Analysis
-
max time kernel
73s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25-10-2022 09:24
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.InjectorX-gen.18903.24176.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Win32.InjectorX-gen.18903.24176.exe
Resource
win10v2004-20220812-en
General
-
Target
SecuriteInfo.com.Win32.InjectorX-gen.18903.24176.exe
-
Size
769KB
-
MD5
c532d96ddc45a2191d48dd6ea20e1afc
-
SHA1
74ac80e2ef80ef4142b87e9966c7467270d95bc6
-
SHA256
e09a767ad0a00ade6074dcc43b64010206220db79086c3bf9a7330ce1b603cc6
-
SHA512
6ce071cbd8238da3e17587a986b6e8f9f4495087ae27ea48151d23c3bab26811d62c711658431e9240074a3495c886fac631c0383addcfb5850b1554a1ac70c2
-
SSDEEP
12288:hCUL5e5qQvVHmVo+R0OXL4r70eYt8JyynITtsUXnvxwUxLfHazzJrN:s45INvVGVoU0OXLPxMyyIuUPB
Malware Config
Extracted
bitrat
1.38
davidmanne.casacam.net:2223
-
communication_password
b6c6e855edf908ec7c12ce8c8e628a5c
-
tor_process
tor
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 63 IoCs
Processes:
resource yara_rule behavioral2/memory/916-132-0x0000000002830000-0x000000000285B000-memory.dmp modiloader_stage2 behavioral2/memory/916-134-0x0000000002830000-0x000000000285B000-memory.dmp modiloader_stage2 behavioral2/memory/916-135-0x0000000002830000-0x000000000285B000-memory.dmp modiloader_stage2 behavioral2/memory/916-136-0x0000000002830000-0x000000000285B000-memory.dmp modiloader_stage2 behavioral2/memory/916-137-0x0000000002830000-0x000000000285B000-memory.dmp modiloader_stage2 behavioral2/memory/916-138-0x0000000002830000-0x000000000285B000-memory.dmp modiloader_stage2 behavioral2/memory/916-139-0x0000000002830000-0x000000000285B000-memory.dmp modiloader_stage2 behavioral2/memory/916-140-0x0000000002830000-0x000000000285B000-memory.dmp modiloader_stage2 behavioral2/memory/916-141-0x0000000002830000-0x000000000285B000-memory.dmp modiloader_stage2 behavioral2/memory/916-142-0x0000000002830000-0x000000000285B000-memory.dmp modiloader_stage2 behavioral2/memory/916-143-0x0000000002830000-0x000000000285B000-memory.dmp modiloader_stage2 behavioral2/memory/916-144-0x0000000002830000-0x000000000285B000-memory.dmp modiloader_stage2 behavioral2/memory/916-145-0x0000000002830000-0x000000000285B000-memory.dmp modiloader_stage2 behavioral2/memory/916-146-0x0000000002830000-0x000000000285B000-memory.dmp modiloader_stage2 behavioral2/memory/916-147-0x0000000002830000-0x000000000285B000-memory.dmp modiloader_stage2 behavioral2/memory/916-149-0x0000000002830000-0x000000000285B000-memory.dmp modiloader_stage2 behavioral2/memory/916-148-0x0000000002830000-0x000000000285B000-memory.dmp modiloader_stage2 behavioral2/memory/916-151-0x0000000002830000-0x000000000285B000-memory.dmp modiloader_stage2 behavioral2/memory/916-150-0x0000000002830000-0x000000000285B000-memory.dmp modiloader_stage2 behavioral2/memory/916-152-0x0000000002830000-0x000000000285B000-memory.dmp modiloader_stage2 behavioral2/memory/916-153-0x0000000002830000-0x000000000285B000-memory.dmp modiloader_stage2 behavioral2/memory/916-154-0x0000000002830000-0x000000000285B000-memory.dmp modiloader_stage2 behavioral2/memory/916-155-0x0000000002830000-0x000000000285B000-memory.dmp modiloader_stage2 behavioral2/memory/916-156-0x0000000002830000-0x000000000285B000-memory.dmp modiloader_stage2 behavioral2/memory/916-157-0x0000000002830000-0x000000000285B000-memory.dmp modiloader_stage2 behavioral2/memory/916-158-0x0000000002830000-0x000000000285B000-memory.dmp modiloader_stage2 behavioral2/memory/916-159-0x0000000002830000-0x000000000285B000-memory.dmp