Analysis
-
max time kernel
75s -
max time network
111s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-04-2022 04:17
Static task
static1
Behavioral task
behavioral1
Sample
21ff3661fd96f689aa32338ca899eef0afdc23f509bf29cbb85ad6da5f7bcee6.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
21ff3661fd96f689aa32338ca899eef0afdc23f509bf29cbb85ad6da5f7bcee6.exe
Resource
win10v2004-20220414-en
General
-
Target
21ff3661fd96f689aa32338ca899eef0afdc23f509bf29cbb85ad6da5f7bcee6.exe
-
Size
1.0MB
-
MD5
6adcba88a16f508ec905410cbb050894
-
SHA1
d56cf76e5dac45f67a4e20e6a5b5b909d0f81b7d
-
SHA256
21ff3661fd96f689aa32338ca899eef0afdc23f509bf29cbb85ad6da5f7bcee6
-
SHA512
b0d6058716d4bf1f9b82a80cf53f3663848a1a984b2509807606b932d47f584eb7e20064328e287eff1a906e3cd9e8fe1b9b95089a8ad7d38217e07370a7e4df
Malware Config
Extracted
modiloader
https://cdn.discordapp.com/attachments/762895490362638339/771585630530306059/Swdlert
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader First Stage 2 IoCs
resource yara_rule behavioral1/memory/1964-56-0x0000000001F40000-0x0000000001F50000-memory.dmp modiloader_stage1 behavioral1/memory/1964-63-0x0000000003B20000-0x0000000003B30000-memory.dmp modiloader_stage1 -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Program crash 1 IoCs
pid pid_target Process procid_target 1740 1964 WerFault.exe 25 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1964 wrote to memory of 1740 1964 21ff3661fd96f689aa32338ca899eef0afdc23f509bf29cbb85ad6da5f7bcee6.exe 28 PID 1964 wrote to memory of 1740 1964 21ff3661fd96f689aa32338ca899eef0afdc23f509bf29cbb85ad6da5f7bcee6.exe 28 PID 1964 wrote to memory of 1740 1964 21ff3661fd96f689aa32338ca899eef0afdc23f509bf29cbb85ad6da5f7bcee6.exe 28 PID 1964 wrote to memory of 1740 1964 21ff3661fd96f689aa32338ca899eef0afdc23f509bf29cbb85ad6da5f7bcee6.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\21ff3661fd96f689aa32338ca899eef0afdc23f509bf29cbb85ad6da5f7bcee6.exe"C:\Users\Admin\AppData\Local\Temp\21ff3661fd96f689aa32338ca899eef0afdc23f509bf29cbb85ad6da5f7bcee6.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 14682⤵
- Program crash
PID:1740
-