Analysis
-
max time kernel
75s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-04-2022 04:17
Static task
static1
Behavioral task
behavioral1
Sample
5f151c5ffba68f39fc72de02d40005063ac18a975603ee2a42bd32571a56a75f.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
5f151c5ffba68f39fc72de02d40005063ac18a975603ee2a42bd32571a56a75f.exe
Resource
win10v2004-20220414-en
General
-
Target
5f151c5ffba68f39fc72de02d40005063ac18a975603ee2a42bd32571a56a75f.exe
-
Size
1.0MB
-
MD5
3112e3d3d3d97c54cf011ea5dd15e563
-
SHA1
3a40515aedaae14026ec6ebbee8e8cbf95a794ce
-
SHA256
5f151c5ffba68f39fc72de02d40005063ac18a975603ee2a42bd32571a56a75f
-
SHA512
7555bd105c72a1a0ef595eed192b625cd9bb622e59ce26c0ac74f0fe1b44bb3db68ecf7d0f7251ea043192c4359c1da1171089d1b28f2aa2ce4c2ec41cdbd284
Malware Config
Extracted
modiloader
https://cdn.discordapp.com/attachments/762895490362638339/771588549140807691/Sxzucos
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader First Stage 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1708-56-0x00000000003F0000-0x0000000000400000-memory.dmp modiloader_stage1 behavioral1/memory/1708-63-0x0000000002060000-0x0000000002070000-memory.dmp modiloader_stage1 -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1328 1708 WerFault.exe 5f151c5ffba68f39fc72de02d40005063ac18a975603ee2a42bd32571a56a75f.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
5f151c5ffba68f39fc72de02d40005063ac18a975603ee2a42bd32571a56a75f.exedescription pid process target process PID 1708 wrote to memory of 1328 1708 5f151c5ffba68f39fc72de02d40005063ac18a975603ee2a42bd32571a56a75f.exe WerFault.exe PID 1708 wrote to memory of 1328 1708 5f151c5ffba68f39fc72de02d40005063ac18a975603ee2a42bd32571a56a75f.exe WerFault.exe PID 1708 wrote to memory of 1328 1708 5f151c5ffba68f39fc72de02d40005063ac18a975603ee2a42bd32571a56a75f.exe WerFault.exe PID 1708 wrote to memory of 1328 1708 5f151c5ffba68f39fc72de02d40005063ac18a975603ee2a42bd32571a56a75f.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f151c5ffba68f39fc72de02d40005063ac18a975603ee2a42bd32571a56a75f.exe"C:\Users\Admin\AppData\Local\Temp\5f151c5ffba68f39fc72de02d40005063ac18a975603ee2a42bd32571a56a75f.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1708 -s 14642⤵
- Program crash
PID:1328
-