Analysis
-
max time kernel
46s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03/10/2022, 23:49
Static task
static1
Behavioral task
behavioral1
Sample
0deba358beb36c517c69c88cf0d186f40a028ca4cc3528978f6cc9f34ceefafc.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
0deba358beb36c517c69c88cf0d186f40a028ca4cc3528978f6cc9f34ceefafc.exe
Resource
win10v2004-20220901-en
General
-
Target
0deba358beb36c517c69c88cf0d186f40a028ca4cc3528978f6cc9f34ceefafc.exe
-
Size
544KB
-
MD5
61584f3fce0bf125d9d0f990f649fac0
-
SHA1
32161dc065cc6598d39de5d80fe38c02e89a0e5d
-
SHA256
0deba358beb36c517c69c88cf0d186f40a028ca4cc3528978f6cc9f34ceefafc
-
SHA512
85c7d3ca92b3b8f9abb39477281a9263c33a09399254c59f17360d668212d3227f49991670ea7f8a02042f1925427cd074d2b23b1d8bd9f0d2f7188a87a1ada2
-
SSDEEP
6144:Qjbeizt9nsp71eytJZCDimN18FAiF2idZecnl20lHRxp3gmncduD7yB9VCO6ScoH:QugzWtSj1v+F3Z4mxxlDqVTVOC
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral1/memory/1148-70-0x0000000000400000-0x0000000000454000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 1148 test.exe -
Loads dropped DLL 6 IoCs
pid Process 1308 0deba358beb36c517c69c88cf0d186f40a028ca4cc3528978f6cc9f34ceefafc.exe 1308 0deba358beb36c517c69c88cf0d186f40a028ca4cc3528978f6cc9f34ceefafc.exe 1148 test.exe 520 WerFault.exe 520 WerFault.exe 520 WerFault.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0deba358beb36c517c69c88cf0d186f40a028ca4cc3528978f6cc9f34ceefafc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0deba358beb36c517c69c88cf0d186f40a028ca4cc3528978f6cc9f34ceefafc.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 520 1148 WerFault.exe 27 -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1308 wrote to memory of 1148 1308 0deba358beb36c517c69c88cf0d186f40a028ca4cc3528978f6cc9f34ceefafc.exe 27 PID 1308 wrote to memory of 1148 1308 0deba358beb36c517c69c88cf0d186f40a028ca4cc3528978f6cc9f34ceefafc.exe 27 PID 1308 wrote to memory of 1148 1308 0deba358beb36c517c69c88cf0d186f40a028ca4cc3528978f6cc9f34ceefafc.exe 27 PID 1308 wrote to memory of 1148 1308 0deba358beb36c517c69c88cf0d186f40a028ca4cc3528978f6cc9f34ceefafc.exe 27 PID 1308 wrote to memory of 1148 1308 0deba358beb36c517c69c88cf0d186f40a028ca4cc3528978f6cc9f34ceefafc.exe 27 PID 1308 wrote to memory of 1148 1308 0deba358beb36c517c69c88cf0d186f40a028ca4cc3528978f6cc9f34ceefafc.exe 27 PID 1308 wrote to memory of 1148 1308 0deba358beb36c517c69c88cf0d186f40a028ca4cc3528978f6cc9f34ceefafc.exe 27 PID 1148 wrote to memory of 520 1148 test.exe 28 PID 1148 wrote to memory of 520 1148 test.exe 28 PID 1148 wrote to memory of 520 1148 test.exe 28 PID 1148 wrote to memory of 520 1148 test.exe 28 PID 1148 wrote to memory of 520 1148 test.exe 28 PID 1148 wrote to memory of 520 1148 test.exe 28 PID 1148 wrote to memory of 520 1148 test.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\0deba358beb36c517c69c88cf0d186f40a028ca4cc3528978f6cc9f34ceefafc.exe"C:\Users\Admin\AppData\Local\Temp\0deba358beb36c517c69c88cf0d186f40a028ca4cc3528978f6cc9f34ceefafc.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\test.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\test.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 2843⤵
