Analysis

  • max time kernel
    150s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-01-2025 10:28

General

  • Target

    19012025_1019_x.exe

  • Size

    973KB

  • MD5

    72d63924b474c076c3f54e556dcd3f8b

  • SHA1

    bf448f7c1d3a8906b6c697d2f2dadf58e56f7bbf

  • SHA256

    d78342ca78b975e822d380ccf2d2e8ec9dc910f91eefdeb049f28e7c97598c68

  • SHA512

    b846ade542938e2b70375620c3d2b8e8c28b1232cbf3d11c62ba21109a2d1b1733b5951ba57f1369532bc5fd75cc7466eb8552bf8d439c39418048446aebba55

  • SSDEEP

    24576:bBVRVxmQEkZkjSnbyewh+lMewKe9X7yxw7IYNoIjSst8H2se:bBmB+Q+SJwxw7IYNbjSi8H2se

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 61 IoCs
  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Script User-Agent 2 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\19012025_1019_x.exe
    "C:\Users\Admin\AppData\Local\Temp\19012025_1019_x.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1944
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Public\WbckutgxF.cmd" "
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2400
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Public\Libraries\FX.cmd
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1504
      • C:\Windows \SysWOW64\svchost.pif
        "C:\Windows \SysWOW64\svchost.pif"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1216
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Public\Libraries\NEO.cmd
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3200
          • C:\Windows\system32\extrac32.exe
            extrac32 /C /Y C:\\Windows\\System32\\cmd.exe C:\\Users\\Public\\alpha.pif
            5⤵
              PID:4548
            • C:\Windows\system32\extrac32.exe
              extrac32 /C /Y C:\\Windows\\System32\\sc.exe C:\\Users\\Public\\Upha.pif
              5⤵
                PID:760
              • C:\Windows\system32\extrac32.exe
                extrac32 /C /Y C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe C:\\Users\\Public\\aken.pif
                5⤵
                  PID:4012
                • C:\Users\Public\alpha.pif
                  C:\\Users\\Public\\alpha.pif /c C:\\Users\\Public\\Upha.pif create TrueSight binPath="C:\Windows \SysWOW64\truesight.sys" type= kernel start= auto
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of WriteProcessMemory
                  PID:3148
                  • C:\Users\Public\Upha.pif
                    C:\\Users\\Public\\Upha.pif create TrueSight binPath="C:\Windows \SysWOW64\truesight.sys" type= kernel start= auto
                    6⤵
                    • Executes dropped EXE
                    PID:1136
                • C:\Users\Public\alpha.pif
                  C:\\Users\\Public\\alpha.pif /c C:\\Users\\Public\\Upha.pif start TrueSight
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of WriteProcessMemory
                  PID:4584
                  • C:\Users\Public\Upha.pif
                    C:\\Users\\Public\\Upha.pif start TrueSight
                    6⤵
                    • Executes dropped EXE
                    PID:1992
                • C:\Users\Public\alpha.pif
                  C:\\Users\\Public\\alpha.pif /c C:\\Users\\Public\\aken.pif -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath 'C:\'"
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of WriteProcessMemory
                  PID:3516
                  • C:\Users\Public\aken.pif
                    C:\\Users\\Public\\aken.pif -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath 'C:\'"
                    6⤵
                    • Executes dropped EXE
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:388
          • C:\Users\Public\Libraries\xgtukcbW.pif
            C:\Users\Public\Libraries\xgtukcbW.pif
            2⤵
            • Executes dropped EXE
            PID:736
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 736 -s 12
              3⤵
              • Program crash
              PID:2840
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 736 -ip 736
          1⤵
            PID:4012

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_jd0ocvbh.qcy.ps1

            Filesize

            60B

            MD5

            d17fe0a3f47be24a6453e9ef58c94641

            SHA1

            6ab83620379fc69f80c0242105ddffd7d98d5d9d

            SHA256

            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

            SHA512

            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

          • C:\Users\Public\Libraries\FX.cmd

            Filesize

            8KB

            MD5

            7821e3de3812e791cf3b223500d73bc9

            SHA1

            5e211b634ce77e6fee83ce8a5b8c9a37c8b81e1d

            SHA256

            3daa7f9eee129f61f7a452f7150ee21a1c4141586a37f37842b9c3bb53152a74

            SHA512

            6eae270065401626df97b73a255578bf27b4f4dea480954843823046ad95e40cf706c1a767c8765ef3ab48ea3a18498375614317ec00a9ef29a4dd21edbc5f26

