Analysis
-
max time kernel
88s -
max time network
110s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-04-2022 04:17
Static task
static1
Behavioral task
behavioral1
Sample
b3ccd29acdd65553bccfe085ce3ef82b565b82f2ba694647c57aa490083b2397.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
b3ccd29acdd65553bccfe085ce3ef82b565b82f2ba694647c57aa490083b2397.exe
Resource
win10v2004-20220414-en
General
-
Target
b3ccd29acdd65553bccfe085ce3ef82b565b82f2ba694647c57aa490083b2397.exe
-
Size
1.0MB
-
MD5
57d8616d664ff2bc4eb4e8ccaa16f549
-
SHA1
11e88f2b3f57eecea782ded1507605fd2dc81354
-
SHA256
b3ccd29acdd65553bccfe085ce3ef82b565b82f2ba694647c57aa490083b2397
-
SHA512
fd135569c8b99e4ee4bea8090546adfef2c87775d45a93bd05d407694dccd891c823330fcc7175e4e6d432c95b65a319af7f3e6f64ef7c5a450226ee2ad68fb1
Malware Config
Extracted
modiloader
https://cdn.discordapp.com/attachments/750573182276075583/771584163677470720/Ajbu84g
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader First Stage 2 IoCs
Processes:
resource yara_rule behavioral2/memory/4856-131-0x0000000004680000-0x0000000004690000-memory.dmp modiloader_stage1 behavioral2/memory/4856-138-0x00000000049D0000-0x00000000049E0000-memory.dmp modiloader_stage1 -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4488 4856 WerFault.exe b3ccd29acdd65553bccfe085ce3ef82b565b82f2ba694647c57aa490083b2397.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b3ccd29acdd65553bccfe085ce3ef82b565b82f2ba694647c57aa490083b2397.exe"C:\Users\Admin\AppData\Local\Temp\b3ccd29acdd65553bccfe085ce3ef82b565b82f2ba694647c57aa490083b2397.exe"1⤵PID:4856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4856 -s 17442⤵
- Program crash
PID:4488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4856 -ip 48561⤵PID:2584