modiloader_stage2 behavioral2/memory/916-160-0x0000000002830000-0x000000000285B000-memory.dmp modiloader_stage2 behavioral2/memory/916-161-0x0000000002830000-0x000000000285B000-memory.dmp modiloader_stage2 behavioral2/memory/916-162-0x0000000002830000-0x000000000285B000-memory.dmp modiloader_stage2 behavioral2/memory/916-163-0x0000000002830000-0x000000000285B000-memory.dmp modiloader_stage2 behavioral2/memory/916-164-0x0000000002830000-0x000000000285B000-memory.dmp modiloader_stage2 behavioral2/memory/916-165-0x0000000002830000-0x000000000285B000-memory.dmp modiloader_stage2 behavioral2/memory/916-166-0x0000000002830000-0x000000000285B000-memory.dmp modiloader_stage2 behavioral2/memory/916-167-0x0000000002830000-0x000000000285B000-memory.dmp modiloader_stage2 behavioral2/memory/916-168-0x0000000002830000-0x000000000285B000-memory.dmp modiloader_stage2 behavioral2/memory/916-169-0x0000000002830000-0x000000000285B000-memory.dmp modiloader_stage2 behavioral2/memory/916-170-0x0000000002830000-0x000000000285B000-memory.dmp modiloader_stage2 behavioral2/memory/916-171-0x0000000002830000-0x000000000285B000-memory.dmp modiloader_stage2 behavioral2/memory/916-172-0x0000000002830000-0x000000000285B000-memory.dmp modiloader_stage2 behavioral2/memory/916-173-0x0000000002830000-0x000000000285B000-memory.dmp modiloader_stage2 behavioral2/memory/916-174-0x0000000002830000-0x000000000285B000-memory.dmp modiloader_stage2 behavioral2/memory/916-175-0x0000000002830000-0x000000000285B000-memory.dmp modiloader_stage2 behavioral2/memory/916-176-0x0000000002830000-0x000000000285B000-memory.dmp modiloader_stage2 behavioral2/memory/916-177-0x0000000002830000-0x000000000285B000-memory.dmp modiloader_stage2 behavioral2/memory/916-178-0x0000000002830000-0x000000000285B000-memory.dmp modiloader_stage2 behavioral2/memory/916-179-0x0000000002830000-0x000000000285B000-memory.dmp modiloader_stage2 behavioral2/memory/916-180-0x0000000002830000-0x000000000285B000-memory.dmp modiloader_stage2 behavioral2/memory/916-181-0x0000000002830000-0x000000000285B000-memory.dmp modiloader_stage2 behavioral2/memory/916-182-0x0000000002830000-0x000000000285B000-memory.dmp modiloader_stage2 behavioral2/memory/916-183-0x0000000002830000-0x000000000285B000-memory.dmp modiloader_stage2 behavioral2/memory/916-184-0x0000000002830000-0x000000000285B000-memory.dmp modiloader_stage2 behavioral2/memory/916-185-0x0000000002830000-0x000000000285B000-memory.dmp modiloader_stage2 behavioral2/memory/916-186-0x0000000002830000-0x000000000285B000-memory.dmp modiloader_stage2 behavioral2/memory/916-187-0x0000000002830000-0x000000000285B000-memory.dmp modiloader_stage2 behavioral2/memory/916-188-0x0000000002830000-0x000000000285B000-memory.dmp modiloader_stage2 behavioral2/memory/916-189-0x0000000002830000-0x000000000285B000-memory.dmp modiloader_stage2 behavioral2/memory/916-190-0x0000000002830000-0x000000000285B000-memory.dmp modiloader_stage2 behavioral2/memory/916-191-0x0000000002830000-0x000000000285B000-memory.dmp modiloader_stage2 behavioral2/memory/916-192-0x0000000002830000-0x000000000285B000-memory.dmp modiloader_stage2 behavioral2/memory/916-193-0x0000000002830000-0x000000000285B000-memory.dmp modiloader_stage2 behavioral2/memory/916-194-0x0000000002830000-0x000000000285B000-memory.dmp modiloader_stage2 behavioral2/memory/916-195-0x0000000002830000-0x000000000285B000-memory.dmp modiloader_stage2 -
Processes:
resource yara_rule behavioral2/memory/4980-301-0x0000000010410000-0x00000000107F4000-memory.dmp upx behavioral2/memory/4980-307-0x0000000010410000-0x00000000107F4000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
SecuriteInfo.com.Win32.InjectorX-gen.18903.24176.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Prdtjvjj = "C:\\Users\\Public\\Libraries\\jjvjtdrP.url" SecuriteInfo.com.Win32.InjectorX-gen.18903.24176.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
SecuriteInfo.com.Win32.InjectorX-gen.18903.24176.exepid process 916 SecuriteInfo.com.Win32.InjectorX-gen.18903.24176.exe 916 SecuriteInfo.com.Win32.InjectorX-gen.18903.24176.exe -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
SecuriteInfo.com.Win32.InjectorX-gen.18903.24176.exedescription pid process target process PID 916 wrote to memory of 4980 916 SecuriteInfo.com.Win32.InjectorX-gen.18903.24176.exe wscript.exe PID 916 wrote to memory of 4980 916 SecuriteInfo.com.Win32.InjectorX-gen.18903.24176.exe wscript.exe PID 916 wrote to memory of 4980 916 SecuriteInfo.com.Win32.InjectorX-gen.18903.24176.exe wscript.exe PID 916 wrote to memory of 4980 916 SecuriteInfo.com.Win32.InjectorX-gen.18903.24176.exe wscript.exe PID 916 wrote to memory of 4980 916 SecuriteInfo.com.Win32.InjectorX-gen.18903.24176.exe wscript.exe PID 916 wrote to memory of 4980 916 SecuriteInfo.com.Win32.InjectorX-gen.18903.24176.exe wscript.exe PID 916 wrote to memory of 4980 916 SecuriteInfo.com.Win32.InjectorX-gen.18903.24176.exe wscript.exe PID 916 wrote to memory of 4980 916 SecuriteInfo.com.Win32.InjectorX-gen.18903.24176.exe wscript.exe PID 916 wrote to memory of 4980 916 SecuriteInfo.com.Win32.InjectorX-gen.18903.24176.exe wscript.exe PID 916 wrote to memory of 4980 916 SecuriteInfo.com.Win32.InjectorX-gen.18903.24176.exe wscript.exe PID 916 wrote to memory of 4980 916 SecuriteInfo.com.Win32.InjectorX-gen.18903.24176.exe wscript.exe PID 916 wrote to memory of 4980 916 SecuriteInfo.com.Win32.InjectorX-gen.18903.24176.exe wscript.exe PID 916 wrote to memory of 4980 916 SecuriteInfo.com.Win32.InjectorX-gen.18903.24176.exe wscript.exe PID 916 wrote to memory of 4980 916 SecuriteInfo.com.Win32.InjectorX-gen.18903.24176.exe wscript.exe PID 916 wrote to memory of 4980 916 SecuriteInfo.com.Win32.InjectorX-gen.18903.24176.exe wscript.exe PID 916 wrote to memory of 4980 916 SecuriteInfo.com.Win32.InjectorX-gen.18903.24176.exe wscript.exe PID 916 wrote to memory of 4980 916 SecuriteInfo.com.Win32.InjectorX-gen.18903.24176.exe wscript.exe PID 916 wrote to memory of 4980 916 SecuriteInfo.com.Win32.InjectorX-gen.18903.24176.exe wscript.exe PID 916 wrote to memory of 4980 916 SecuriteInfo.com.Win32.InjectorX-gen.18903.24176.exe wscript.exe PID 916 wrote to memory of 4980 916 SecuriteInfo.com.Win32.InjectorX-gen.18903.24176.exe wscript.exe PID 916 wrote to memory of 4980 916 SecuriteInfo.com.Win32.InjectorX-gen.18903.24176.exe wscript.exe PID 916 wrote to memory of 4980 916 SecuriteInfo.com.Win32.InjectorX-gen.18903.24176.exe wscript.exe PID 916 wrote to memory of 4980 916 SecuriteInfo.com.Win32.InjectorX-gen.18903.24176.exe wscript.exe PID 916 wrote to memory of 4980 916 SecuriteInfo.com.Win32.InjectorX-gen.18903.24176.exe wscript.exe PID 916 wrote to memory of 4980 916 SecuriteInfo.com.Win32.InjectorX-gen.18903.24176.exe wscript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.InjectorX-gen.18903.24176.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.InjectorX-gen.18903.24176.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Windows\SysWOW64\wscript.exeC:\Windows\System32\wscript.exe2⤵PID:4980