          • C:\Users\Public\Libraries\NEO.cmd

            Filesize

            55KB

            MD5

            3c755cf5a64b256c08f9bb552167975c

            SHA1

            8c81ca56b178ffd77b15f59c5332813416d976d7

            SHA256

            12e0795aa1408bea69bfd0a53bb74558598e71b33fc12ffec0e0ae38d39da490

            SHA512

            8cf0f1a368089e2e3021ce6aeb4984821429d4bb9de3d273a9d0f571a847bba3fc429b84a877afec6decf40e6b94a69d52e8eeea55e042aa9773d3540dbe6bfa

          • C:\Users\Public\Libraries\xgtukcbW.pif

            Filesize

            171KB

            MD5

            22331abcc9472cc9dc6f37faf333aa2c

            SHA1

            2a001c30ba79a19ceaf6a09c3567c70311760aa4

            SHA256

            bdfa725ec2a2c8ea5861d9b4c2f608e631a183fca7916c1e07a28b656cc8ec0c

            SHA512

            c7f5baad732424b975a426867d3d8b5424aa830aa172ed0ff0ef630070bf2b4213750e123a36d8c5a741e22d3999ca1d7e77c62d4b77d6295b20a38114b7843c

          • C:\Users\Public\Upha.pif

            Filesize

            70KB

            MD5

            3fb5cf71f7e7eb49790cb0e663434d80

            SHA1

            b4979a9f970029889713d756c3f123643dde73da

            SHA256

            41f067c3a11b02fe39947f9eba68ae5c7cb5bd1872a6009a4cd1506554a9aba9

            SHA512

            2b59a6d0afef765c6ca80b5738202622cfe0dffcec2092d23ad8149156b0b1dca479e2e2c8562639c97e9f335429854cad12461f2fb277207c39d12e3e308ef5

          • C:\Users\Public\WbckutgxF.cmd

            Filesize

            11KB

            MD5

            f82aeb3b12f33250e404df6ec873dd1d

            SHA1

            bcf538f64457e8d19da89229479cafa9c4cce12f

            SHA256

            23b7417b47c7efb96fb7ce395e325dc831ab2ee03eadda59058d31bdbe9c1ea6

            SHA512

            6f9d6daeed78f45f0f83310b95f47cc0a96d1db1d7f6c2e2485d7a8ecb04fee9865eec3599fee2d67f3332f68a70059f1a6a40050b93ef44d55632c24d108977

          • C:\Users\Public\aken.pif

            Filesize

            442KB

            MD5

            04029e121a0cfa5991749937dd22a1d9

            SHA1

            f43d9bb316e30ae1a3494ac5b0624f6bea1bf054

            SHA256

            9f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f

            SHA512

            6a2fb055473033fd8fdb8868823442875b5b60c115031aaeda688a35a092f6278e8687e2ae2b8dc097f8f3f35d23959757bf0c408274a2ef5f40ddfa4b5c851b

          • C:\Users\Public\alpha.pif

            Filesize

            283KB

            MD5

            8a2122e8162dbef04694b9c3e0b6cdee

            SHA1

            f1efb0fddc156e4c61c5f78a54700e4e7984d55d

            SHA256

            b99d61d874728edc0918ca0eb10eab93d381e7367e377406e65963366c874450

            SHA512

            99e784141193275d4364ba1b8762b07cc150ca3cb7e9aa1d4386ba1fa87e073d0500e61572f8d1b071f2faa2a51bb123e12d9d07054b59a1a2fd768ad9f24397

          • C:\Windows \SysWOW64\NETUTILS.dll

            Filesize

            116KB

            MD5

            0f088756537e0d65627ed2ea392dcaae

            SHA1

            983eb3818223641c13464831a2baad9466c3750f

            SHA256

            abe2b86bc07d11050451906dc5c6955e16341912a1da191fc05b80c6e2f44ad6

            SHA512

            d7ec6126467fd2300f2562be48d302513a92cee328470bf0b25b67dcf646ba6c824cd6195ba056b543db9e2a445991fe31ebc2f89d9eff084907d6af1384720d

