Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
20-02-2025 13:55
Static task
static1
Behavioral task
behavioral1
Sample
MACHINE QUOTATION.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
MACHINE QUOTATION.exe
Resource
win10v2004-20250217-en
General
-
Target
MACHINE QUOTATION.exe
-
Size
1.6MB
-
MD5
55121a01357e08afbb13cd866842160f
-
SHA1
9baadb101bc10773b9b3b193f8f002e3b5711115
-
SHA256
5dcbf984225d5a2f42d6382630a97b57a097954925465c1369e106efb83cda0c
-
SHA512
ec844e64c3f756c2e4195a3d419654818dadc4b5fb678a2af6df7b6efdac4c4c0a1f56c7c3be61eea8dcc5f98e8da97e47f1e918a8e3b5fb1adc72700f5c791c
-
SSDEEP
24576:i8tlnAd8xNapQHnIuetlVP8w9Si/6nvVlp0cYYa4Tdk4EzS65+19T:iqqqJvI88Si/SvVFnTS4Q5+1V
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral2/memory/3612-2-0x0000000002820000-0x0000000003820000-memory.dmp modiloader_stage2 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MACHINE QUOTATION.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SndVol.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3612 MACHINE QUOTATION.exe 3612 MACHINE QUOTATION.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4920 SndVol.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 4920 SndVol.exe 4920 SndVol.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3612 wrote to memory of 4920 3612 MACHINE QUOTATION.exe 90 PID 3612 wrote to memory of 4920 3612 MACHINE QUOTATION.exe 90 PID 3612 wrote to memory of 4920 3612 MACHINE QUOTATION.exe 90 PID 3612 wrote to memory of 4920 3612 MACHINE QUOTATION.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\MACHINE QUOTATION.exe"C:\Users\Admin\AppData\Local\Temp\MACHINE QUOTATION.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Windows\SysWOW64\SndVol.exeC:\Windows\System32\SndVol.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4920
-