Analysis

  • max time kernel
    1s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22-01-2025 00:27

General

  • Target

    bba9e62ccd99eeeb0ad81146a0439b991df4b8c6478163917a02bc231889709dN.exe

  • Size

    112KB

  • MD5

    fe309f7eef1a5f07f19296e21d9d50d0

  • SHA1

    d6512e42f91d0381391eaab9813425aa00b09e4d

  • SHA256

    bba9e62ccd99eeeb0ad81146a0439b991df4b8c6478163917a02bc231889709d

  • SHA512

    d48d33ab6c7d08f279aadfe89f9e3674fbcfe7703471b4ce9f188ef9ed88db6a29fc38d82ae26376fbd499964968421dd3c7d546b22750c03153ec5b27d87948

  • SSDEEP

    1536:t2ovIa47CqIf2f3w41p7sDcX7juR/JSJw8EeNshUDGXJx:tVIr7zI+fAceoGxSKKo5x

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bba9e62ccd99eeeb0ad81146a0439b991df4b8c6478163917a02bc231889709dN.exe
    "C:\Users\Admin\AppData\Local\Temp\bba9e62ccd99eeeb0ad81146a0439b991df4b8c6478163917a02bc231889709dN.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1740
    • C:\Windows\SysWOW64\svchost.exe
      "C:\Windows\system32\svchost.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2612
    • C:\Users\Admin\AppData\Local\Temp\bba9e62ccd99eeeb0ad81146a0439b991df4b8c6478163917a02bc231889709dN.exe
      "C:\Users\Admin\AppData\Local\Temp\bba9e62ccd99eeeb0ad81146a0439b991df4b8c6478163917a02bc231889709dN.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2252
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\JRJSO.bat" "
        3⤵
          PID:2836
          • C:\Windows\SysWOW64\reg.exe
            REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows WA" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe" /f
            4⤵
              PID:3032
          • C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"
            3⤵
              PID:1212
              • C:\Windows\SysWOW64\svchost.exe
                "C:\Windows\system32\svchost.exe"
                4⤵
                  PID:2592
                • C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe
                  "C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"
                  4⤵
                    PID:2648
                  • C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe
                    "C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"
                    4⤵
                      PID:1540

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\JRJSO.bat

                Filesize

                148B

                MD5

                3a4614705555abb049c3298e61170b7f

                SHA1

                c8686410756f346d9551256a5b878b04770950ba

                SHA256

                cff0663c8cfadf83b80583a871c313ffc5d950cb503809cb4a482f400c5d846b

                SHA512

                65ce6fec00e6934f21635e7ccd74757f31ed4b0ddb52bd80d3ea9abeba56340128d23151ef7d9f5daacb5d61e4a4cca50dbb3a43132e350522311ee06e829007

              • \Users\Admin\AppData\Roaming\Microsoft\WAMain.exe

                Filesize

                112KB

                MD5

                b73f9d32313cb0c567d827bc205e427f

                SHA1

                fd05ec1970f131a0a3ecb4d5e18309f063975a05

                SHA256

                6e42ae59e50f22518f0e91d1555788fa0318e37f9fdec3d87c11a3becd750f83

                SHA512

                eae4beeb1c84e3fbccae47e31ce9e5daf4c265a1524847fa559cdadbf7c8a712794b3d8cab80b73aeafef8581159f901e5100ce1fdf5c82b79b07924871565b8

              • memory/1540-291-0x0000000000400000-0x0000000000414000-memory.dmp

                Filesize

                80KB

              • memory/1540-280-0x0000000000400000-0x0000000000414000-memory.dmp

                Filesize

                80KB

              • memory/1740-28-0x0000000000310000-0x0000000000311000-memory.dmp

                Filesize

                4KB

              • memory/1740-89-0x0000000000540000-0x0000000000542000-memory.dmp

                Filesize

                8KB

              • memory/1740-32-0x00000000003B0000-0x00000000003B1000-memory.dmp

                Filesize

                4KB

              • memory/1740-38-0x00000000003D0000-0x00000000003D2000-memory.dmp

                Filesize

                8KB

              • memory/1740-51-0x00000000003E0000-0x00000000003E2000-memory.dmp

                Filesize

                8KB

              • memory/1740-50-0x00000000003D0000-0x00000000003D2000-memory.dmp

                Filesize

                8KB

              • memory/1740-62-0x0000000000500000-0x0000000000502000-memory.dmp

                Filesize

                8KB

              • memory/1740-81-0x0000000000550000-0x0000000000551000-memory.dmp

                Filesize

                4KB

              • memory/1740-90-0x0000000000580000-0x0000000000582000-memory.dmp

                Filesize

                8KB

              • memory/1740-4-0x0000000000230000-0x0000000000231000-memory.dmp

                Filesize

                4KB

              • memory/1740-2-0x0000000000230000-0x0000000000231000-memory.dmp

                Filesize

                4KB

              • memory/1740-20-0x0000000000290000-0x0000000000291000-memory.dmp

                Filesize

                4KB

              • memory/1740-8-0x0000000000250000-0x0000000000251000-memory.dmp

                Filesize

                4KB

              • memory/1740-14-0x0000000000270000-0x0000000000271000-memory.dmp

                Filesize

                4KB

              • memory/2252-288-0x0000000000400000-0x000000000040B000-memory.dmp

                Filesize

                44KB

              • memory/2252-124-0x0000000000400000-0x000000000040B000-memory.dmp

                Filesize

                44KB

              • memory/2252-129-0x0000000000400000-0x000000000040B000-memory.dmp

                Filesize

                44KB

              • memory/2612-91-0x0000000000400000-0x000000000040C000-memory.dmp

                Filesize

                48KB

              • memory/2612-93-0x0000000000400000-0x000000000040C000-memory.dmp

                Filesize

                48KB

              • memory/2612-95-0x0000000000400000-0x000000000040C000-memory.dmp

                Filesize

                48KB

              • memory/2612-99-0x0000000000400000-0x000000000040C000-memory.dmp

                Filesize

                48KB

              • memory/2612-125-0x0000000000400000-0x000000000040C000-memory.dmp

                Filesize

                48KB

              • memory/2612-101-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                Filesize

                4KB

              • memory/2612-103-0x0000000000400000-0x000000000040C000-memory.dmp

                Filesize

                48KB

              • memory/2612-289-0x0000000000400000-0x000000000040C000-memory.dmp

                Filesize

                48KB

              • memory/2612-97-0x0000000000400000-0x000000000040C000-memory.dmp

                Filesize

                48KB

              • memory/2648-290-0x0000000000400000-0x000000000040B000-memory.dmp

                Filesize

                44KB