          • C:\Windows \SysWOW64\svchost.pif

            Filesize

            94KB

            MD5

            869640d0a3f838694ab4dfea9e2f544d

            SHA1

            bdc42b280446ba53624ff23f314aadb861566832

            SHA256

            0db4d3ffdb96d13cf3b427af8be66d985728c55ae254e4b67d287797e4c0b323

            SHA512

            6e775cfb350415434b18427d5ff79b930ed3b0b3fc3466bc195a796c95661d4696f2d662dd0e020c3a6c3419c2734468b1d7546712ecec868d2bbfd2bc2468a7

          • memory/388-243-0x00000160F0500000-0x00000160F0522000-memory.dmp

            Filesize

            136KB

          • memory/1944-31-0x0000000002A40000-0x0000000003A40000-memory.dmp

            Filesize

            16.0MB

          • memory/1944-40-0x0000000002A40000-0x0000000003A40000-memory.dmp

            Filesize

            16.0MB

          • memory/1944-65-0x0000000002A40000-0x0000000003A40000-memory.dmp

            Filesize

            16.0MB

          • memory/1944-63-0x0000000002A40000-0x0000000003A40000-memory.dmp

            Filesize

            16.0MB

          • memory/1944-62-0x0000000002A40000-0x0000000003A40000-memory.dmp

            Filesize

            16.0MB

          • memory/1944-61-0x0000000002A40000-0x0000000003A40000-memory.dmp

            Filesize

            16.0MB

          • memory/1944-60-0x0000000002A40000-0x0000000003A40000-memory.dmp

            Filesize

            16.0MB

          • memory/1944-59-0x0000000002A40000-0x0000000003A40000-memory.dmp

            Filesize

            16.0MB

          • memory/1944-58-0x0000000002A40000-0x0000000003A40000-memory.dmp

            Filesize

            16.0MB

          • memory/1944-57-0x0000000002A40000-0x0000000003A40000-memory.dmp

            Filesize

            16.0MB

          • memory/1944-56-0x0000000002A40000-0x0000000003A40000-memory.dmp

            Filesize

            16.0MB

          • memory/1944-55-0x0000000002A40000-0x0000000003A40000-memory.dmp

            Filesize

            16.0MB

          • memory/1944-52-0x0000000002A40000-0x0000000003A40000-memory.dmp

            Filesize

            16.0MB

          • memory/1944-51-0x0000000002A40000-0x0000000003A40000-memory.dmp

            Filesize

            16.0MB

          • memory/1944-50-0x0000000002A40000-0x0000000003A40000-memory.dmp

            Filesize

            16.0MB

          • memory/1944-49-0x0000000002A40000-0x0000000003A40000-memory.dmp

            Filesize

            16.0MB

          • memory/1944-48-0x0000000002A40000-0x0000000003A40000-memory.dmp

            Filesize

            16.0MB

          • memory/1944-47-0x0000000002A40000-0x0000000003A40000-memory.dmp

            Filesize

            16.0MB

          • memory/1944-46-0x0000000002A40000-0x0000000003A40000-memory.dmp

            Filesize

            16.0MB

          • memory/1944-93-0x00000000007D0000-0x00000000007D1000-memory.dmp

            Filesize

            4KB

          • memory/1944-45-0x0000000002A40000-0x0000000003A40000-memory.dmp

            Filesize

            16.0MB

          • memory/1944-44-0x0000000002A40000-0x0000000003A40000-memory.dmp

            Filesize

            16.0MB

          • memory/1944-42-0x0000000002A40000-0x0000000003A40000-memory.dmp

            Filesize

            16.0MB

          • memory/1944-41-0x0000000002A40000-0x0000000003A40000-memory.dmp

            Filesize

            16.0MB

          • memory/1944-36-0x0000000002A40000-0x0000000003A40000-memory.dmp

            Filesize

            16.0MB

          • memory/1944-33-0x0000000002A40000-0x0000000003A40000-memory.dmp

            Filesize

            16.0MB

          • memory/1944-32-0x0000000002A40000-0x0000000003A40000-memory.dmp

            Filesize

            16.0MB

          • memory/1944-25-0x0000000002A40000-0x0000000003A40000-memory.dmp

            Filesize

            16.0MB

          • memory/1944-64-0x0000000002A40000-0x0000000003A40000-memory.dmp

            Filesize

            16.0MB

          • memory/1944-53-0x0000000002A40000-0x0000000003A40000-memory.dmp

            Filesize

            16.0MB

