Analysis
-
max time kernel
73s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-04-2022 04:17
Static task
static1
Behavioral task
behavioral1
Sample
b3ccd29acdd65553bccfe085ce3ef82b565b82f2ba694647c57aa490083b2397.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
b3ccd29acdd65553bccfe085ce3ef82b565b82f2ba694647c57aa490083b2397.exe
Resource
win10v2004-20220414-en
General
-
Target
b3ccd29acdd65553bccfe085ce3ef82b565b82f2ba694647c57aa490083b2397.exe
-
Size
1.0MB
-
MD5
57d8616d664ff2bc4eb4e8ccaa16f549
-
SHA1
11e88f2b3f57eecea782ded1507605fd2dc81354
-
SHA256
b3ccd29acdd65553bccfe085ce3ef82b565b82f2ba694647c57aa490083b2397
-
SHA512
fd135569c8b99e4ee4bea8090546adfef2c87775d45a93bd05d407694dccd891c823330fcc7175e4e6d432c95b65a319af7f3e6f64ef7c5a450226ee2ad68fb1
Malware Config
Extracted
modiloader
https://cdn.discordapp.com/attachments/750573182276075583/771584163677470720/Ajbu84g
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader First Stage 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1660-56-0x0000000002DD0000-0x0000000002DE0000-memory.dmp modiloader_stage1 behavioral1/memory/1660-63-0x0000000003AB0000-0x0000000003AC0000-memory.dmp modiloader_stage1 -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1204 1660 WerFault.exe b3ccd29acdd65553bccfe085ce3ef82b565b82f2ba694647c57aa490083b2397.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
b3ccd29acdd65553bccfe085ce3ef82b565b82f2ba694647c57aa490083b2397.exedescription pid process target process PID 1660 wrote to memory of 1204 1660 b3ccd29acdd65553bccfe085ce3ef82b565b82f2ba694647c57aa490083b2397.exe WerFault.exe PID 1660 wrote to memory of 1204 1660 b3ccd29acdd65553bccfe085ce3ef82b565b82f2ba694647c57aa490083b2397.exe WerFault.exe PID 1660 wrote to memory of 1204 1660 b3ccd29acdd65553bccfe085ce3ef82b565b82f2ba694647c57aa490083b2397.exe WerFault.exe PID 1660 wrote to memory of 1204 1660 b3ccd29acdd65553bccfe085ce3ef82b565b82f2ba694647c57aa490083b2397.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b3ccd29acdd65553bccfe085ce3ef82b565b82f2ba694647c57aa490083b2397.exe"C:\Users\Admin\AppData\Local\Temp\b3ccd29acdd65553bccfe085ce3ef82b565b82f2ba694647c57aa490083b2397.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1660 -s 14642⤵
- Program crash
PID:1204
-