Analysis
-
max time kernel
159s -
max time network
286s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
31/03/2025, 15:03
Static task
static1
Behavioral task
behavioral1
Sample
OEC ISF FORM-20250326-GCE SO 1047 - SO 1047 HBL # OERT101510Y00039.xls.scr
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
OEC-GCE-250326-Shipper Verified Gross Mass (VGM) Declaration Form (update) SO 1047.XLSX.scr
Resource
win10v2004-20250314-en
General
-
Target
OEC ISF FORM-20250326-GCE SO 1047 - SO 1047 HBL # OERT101510Y00039.xls.scr
-
Size
1.7MB
-
MD5
1e95eb48d695afe91c047b6cddfe5bc8
-
SHA1
1978c862031fc937077de8194c629a91caf68503
-
SHA256
dbffd5f06f2ccb9ad414b070621591dfa2cc7c181f164371ebaf6d5a75f2f546
-
SHA512
5cb2e3ce06c2ca758e26a064feab0c86af598b57feccfcac0ffece401d20d4e78b091106acb4e17fc6b6769a9832925ca8aa5de4746d772b70b8109e08109923
-
SSDEEP
24576:7gvMTgfHxu3/ICpRODsFe6B8mx43wLCM+B4XsoY/L71zmNlY2P5B546/yC:7gnxg/y3M0BkS/LhzIlpP5B54s
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 61 IoCs
resource yara_rule behavioral1/memory/2356-2-0x00000000029E0000-0x00000000039E0000-memory.dmp modiloader_stage2 behavioral1/memory/2356-11-0x00000000029E0000-0x00000000039E0000-memory.dmp modiloader_stage2 behavioral1/memory/2356-22-0x00000000029E0000-0x00000000039E0000-memory.dmp modiloader_stage2 behavioral1/memory/2356-53-0x00000000029E0000-0x00000000039E0000-memory.dmp modiloader_stage2 behavioral1/memory/2356-64-0x00000000029E0000-0x00000000039E0000-memory.dmp modiloader_stage2 behavioral1/memory/2356-63-0x00000000029E0000-0x00000000039E0000-memory.dmp modiloader_stage2 behavioral1/memory/2356-62-0x00000000029E0000-0x00000000039E0000-memory.dmp modiloader_stage2 behavioral1/memory/2356-61-0x00000000029E0000-0x00000000039E0000-memory.dmp modiloader_stage2 behavioral1/memory/2356-60-0x00000000029E0000-0x00000000039E0000-memory.dmp modiloader_stage2 behavioral1/memory/2356-59-0x00000000029E0000-0x00000000039E0000-memory.dmp modiloader_stage2 behavioral1/memory/2356-58-0x00000000029E0000-0x00000000039E0000-memory.dmp modiloader_stage2 behavioral1/memory/2356-57-0x00000000029E0000-0x00000000039E0000-memory.dmp modiloader_stage2 behavioral1/memory/2356-56-0x00000000029E0000-0x00000000039E0000-memory.dmp modiloader_stage2 behavioral1/memory/2356-55-0x00000000029E0000-0x00000000039E0000-memory.dmp modiloader_stage2 behavioral1/memory/2356-54-0x00000000029E0000-0x00000000039E0000-memory.dmp modiloader_stage2 behavioral1/memory/2356-52-0x00000000029E0000-0x00000000039E0000-memory.dmp modiloader_stage2 behavioral1/memory/2356-51-0x00000000029E0000-0x00000000039E0000-memory.dmp modiloader_stage2 behavioral1/memory/2356-50-0x00000000029E0000-0x00000000039E0000-memory.dmp modiloader_stage2 behavioral1/memory/2356-48-0x00000000029E0000-0x00000000039E0000-memory.dmp modiloader_stage2 behavioral1/memory/2356-49-0x00000000029E0000-0x00000000039E0000-memory.dmp modiloader_stage2 behavioral1/memory/2356-42-0x00000000029E0000-0x00000000039E0000-memory.dmp modiloader_stage2 behavioral1/memory/2356-41-0x00000000029E0000-0x00000000039E0000-memory.dmp modiloader_stage2 behavioral1/memory/2356-40-0x00000000029E0000-0x00000000039E0000-memory.dmp modiloader_stage2 behavioral1/memory/2356-38-0x00000000029E0000-0x00000000039E0000-memory.dmp modiloader_stage2 behavioral1/memory/2356-37-0x00000000029E0000-0x00000000039E0000-memory.dmp modiloader_stage2 behavioral1/memory/2356-36-0x00000000029E0000-0x00000000039E0000-memory.dmp modiloader_stage2 behavioral1/memory/2356-31-0x00000000029E0000-0x00000000039E0000-memory.dmp modiloader_stage2 behavioral1/memory/2356-32-0x00000000029E0000-0x00000000039E0000-memory.dmp modiloader_stage2 