          • memory/1944-22-0x0000000002A40000-0x0000000003A40000-memory.dmp

            Filesize

            16.0MB

          • memory/1944-43-0x0000000002A40000-0x0000000003A40000-memory.dmp

            Filesize

            16.0MB

          • memory/1944-20-0x0000000002A40000-0x0000000003A40000-memory.dmp

            Filesize

            16.0MB

          • memory/1944-54-0x0000000002A40000-0x0000000003A40000-memory.dmp

            Filesize

            16.0MB

          • memory/1944-19-0x0000000002A40000-0x0000000003A40000-memory.dmp

            Filesize

            16.0MB

          • memory/1944-39-0x0000000002A40000-0x0000000003A40000-memory.dmp

            Filesize

            16.0MB

          • memory/1944-38-0x0000000002A40000-0x0000000003A40000-memory.dmp

            Filesize

            16.0MB

          • memory/1944-37-0x0000000002A40000-0x0000000003A40000-memory.dmp

            Filesize

            16.0MB

          • memory/1944-18-0x0000000002A40000-0x0000000003A40000-memory.dmp

            Filesize

            16.0MB

          • memory/1944-35-0x0000000002A40000-0x0000000003A40000-memory.dmp

            Filesize

            16.0MB

          • memory/1944-34-0x0000000002A40000-0x0000000003A40000-memory.dmp

            Filesize

            16.0MB

          • memory/1944-17-0x0000000002A40000-0x0000000003A40000-memory.dmp

            Filesize

            16.0MB

          • memory/1944-16-0x0000000002A40000-0x0000000003A40000-memory.dmp

            Filesize

            16.0MB

          • memory/1944-30-0x0000000002A40000-0x0000000003A40000-memory.dmp

            Filesize

            16.0MB

          • memory/1944-29-0x0000000002A40000-0x0000000003A40000-memory.dmp

            Filesize

            16.0MB

          • memory/1944-28-0x0000000002A40000-0x0000000003A40000-memory.dmp

            Filesize

            16.0MB

          • memory/1944-27-0x0000000002A40000-0x0000000003A40000-memory.dmp

            Filesize

            16.0MB

          • memory/1944-26-0x0000000002A40000-0x0000000003A40000-memory.dmp

            Filesize

            16.0MB

          • memory/1944-24-0x0000000002A40000-0x0000000003A40000-memory.dmp

            Filesize

            16.0MB

          • memory/1944-13-0x0000000002A40000-0x0000000003A40000-memory.dmp

            Filesize

            16.0MB

          • memory/1944-23-0x0000000002A40000-0x0000000003A40000-memory.dmp

            Filesize

            16.0MB

          • memory/1944-12-0x0000000002A40000-0x0000000003A40000-memory.dmp

            Filesize

            16.0MB

          • memory/1944-21-0x0000000002A40000-0x0000000003A40000-memory.dmp

            Filesize

            16.0MB

          • memory/1944-6-0x0000000002A40000-0x0000000003A40000-memory.dmp

            Filesize

            16.0MB

          • memory/1944-11-0x0000000002A40000-0x0000000003A40000-memory.dmp

            Filesize

            16.0MB

          • memory/1944-14-0x0000000002A40000-0x0000000003A40000-memory.dmp

            Filesize

            16.0MB

          • memory/1944-7-0x0000000002A40000-0x0000000003A40000-memory.dmp

            Filesize

            16.0MB

          • memory/1944-4-0x0000000000400000-0x00000000004FC000-memory.dmp

            Filesize

            1008KB

          • memory/1944-2-0x0000000002A40000-0x0000000003A40000-memory.dmp

            Filesize

            16.0MB

          • memory/1944-1-0x0000000002A40000-0x0000000003A40000-memory.dmp

            Filesize

            16.0MB

          • memory/1944-0-0x00000000007D0000-0x00000000007D1000-memory.dmp

            Filesize

            4KB

          • memory/1944-10-0x0000000002A40000-0x0000000003A40000-memory.dmp

            Filesize

            16.0MB

          • memory/1944-9-0x0000000002A40000-0x0000000003A40000-memory.dmp

            Filesize

            16.0MB

          • memory/1944-15-0x0000000002A40000-0x0000000003A40000-memory.dmp

            Filesize

            16.0MB

          • memory/1944-8-0x0000000002A40000-0x0000000003A40000-memory.dmp

            Filesize

            16.0MB