Analysis
-
max time kernel
119s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-01-2025 11:16
Behavioral task
behavioral1
Sample
7185f5fcededda887fbf4ec8cdf9d9f17721762f982356caf73a87c960533e06.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
7185f5fcededda887fbf4ec8cdf9d9f17721762f982356caf73a87c960533e06.exe
Resource
win10v2004-20241007-en
General
-
Target
7185f5fcededda887fbf4ec8cdf9d9f17721762f982356caf73a87c960533e06.exe
-
Size
130KB
-
MD5
162882de85a1c461285ce6f1c4e432a5
-
SHA1
2d272605b05c28fb28238c5240f9a6cf5021afa7
-
SHA256
7185f5fcededda887fbf4ec8cdf9d9f17721762f982356caf73a87c960533e06
-
SHA512
f2e6fc1231ac4804722a5e37966e0278b90bbc22ed1a85498b0f81acfefd18346f999258ad51153dc7c0b57dea288d7de87e833a347a0a99570aafee7767fbee
-
SSDEEP
1536:eH1ZaQvR1KiX3NK6I+hZhYrt/w5Q6G6IpiRYzz9qJHhhnm0yG5aP/5UROXTmZx:SKQJcinxphkG5Q6GdpIOkJHhKRyOXKn
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 6 IoCs
resource yara_rule behavioral2/memory/1596-48-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral2/memory/1596-52-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral2/memory/1596-54-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral2/memory/1596-60-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral2/memory/1596-59-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral2/memory/1596-66-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 7185f5fcededda887fbf4ec8cdf9d9f17721762f982356caf73a87c960533e06.exe -
Executes dropped EXE 3 IoCs
pid Process 232 Flaseher.exe 788 Flaseher.exe 1596 Flaseher.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\.Flasfh = "C:\\Users\\Admin\\AppData\\Roaming\\..Flash\\Flaseher.exe" reg.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 5116 set thread context of 3992 5116 7185f5fcededda887fbf4ec8cdf9d9f17721762f982356caf73a87c960533e06.exe 85 PID 232 set thread context of 788 232 Flaseher.exe 105 PID 232 set thread context of 1596 232 Flaseher.exe 106 -
resource yara_rule behavioral2/memory/5116-0-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/5116-6-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/3992-9-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3992-11-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/5116-12-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/3992-13-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3992-14-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/files/0x0007000000023cc4-30.dat upx behavioral2/memory/232-37-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/3992-42-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/232-41-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/232-43-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/232-45-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/232-44-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/3992-63-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/232-58-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/788-64-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7185f5fcededda887fbf4ec8cdf9d9f17721762f982356caf73a87c960533e06.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7185f5fcededda887fbf4ec8cdf9d9f17721762f982356caf73a87c960533e06.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Flaseher.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Flaseher.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Flaseher.