Analysis
-
max time kernel
75s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-04-2022 04:17
Static task
static1
Behavioral task
behavioral1
Sample
5f151c5ffba68f39fc72de02d40005063ac18a975603ee2a42bd32571a56a75f.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
5f151c5ffba68f39fc72de02d40005063ac18a975603ee2a42bd32571a56a75f.exe
Resource
win10v2004-20220414-en
General
-
Target
5f151c5ffba68f39fc72de02d40005063ac18a975603ee2a42bd32571a56a75f.exe
-
Size
1.0MB
-
MD5
3112e3d3d3d97c54cf011ea5dd15e563
-
SHA1
3a40515aedaae14026ec6ebbee8e8cbf95a794ce
-
SHA256
5f151c5ffba68f39fc72de02d40005063ac18a975603ee2a42bd32571a56a75f
-
SHA512
7555bd105c72a1a0ef595eed192b625cd9bb622e59ce26c0ac74f0fe1b44bb3db68ecf7d0f7251ea043192c4359c1da1171089d1b28f2aa2ce4c2ec41cdbd284
Malware Config
Extracted
modiloader
https://cdn.discordapp.com/attachments/762895490362638339/771588549140807691/Sxzucos
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader First Stage 2 IoCs
resource yara_rule behavioral1/memory/1708-56-0x00000000003F0000-0x0000000000400000-memory.dmp modiloader_stage1 behavioral1/memory/1708-63-0x0000000002060000-0x0000000002070000-memory.dmp modiloader_stage1 -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Program crash 1 IoCs
pid pid_target Process procid_target 1328 1708 WerFault.exe 26 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1708 wrote to memory of 1328 1708 5f151c5ffba68f39fc72de02d40005063ac18a975603ee2a42bd32571a56a75f.exe 29 PID 1708 wrote to memory of 1328 1708 5f151c5ffba68f39fc72de02d40005063ac18a975603ee2a42bd32571a56a75f.exe 29 PID 1708 wrote to memory of 1328 1708 5f151c5ffba68f39fc72de02d40005063ac18a975603ee2a42bd32571a56a75f.exe 29 PID 1708 wrote to memory of 1328 1708 5f151c5ffba68f39fc72de02d40005063ac18a975603ee2a42bd32571a56a75f.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f151c5ffba68f39fc72de02d40005063ac18a975603ee2a42bd32571a56a75f.exe"C:\Users\Admin\AppData\Local\Temp\5f151c5ffba68f39fc72de02d40005063ac18a975603ee2a42bd32571a56a75f.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1708 -s 14642⤵
- Program crash
PID:1328
-