000041A0000-memory.dmp modiloader_stage2 behavioral1/memory/2404-48-0x00000000031A0000-0x00000000041A0000-memory.dmp modiloader_stage2 behavioral1/memory/2404-46-0x00000000031A0000-0x00000000041A0000-memory.dmp modiloader_stage2 behavioral1/memory/2404-45-0x00000000031A0000-0x00000000041A0000-memory.dmp modiloader_stage2 behavioral1/memory/2404-43-0x00000000031A0000-0x00000000041A0000-memory.dmp modiloader_stage2 behavioral1/memory/2404-41-0x00000000031A0000-0x00000000041A0000-memory.dmp modiloader_stage2 behavioral1/memory/2404-40-0x00000000031A0000-0x00000000041A0000-memory.dmp modiloader_stage2 behavioral1/memory/2404-38-0x00000000031A0000-0x00000000041A0000-memory.dmp modiloader_stage2 behavioral1/memory/2404-36-0x00000000031A0000-0x00000000041A0000-memory.dmp modiloader_stage2 behavioral1/memory/2404-34-0x00000000031A0000-0x00000000041A0000-memory.dmp modiloader_stage2 behavioral1/memory/2404-31-0x00000000031A0000-0x00000000041A0000-memory.dmp modiloader_stage2 behavioral1/memory/2404-29-0x00000000031A0000-0x00000000041A0000-memory.dmp modiloader_stage2 behavioral1/memory/2404-27-0x00000000031A0000-0x00000000041A0000-memory.dmp modiloader_stage2 behavioral1/memory/2404-26-0x00000000031A0000-0x00000000041A0000-memory.dmp modiloader_stage2 behavioral1/memory/2404-24-0x00000000031A0000-0x00000000041A0000-memory.dmp modiloader_stage2 behavioral1/memory/2404-22-0x00000000031A0000-0x00000000041A0000-memory.dmp modiloader_stage2 behavioral1/memory/2404-21-0x00000000031A0000-0x00000000041A0000-memory.dmp modiloader_stage2 behavioral1/memory/2404-19-0x00000000031A0000-0x00000000041A0000-memory.dmp modiloader_stage2 behavioral1/memory/2404-87-0x00000000031A0000-0x00000000041A0000-memory.dmp modiloader_stage2 behavioral1/memory/2404-84-0x00000000031A0000-0x00000000041A0000-memory.dmp modiloader_stage2 behavioral1/memory/2404-82-0x00000000031A0000-0x00000000041A0000-memory.dmp modiloader_stage2 behavioral1/memory/2404-79-0x00000000031A0000-0x00000000041A0000-memory.dmp modiloader_stage2 behavioral1/memory/2404-77-0x00000000031A0000-0x00000000041A0000-memory.dmp modiloader_stage2 behavioral1/memory/2404-74-0x00000000031A0000-0x00000000041A0000-memory.dmp modiloader_stage2 behavioral1/memory/2404-72-0x00000000031A0000-0x00000000041A0000-memory.dmp modiloader_stage2 behavioral1/memory/2404-70-0x00000000031A0000-0x00000000041A0000-memory.dmp modiloader_stage2 behavioral1/memory/2404-65-0x00000000031A0000-0x00000000041A0000-memory.dmp modiloader_stage2 behavioral1/memory/2404-63-0x00000000031A0000-0x00000000041A0000-memory.dmp modiloader_stage2 behavioral1/memory/2404-61-0x00000000031A0000-0x00000000041A0000-memory.dmp modiloader_stage2 behavioral1/memory/2404-58-0x00000000031A0000-0x00000000041A0000-memory.dmp modiloader_stage2 behavioral1/memory/2404-56-0x00000000031A0000-0x00000000041A0000-memory.dmp modiloader_stage2 behavioral1/memory/2404-53-0x00000000031A0000-0x00000000041A0000-memory.dmp modiloader_stage2 behavioral1/memory/2404-51-0x00000000031A0000-0x00000000041A0000-memory.dmp modiloader_stage2 behavioral1/memory/2404-49-0x00000000031A0000-0x00000000041A0000-memory.dmp modiloader_stage2 behavioral1/memory/2404-47-0x00000000031A0000-0x00000000041A0000-memory.dmp modiloader_stage2 behavioral1/memory/2404-44-0x00000000031A0000-0x00000000041A0000-memory.dmp modiloader_stage2 behavioral1/memory/2404-42-0x00000000031A0000-0x00000000041A0000-memory.dmp modiloader_stage2 behavioral1/memory/2404-39-0x00000000031A0000-0x00000000041A0000-memory.dmp modiloader_stage2 behavioral1/memory/2404-37-0x00000000031A0000-0x00000000041A0000-memory.dmp modiloader_stage2 behavioral1/memory/2404-35-0x00000000031A0000-0x00000000041A0000-memory.dmp modiloader_stage2 behavioral1/memory/2404-33-0x00000000031A0000-0x00000000041A0000-memory.dmp modiloader_stage2 behavioral1/memory/2404-32-0x00000000031A0000-0x00000000041A0000-memory.dmp modiloader_stage2 behavioral1/memory/2404-30-0x00000000031A0000-0x00000000041A0000-memory.dmp modiloader_stage2 behavioral1/memory/2404-28-0x00000000031A0000-0x00000000041A0000-memory.dmp modiloader_stage2 behavioral1/memory/2404-25-0x00000000031A0000-0x00000000041A0000-memory.dmp modiloader_stage2 behavioral1/memory/2404-23-0x00000000031A0000-0x00000000041A0000-memory.dmp modiloader_stage2 behavioral1/memory/2404-20-0x00000000031A0000-0x00000000041A0000-memory.dmp modiloader_stage2 behavioral1/memory/2404-18-0x00000000031A0000-0x00000000041A0000-memory.dmp modiloader_stage2 behavioral1/memory/2404-17-0x00000000031A0000-0x00000000041A0000-memory.dmp modiloader_stage2 behavioral1/memory/2404-15-0x00000000031A0000-0x00000000041A0000-memory.dmp modiloader_stage2 behavioral1/memory/2404-14-0x00000000031A0000-0x00000000041A0000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 2404 x.exe -
Loads dropped DLL 3 IoCs
pid Process 2600 WerFault.exe 2600 WerFault.exe 2600 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2600 2404 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language x.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2768 wrote to memory of 2404 2768 WScript.exe 30 PID 2768 wrote to memory of 2404 2768 WScript.exe 30 PID 2768 wrote to memory of 2404 2768 WScript.exe 30 PID 2768 wrote to memory of 2404 2768 WScript.exe 30 PID 2404 wrote to memory of 2600 2404 x.exe 31 PID 2404 wrote to memory of 2600 2404 x.exe 31 PID 2404 wrote to memory of 2600 2404 x.exe 31 PID 2404 wrote to memory of 2600 2404 x.exe 31
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\INQUIRYLIST292.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\x.exe"C:\Users\Admin\AppData\Local\Temp\x.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2404 -s 7283⤵
- Loads dropped DLL
- Program crash
PID:2600
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
834KB
MD54692aee744a1b1fab794ff334a77a462
SHA1e5f8e1b159208ff1898e08f5c6a81cd0f0953981
SHA25600140069b6c9f47f98c8e82b448d5f6abdf33354b9bc6becf4b61df72f5ed184
SHA5120755ff15408dd053187b88adc965ff88e71b0b22555000c488e15a415499e9598b9a361f9ef49be066452970cecfc6ecba302cfc956fa9419ddefe1e2978b5d4