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 788 Flaseher.exe Token: SeDebugPrivilege 788 Flaseher.exe Token: SeDebugPrivilege 788 Flaseher.exe Token: SeDebugPrivilege 788 Flaseher.exe Token: SeDebugPrivilege 788 Flaseher.exe Token: SeDebugPrivilege 788 Flaseher.exe Token: SeDebugPrivilege 788 Flaseher.exe Token: SeDebugPrivilege 788 Flaseher.exe Token: SeDebugPrivilege 788 Flaseher.exe Token: SeDebugPrivilege 788 Flaseher.exe Token: SeDebugPrivilege 788 Flaseher.exe Token: SeDebugPrivilege 788 Flaseher.exe Token: SeDebugPrivilege 788 Flaseher.exe Token: SeDebugPrivilege 788 Flaseher.exe Token: SeDebugPrivilege 788 Flaseher.exe Token: SeDebugPrivilege 788 Flaseher.exe Token: SeDebugPrivilege 788 Flaseher.exe Token: SeDebugPrivilege 788 Flaseher.exe Token: SeDebugPrivilege 788 Flaseher.exe Token: SeDebugPrivilege 788 Flaseher.exe Token: SeDebugPrivilege 788 Flaseher.exe Token: SeDebugPrivilege 788 Flaseher.exe Token: SeDebugPrivilege 788 Flaseher.exe Token: SeDebugPrivilege 788 Flaseher.exe Token: SeDebugPrivilege 788 Flaseher.exe Token: SeDebugPrivilege 788 Flaseher.exe Token: SeDebugPrivilege 788 Flaseher.exe Token: SeDebugPrivilege 788 Flaseher.exe Token: SeDebugPrivilege 788 Flaseher.exe Token: SeDebugPrivilege 788 Flaseher.exe Token: SeDebugPrivilege 788 Flaseher.exe Token: SeDebugPrivilege 788 Flaseher.exe Token: SeDebugPrivilege 788 Flaseher.exe Token: SeDebugPrivilege 788 Flaseher.exe Token: SeDebugPrivilege 788 Flaseher.exe Token: SeDebugPrivilege 788 Flaseher.exe Token: SeDebugPrivilege 788 Flaseher.exe Token: SeDebugPrivilege 788 Flaseher.exe Token: SeDebugPrivilege 788 Flaseher.exe Token: SeDebugPrivilege 788 Flaseher.exe Token: SeDebugPrivilege 788 Flaseher.exe Token: SeDebugPrivilege 788 Flaseher.exe Token: SeDebugPrivilege 788 Flaseher.exe Token: SeDebugPrivilege 788 Flaseher.exe Token: SeDebugPrivilege 788 Flaseher.exe Token: SeDebugPrivilege 788 Flaseher.exe Token: SeDebugPrivilege 788 Flaseher.exe Token: SeDebugPrivilege 788 Flaseher.exe Token: SeDebugPrivilege 788 Flaseher.exe Token: SeDebugPrivilege 788 Flaseher.exe Token: SeDebugPrivilege 788 Flaseher.exe Token: SeDebugPrivilege 788 Flaseher.exe Token: SeDebugPrivilege 788 Flaseher.exe Token: SeDebugPrivilege 788 Flaseher.exe Token: SeDebugPrivilege 788 Flaseher.exe Token: SeDebugPrivilege 788 Flaseher.exe Token: SeDebugPrivilege 788 Flaseher.exe Token: SeDebugPrivilege 788 Flaseher.exe Token: SeDebugPrivilege 788 Flaseher.exe Token: SeDebugPrivilege 788 Flaseher.exe Token: SeDebugPrivilege 788 Flaseher.exe Token: SeDebugPrivilege 788 Flaseher.exe Token: SeDebugPrivilege 788 Flaseher.exe Token: SeDebugPrivilege 788 Flaseher.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 5116 7185f5fcededda887fbf4ec8cdf9d9f17721762f982356caf73a87c960533e06.exe 3992 7185f5fcededda887fbf4ec8cdf9d9f17721762f982356caf73a87c960533e06.exe 232 Flaseher.exe 788 Flaseher.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 5116 wrote to memory of 3992 5116 7185f5fcededda887fbf4ec8cdf9d9f17721762f982356caf73a87c960533e06.exe 85 PID 5116 wrote to memory of 3992 5116 7185f5fcededda887fbf4ec8cdf9d9f17721762f982356caf73a87c960533e06.exe 85 PID 5116 wrote to memory of 3992 5116 7185f5fcededda887fbf4ec8cdf9d9f17721762f982356caf73a87c960533e06.exe 85 PID 5116 wrote to memory of 3992 5116 7185f5fcededda887fbf4ec8cdf9d9f17721762f982356caf73a87c960533e06.exe 85 PID 5116 wrote to memory of 3992 5116 7185f5fcededda887fbf4ec8cdf9d9f17721762f982356caf73a87c960533e06.exe 85 PID 5116 wrote to memory of 3992 5116 7185f5fcededda887fbf4ec8cdf9d9f17721762f982356caf73a87c960533e06.exe 85 PID 5116 wrote to memory of 3992 5116 7185f5fcededda887fbf4ec8cdf9d9f17721762f982356caf73a87c960533e06.exe 85 PID 5116 wrote to memory of 3992 5116 7185f5fcededda887fbf4ec8cdf9d9f17721762f982356caf73a87c960533e06.exe 85 PID 3992 wrote to memory of 4056 3992 7185f5fcededda887fbf4ec8cdf9d9f17721762f982356caf73a87c960533e06.exe 