behavioral1/memory/2356-29-0x00000000029E0000-0x00000000039E0000-memory.dmp modiloader_stage2 behavioral1/memory/2356-28-0x00000000029E0000-0x00000000039E0000-memory.dmp modiloader_stage2 behavioral1/memory/2356-65-0x00000000029E0000-0x00000000039E0000-memory.dmp modiloader_stage2 behavioral1/memory/2356-27-0x00000000029E0000-0x00000000039E0000-memory.dmp modiloader_stage2 behavioral1/memory/2356-26-0x00000000029E0000-0x00000000039E0000-memory.dmp modiloader_stage2 behavioral1/memory/2356-25-0x00000000029E0000-0x00000000039E0000-memory.dmp modiloader_stage2 behavioral1/memory/2356-23-0x00000000029E0000-0x00000000039E0000-memory.dmp modiloader_stage2 behavioral1/memory/2356-21-0x00000000029E0000-0x00000000039E0000-memory.dmp modiloader_stage2 behavioral1/memory/2356-47-0x00000000029E0000-0x00000000039E0000-memory.dmp modiloader_stage2 behavioral1/memory/2356-46-0x00000000029E0000-0x00000000039E0000-memory.dmp modiloader_stage2 behavioral1/memory/2356-45-0x00000000029E0000-0x00000000039E0000-memory.dmp modiloader_stage2 behavioral1/memory/2356-44-0x00000000029E0000-0x00000000039E0000-memory.dmp modiloader_stage2 behavioral1/memory/2356-43-0x00000000029E0000-0x00000000039E0000-memory.dmp modiloader_stage2 behavioral1/memory/2356-19-0x00000000029E0000-0x00000000039E0000-memory.dmp modiloader_stage2 behavioral1/memory/2356-18-0x00000000029E0000-0x00000000039E0000-memory.dmp modiloader_stage2 behavioral1/memory/2356-17-0x00000000029E0000-0x00000000039E0000-memory.dmp modiloader_stage2 behavioral1/memory/2356-39-0x00000000029E0000-0x00000000039E0000-memory.dmp modiloader_stage2 behavioral1/memory/2356-16-0x00000000029E0000-0x00000000039E0000-memory.dmp modiloader_stage2 behavioral1/memory/2356-35-0x00000000029E0000-0x00000000039E0000-memory.dmp modiloader_stage2 behavioral1/memory/2356-34-0x00000000029E0000-0x00000000039E0000-memory.dmp modiloader_stage2 behavioral1/memory/2356-15-0x00000000029E0000-0x00000000039E0000-memory.dmp modiloader_stage2 behavioral1/memory/2356-33-0x00000000029E0000-0x00000000039E0000-memory.dmp modiloader_stage2 behavioral1/memory/2356-14-0x00000000029E0000-0x00000000039E0000-memory.dmp modiloader_stage2 behavioral1/memory/2356-30-0x00000000029E0000-0x00000000039E0000-memory.dmp modiloader_stage2 behavioral1/memory/2356-13-0x00000000029E0000-0x00000000039E0000-memory.dmp modiloader_stage2 behavioral1/memory/2356-12-0x00000000029E0000-0x00000000039E0000-memory.dmp modiloader_stage2 behavioral1/memory/2356-24-0x00000000029E0000-0x00000000039E0000-memory.dmp modiloader_stage2 behavioral1/memory/2356-10-0x00000000029E0000-0x00000000039E0000-memory.dmp modiloader_stage2 behavioral1/memory/2356-20-0x00000000029E0000-0x00000000039E0000-memory.dmp modiloader_stage2 behavioral1/memory/2356-9-0x00000000029E0000-0x00000000039E0000-memory.dmp modiloader_stage2 behavioral1/memory/2356-8-0x00000000029E0000-0x00000000039E0000-memory.dmp modiloader_stage2 behavioral1/memory/2356-7-0x00000000029E0000-0x00000000039E0000-memory.dmp modiloader_stage2 behavioral1/memory/2356-6-0x00000000029E0000-0x00000000039E0000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Control Panel\International\Geo\Nation OEC ISF FORM-20250326-GCE SO 1047 - SO 1047 HBL # OERT101510Y00039.xls.scr Key value queried \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Control Panel\International\Geo\Nation cmd.exe -
Executes dropped EXE 6 IoCs