- Loads dropped DLL
- Program crash
PID:520
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
51KB
MD5b91ae3a7448e6f7b4fda8820978ba93d
SHA169cb2cf73411c1f36b5192b7382b0d4c4c2dca27
SHA256b2a683f21a8128bfb0f98b4bc5fc4653350cb4512cc7a0daf27716a92c8aef84
SHA512c095594de9fdf3de14832569eab0c0afc062b5d7a7d86dbe998d7d78f7e6adc2f856b87c4ca23add162c516bd0ab97f6279a368a977897f2032efd315934659a
-
Filesize
51KB
MD5b91ae3a7448e6f7b4fda8820978ba93d
SHA169cb2cf73411c1f36b5192b7382b0d4c4c2dca27
SHA256b2a683f21a8128bfb0f98b4bc5fc4653350cb4512cc7a0daf27716a92c8aef84
SHA512c095594de9fdf3de14832569eab0c0afc062b5d7a7d86dbe998d7d78f7e6adc2f856b87c4ca23add162c516bd0ab97f6279a368a977897f2032efd315934659a
-
Filesize
51KB
MD5b91ae3a7448e6f7b4fda8820978ba93d
SHA169cb2cf73411c1f36b5192b7382b0d4c4c2dca27
SHA256b2a683f21a8128bfb0f98b4bc5fc4653350cb4512cc7a0daf27716a92c8aef84
SHA512c095594de9fdf3de14832569eab0c0afc062b5d7a7d86dbe998d7d78f7e6adc2f856b87c4ca23add162c516bd0ab97f6279a368a977897f2032efd315934659a
-
Filesize
51KB
MD5b91ae3a7448e6f7b4fda8820978ba93d
SHA169cb2cf73411c1f36b5192b7382b0d4c4c2dca27
SHA256b2a683f21a8128bfb0f98b4bc5fc4653350cb4512cc7a0daf27716a92c8aef84
SHA512c095594de9fdf3de14832569eab0c0afc062b5d7a7d86dbe998d7d78f7e6adc2f856b87c4ca23add162c516bd0ab97f6279a368a977897f2032efd315934659a
-
Filesize
51KB
MD5b91ae3a7448e6f7b4fda8820978ba93d
SHA169cb2cf73411c1f36b5192b7382b0d4c4c2dca27
SHA256b2a683f21a8128bfb0f98b4bc5fc4653350cb4512cc7a0daf27716a92c8aef84
SHA512c095594de9fdf3de14832569eab0c0afc062b5d7a7d86dbe998d7d78f7e6adc2f856b87c4ca23add162c516bd0ab97f6279a368a977897f2032efd315934659a
-
Filesize
51KB
MD5b91ae3a7448e6f7b4fda8820978ba93d
SHA169cb2cf73411c1f36b5192b7382b0d4c4c2dca27
SHA256b2a683f21a8128bfb0f98b4bc5fc4653350cb4512cc7a0daf27716a92c8aef84
SHA512c095594de9fdf3de14832569eab0c0afc062b5d7a7d86dbe998d7d78f7e6adc2f856b87c4ca23add162c516bd0ab97f6279a368a977897f2032efd315934659a
-
Filesize
51KB
MD5b91ae3a7448e6f7b4fda8820978ba93d
SHA169cb2cf73411c1f36b5192b7382b0d4c4c2dca27
SHA256b2a683f21a8128bfb0f98b4bc5fc4653350cb4512cc7a0daf27716a92c8aef84
SHA512c095594de9fdf3de14832569eab0c0afc062b5d7a7d86dbe998d7d78f7e6adc2f856b87c4ca23add162c516bd0ab97f6279a368a977897f2032efd315934659a
-
Filesize
51KB
MD5b91ae3a7448e6f7b4fda8820978ba93d
SHA169cb2cf73411c1f36b5192b7382b0d4c4c2dca27
SHA256b2a683f21a8128bfb0f98b4bc5fc4653350cb4512cc7a0daf27716a92c8aef84
SHA512c095594de9fdf3de14832569eab0c0afc062b5d7a7d86dbe998d7d78f7e6adc2f856b87c4ca23add162c516bd0ab97f6279a368a977897f2032efd315934659a