93 PID 3992 wrote to memory of 4056 3992 7185f5fcededda887fbf4ec8cdf9d9f17721762f982356caf73a87c960533e06.exe 93 PID 3992 wrote to memory of 4056 3992 7185f5fcededda887fbf4ec8cdf9d9f17721762f982356caf73a87c960533e06.exe 93 PID 4056 wrote to memory of 3144 4056 cmd.exe 97 PID 4056 wrote to memory of 3144 4056 cmd.exe 97 PID 4056 wrote to memory of 3144 4056 cmd.exe 97 PID 3992 wrote to memory of 232 3992 7185f5fcededda887fbf4ec8cdf9d9f17721762f982356caf73a87c960533e06.exe 98 PID 3992 wrote to memory of 232 3992 7185f5fcededda887fbf4ec8cdf9d9f17721762f982356caf73a87c960533e06.exe 98 PID 3992 wrote to memory of 232 3992 7185f5fcededda887fbf4ec8cdf9d9f17721762f982356caf73a87c960533e06.exe 98 PID 232 wrote to memory of 788 232 Flaseher.exe 105 PID 232 wrote to memory of 788 232 Flaseher.exe 105 PID 232 wrote to memory of 788 232 Flaseher.exe 105 PID 232 wrote to memory of 788 232 Flaseher.exe 105 PID 232 wrote to memory of 788 232 Flaseher.exe 105 PID 232 wrote to memory of 788 232 Flaseher.exe 105 PID 232 wrote to memory of 788 232 Flaseher.exe 105 PID 232 wrote to memory of 788 232 Flaseher.exe 105 PID 232 wrote to memory of 1596 232 Flaseher.exe 106 PID 232 wrote to memory of 1596 232 Flaseher.exe 106 PID 232 wrote to memory of 1596 232 Flaseher.exe 106 PID 232 wrote to memory of 1596 232 Flaseher.exe 106 PID 232 wrote to memory of 1596 232 Flaseher.exe 106 PID 232 wrote to memory of 1596 232 Flaseher.exe 106 PID 232 wrote to memory of 1596 232 Flaseher.exe 106 PID 232 wrote to memory of 1596 232 Flaseher.exe 106 PID 232 wrote to memory of 1596 232 Flaseher.exe 106 PID 232 wrote to memory of 1596 232 Flaseher.exe 106 PID 232 wrote to memory of 1596 232 Flaseher.exe 106 PID 232 wrote to memory of 1596 232 Flaseher.exe 106 PID 232 wrote to memory of 1596 232 Flaseher.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\7185f5fcededda887fbf4ec8cdf9d9f17721762f982356caf73a87c960533e06.exe"C:\Users\Admin\AppData\Local\Temp\7185f5fcededda887fbf4ec8cdf9d9f17721762f982356caf73a87c960533e06.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Users\Admin\AppData\Local\Temp\7185f5fcededda887fbf4ec8cdf9d9f17721762f982356caf73a87c960533e06.exe"C:\Users\Admin\AppData\Local\Temp\7185f5fcededda887fbf4ec8cdf9d9f17721762f982356caf73a87c960533e06.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\IYWFF.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v ".Flasfh" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\..Flash\Flaseher.exe" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3144
-
-
-
C:\Users\Admin\AppData\Roaming\..Flash\Flaseher.exe"C:\Users\Admin\AppData\Roaming\..Flash\Flaseher.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Users\Admin\AppData\Roaming\..Flash\Flaseher.exe"C:\Users\Admin\AppData\Roaming\..Flash\Flaseher.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:788
-
-
C:\Users\Admin\AppData\Roaming\..Flash\Flaseher.exe"C:\Users\Admin\AppData\Roaming\..Flash\Flaseher.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1596
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
145B
MD5da0cbe87b720a79b294147ed6a4b98be
SHA1ebf0dc9efd7a12cb192e355cda87546acb4ab360
SHA2567ccfeff356fdccc9145bd1e263aa1c56360ca7b6552ed5a5665c596d02a627ed
SHA512f55c4a3d24d2f11db5eda3c816d1cd3b8804a171a7bf715b13d60788247fbb352eafaa5bd4e0a8086c1013396be0a48c7bdb904ab0f974fa0c75e81e3d365acc
-
Filesize
130KB
MD55f037c84bc79a73d24dcf5186fb13d29
SHA1322853ed31c274738a069a5991c66b0d7c2adfe1
SHA256543355dfbed0e285e622481731ad2d0cecf0064e6975b0ff91ccf49ac86e27c4
SHA5123c5068b764e7975b927cf9cfc03fad9f89d9997fd58034a35502023ce3edd4a6729db4cc51d41bc04516acdb3a82bdcf8d636d263e88a74473d94da82842417e