pid Process 4936 alpha.pif 772 alpha.pif 3460 wsp.exe 1776 wsp.exe 1060 wsp.exe 4552 Amchqbev.PIF -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wsp-KG6IRP = "\"C:\\ProgramData\\WSP\\wsp.exe\"" OEC ISF FORM-20250326-GCE SO 1047 - SO 1047 HBL # OERT101510Y00039.xls.scr Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\wsp-KG6IRP = "\"C:\\ProgramData\\WSP\\wsp.exe\"" OEC ISF FORM-20250326-GCE SO 1047 - SO 1047 HBL # OERT101510Y00039.xls.scr Set value (str) \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Amchqbev = "C:\\\\Users\\\\Admin\\\\Links\\Amchqbev.url" OEC ISF FORM-20250326-GCE SO 1047 - SO 1047 HBL # OERT101510Y00039.xls.scr -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
pid pid_target Process procid_target 3396 1776 WerFault.exe 118 3960 1060 WerFault.exe 119 464 3460 WerFault.exe 116 3244 4552 WerFault.exe 120 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alpha.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alpha.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wsp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wsp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wsp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Amchqbev.PIF Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OEC ISF FORM-20250326-GCE SO 1047 - SO 1047 HBL # OERT101510Y00039.xls.scr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1908 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1908 PING.EXE -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2356 wrote to memory of 4140 2356 OEC ISF FORM-20250326-GCE SO 1047 - SO 1047 HBL # OERT101510Y00039.xls.scr 99 PID 2356 wrote to memory of 4140 2356 OEC ISF FORM-20250326-GCE SO 1047 - SO 1047 HBL # OERT101510Y00039.xls.scr 99 PID 2356 wrote to memory of 4140 2356 OEC ISF FORM-20250326-GCE SO 1047 - SO 1047 HBL # OERT101510Y00039.xls.scr 99 PID 2356 wrote to memory of 2928 2356 OEC ISF FORM-20250326-GCE SO 1047 - SO 1047 HBL # OERT101510Y00039.xls.scr 102 PID 2356 wrote to memory of 2928 2356 OEC ISF FORM-20250326-GCE SO 1047 - SO 1047 HBL # OERT101510Y00039.xls.scr 102 PID 2356 wrote to memory of 2928 2356 OEC ISF FORM-20250326-GCE SO 1047 - SO 1047 HBL # OERT101510Y00039.xls.scr 102 PID 2928 wrote to memory of 1908 2928 cmd.exe 104 PID 2928 wrote to memory of 1908 2928 cmd.exe 104 PID 2928 wrote to memory of 1908 2928 cmd.exe 104 PID 4140 wrote to memory of 3548 4140 cmd.exe 105 PID 4140 wrote to memory of 3548 4140 cmd.exe 105 PID 4140 wrote to memory of 3548 4140 cmd.exe 105 PID 4140 wrote to memory of 4936 4140 cmd.exe 106 PID 4140 wrote to memory of 4936 4140 cmd.exe 106 PID 4140 wrote to memory of 4936 4140 cmd.exe 106 PID 4140 wrote to memory of 772 4140 cmd.exe 107 PID 4140 wrote to memory of 772 4140 cmd.exe 107 PID 4140 wrote to memory of 772 4140 cmd.exe 107 PID 2356 wrote to memory of 3460 2356 OEC ISF FORM-20250326-GCE SO 1047 - SO 1047 HBL # OERT101510Y00039.xls.scr 116 PID 2356 wrote to memory of 3460 2356 OEC ISF FORM-20250326-GCE SO 1047 - SO 1047 HBL # OERT101510Y00039.xls.scr 116 PID 2356 wrote to memory of 3460 2356 OEC ISF FORM-20250326-GCE SO 1047 - SO 1047 HBL # OERT101510Y00039.xls.scr 116 PID 3656 wrote to memory of 1776 3656 cmd.exe 118 PID 3656 wrote to memory of 1776 3656 cmd.exe 118 PID 3656 wrote to memory of 1776 3656 cmd.exe 118 PID 1368 wrote to memory of 1060 1368 cmd.exe 119 PID 1368 wrote to memory of 1060 1368 cmd.exe 119 PID 1368 wrote to memory of 1060 1368 cmd.exe 119 PID 1544 wrote to memory of 4552 1544 cmd.exe 120 PID 1544 wrote to memory of 4552 1544 cmd.exe 120 PID 1544 wrote to memory of 4552 1544 cmd.exe 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\OEC ISF FORM-20250326-GCE SO 1047 - SO 1047 HBL # OERT101510Y00039.xls.scr"C:\Users\Admin\AppData\Local\Temp\OEC ISF FORM-20250326-GCE SO 1047 - SO 1047 HBL # OERT101510Y00039.xls.scr" /S1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\\Users\\All Users\\1970.cmd""2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Windows\SysWOW64\esentutl.exeC:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\cmd.exe /d C:\\Users\\Public\\alpha.pif /o3⤵PID:3548
-
-
C:\Users\Public\alpha.pifC:\\Users\\Public\\alpha.pif /c mkdir "\\?\C:\Windows "3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4936
-
-
C:\Users\Public\alpha.pifC:\\Users\\Public\\alpha.pif /c mkdir "\\?\C:\Windows \SysWOW64"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:772
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\\Users\\All Users\\35962.cmd""2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 103⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1908
-
-
-
C:\ProgramData\WSP\wsp.exe"C:\ProgramData\WSP\wsp.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3460 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3460 -s 12203⤵
- Program crash
PID:464
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\\Users\\Admin\\Links\Amchqbev.url1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Users\Admin\Links\Amchqbev.PIF"C:\Users\Admin\Links\Amchqbev.PIF"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4552 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4552 -s 11763⤵
- Program crash
PID:3244
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\WSP\wsp.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\ProgramData\WSP\wsp.exeC:\ProgramData\WSP\wsp.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1060 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1060 -s 11563⤵
- Program crash
PID:3960
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\WSP\wsp.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\ProgramData\WSP\wsp.exeC:\ProgramData\WSP\wsp.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1776 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1776 -s 11843⤵
- Program crash
PID:3396
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1776 -ip 17761⤵PID:1416
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1060 -ip 10601⤵PID:1656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3460 -ip 34601⤵PID:1852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4552 -ip 45521⤵PID:2228
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD51e95eb48d695afe91c047b6cddfe5bc8
SHA11978c862031fc937077de8194c629a91caf68503
SHA256dbffd5f06f2ccb9ad414b070621591dfa2cc7c181f164371ebaf6d5a75f2f546
SHA5125cb2e3ce06c2ca758e26a064feab0c86af598b57feccfcac0ffece401d20d4e78b091106acb4e17fc6b6769a9832925ca8aa5de4746d772b70b8109e08109923
-
Filesize
99B
MD5dd686e5222c2ba6e7dd5ce3e28c51d67
SHA1ab8ed771cdb6f9db2d14f7351e8b7656d60b9d17
SHA256fb7b1616c2b08c6e1c634f7c4506278f0683f453d10a72c628e98b9484eb47e4
SHA512c480df0a0e6d543d11ef02114f265ed9e09c405259210891879dd5cd2628bc3f05eeae81b118ac7849b8b150f76eb9dc9465669ab14a3c694114b49e8ec8a7af
-
Filesize
19KB
MD51df650cca01129127d30063634ab5c03
SHA1bc7172dec0b12b05f2247bd5e17751eb33474d4e
SHA256edd4094e7a82a6ff8be65d6b075e9513bd15a6b74f8032b5c10ce18f7191fa60
SHA5120bddf9ecaaedb0c30103a1fbfb644d6d4f7608bd596403307ed89b2390568c3a29e2cf55d10e2eadbfc407ede52eaf9a4f2321ba5f37e358a1039f73c7688fbd
-
Filesize
2KB
MD59a020804eba1ffac2928d7c795144bbf
SHA161fdc4135afdc99e106912aeafeac9c8a967becc
SHA256a86c6c7a2bf9e12c45275a5e7ebebd5e6d2ba302fe0a12600b7c9fdf283d9e63
SHA51242f6d754f1bdbeb6e4cc7aeb57ff4c4d126944f950d260a0839911e576ad16002c16122f81c1d39fa529432dca0a48c9acfbb18804ca9044425c8e424a5518be
-
Filesize
231KB
MD5d0fce3afa6aa1d58ce9fa336cc2b675b
SHA14048488de6ba4bfef9edf103755519f1f762668f
SHA2564d89fc34d5f0f9babd022271c585a9477bf41e834e46b991deaa0530fdb25e22
SHA51280e127ef81752cd50f9ea2d662dc4d3bf8db8d29680e75fa5fc406ca22cafa5c4d89ef2eac65b486413d3cdd57a2c12a1cb75f65d1e312a717d262265736d1c2