Analysis
-
max time kernel
72s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
25-10-2022 09:27
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.InjectorX-gen.18903.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Win32.InjectorX-gen.18903.exe
Resource
win10v2004-20220901-en
General
-
Target
SecuriteInfo.com.Win32.InjectorX-gen.18903.exe
-
Size
769KB
-
MD5
c532d96ddc45a2191d48dd6ea20e1afc
-
SHA1
74ac80e2ef80ef4142b87e9966c7467270d95bc6
-
SHA256
e09a767ad0a00ade6074dcc43b64010206220db79086c3bf9a7330ce1b603cc6
-
SHA512
6ce071cbd8238da3e17587a986b6e8f9f4495087ae27ea48151d23c3bab26811d62c711658431e9240074a3495c886fac631c0383addcfb5850b1554a1ac70c2
-
SSDEEP
12288:hCUL5e5qQvVHmVo+R0OXL4r70eYt8JyynITtsUXnvxwUxLfHazzJrN:s45INvVGVoU0OXLPxMyyIuUPB
Malware Config
Extracted
bitrat
1.38
davidmanne.casacam.net:2223
-
communication_password
b6c6e855edf908ec7c12ce8c8e628a5c
-
tor_process
tor
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 63 IoCs
Processes:
resource yara_rule behavioral2/memory/2696-132-0x00000000021D0000-0x00000000021FB000-memory.dmp modiloader_stage2 behavioral2/memory/2696-134-0x00000000021D0000-0x00000000021FB000-memory.dmp modiloader_stage2 behavioral2/memory/2696-135-0x00000000021D0000-0x00000000021FB000-memory.dmp modiloader_stage2 behavioral2/memory/2696-136-0x00000000021D0000-0x00000000021FB000-memory.dmp modiloader_stage2 behavioral2/memory/2696-137-0x00000000021D0000-0x00000000021FB000-memory.dmp modiloader_stage2 behavioral2/memory/2696-138-0x00000000021D0000-0x00000000021FB000-memory.dmp modiloader_stage2 behavioral2/memory/2696-139-0x00000000021D0000-0x00000000021FB000-memory.dmp modiloader_stage2 behavioral2/memory/2696-140-0x00000000021D0000-0x00000000021FB000-memory.dmp modiloader_stage2 behavioral2/memory/2696-141-0x00000000021D0000-0x00000000021FB000-memory.dmp modiloader_stage2 behavioral2/memory/2696-142-0x00000000021D0000-0x00000000021FB000-memory.dmp modiloader_stage2 behavioral2/memory/2696-143-0x00000000021D0000-0x00000000021FB000-memory.dmp modiloader_stage2 behavioral2/memory/2696-144-0x00000000021D0000-0x00000000021FB000-memory.dmp modiloader_stage2 behavioral2/memory/2696-145-0x00000000021D0000-0x00000000021FB000-memory.dmp modiloader_stage2 behavioral2/memory/2696-146-0x00000000021D0000-0x00000000021FB000-memory.dmp modiloader_stage2 behavioral2/memory/2696-147-0x00000000021D0000-0x00000000021FB000-memory.dmp modiloader_stage2 behavioral2/memory/2696-149-0x00000000021D0000-0x00000000021FB000-memory.dmp modiloader_stage2 behavioral2/memory/2696-150-0x00000000021D0000-0x00000000021FB000-memory.dmp modiloader_stage2 behavioral2/memory/2696-151-0x00000000021D0000-0x00000000021FB000-memory.dmp modiloader_stage2 behavioral2/memory/2696-148-0x00000000021D0000-0x00000000021FB000-memory.dmp modiloader_stage2 behavioral2/memory/2696-152-0x00000000021D0000-0x00000000021FB000-memory.dmp modiloader_stage2 behavioral2/memory/2696-153-0x00000000021D0000-0x00000000021FB000-memory.dmp modiloader_stage2 behavioral2/memory/2696-154-0x00000000021D0000-0x00000000021FB000-memory.dmp modiloader_stage2 behavioral2/memory/2696-155-0x00000000021D0000-0x00000000021FB000-memory.dmp modiloader_stage2 behavioral2/memory/2696-156-0x00000000021D0000-0x00000000021FB000-memory.dmp modiloader_stage2 behavioral2/memory/2696-157-0x00000000021D0000-0x00000000021FB000-memory.dmp modiloader_stage2 behavioral2/memory/2696-158-0x00000000021D0000-0x00000000021FB000-memory.dmp modiloader_stage2 behavioral2/memory/2696-159-0x00000000021D0000-0x00000000021FB000-memory.dmp modiloader_stage2 behavioral2/memory/2696-160-0x00000000021D0000-0x00000000021FB000-memory.dmp modiloader_stage2 behavioral2/memory/2696-161-0x00000000021D0000-0x00000000021FB000-memory.dmp modiloader_stage2 behavioral2/memory/2696-162-0x00000000021D0000-0x00000000021FB000-memory.dmp modiloader_stage2 behavioral2/memory/2696-163-0x00000000021D0000-0x00000000021FB000-memory.dmp modiloader_stage2 behavioral2/memory/2696-164-0x00000000021D0000-0x00000000021FB000-memory.dmp modiloader_stage2 behavioral2/memory/2696-165-0x00000000021D0000-0x00000000021FB000-memory.dmp modiloader_stage2 behavioral2/memory/2696-166-0x00000000021D0000-0x00000000021FB000-memory.dmp modiloader_stage2 behavioral2/memory/2696-167-0x00000000021D0000-0x00000000021FB000-memory.dmp modiloader_stage2 behavioral2/memory/2696-168-0x00000000021D0000-0x00000000021FB000-memory.dmp modiloader_stage2 behavioral2/memory/2696-169-0x00000000021D0000-0x00000000021FB000-memory.dmp modiloader_stage2 behavioral2/memory/2696-170-0x00000000021D0000-0x00000000021FB000-memory.dmp modiloader_stage2 behavioral2/memory/2696-171-0x00000000021D0000-0x00000000021FB000-memory.dmp modiloader_stage2 behavioral2/memory/2696-172-0x00000000021D0000-0x00000000021FB000-memory.dmp modiloader_stage2 behavioral2/memory/2696-173-0x00000000021D0000-0x00000000021FB000-memory.dmp modiloader_stage2 behavioral2/memory/2696-174-0x00000000021D0000-0x00000000021FB000-memory.dmp modiloader_stage2 behavioral2/memory/2696-175-0x00000000021D0000-0x00000000021FB000-memory.dmp modiloader_stage2 behavioral2/memory/2696-176-0x00000000021D0000-0x00000000021FB000-memory.dmp modiloader_stage2 behavioral2/memory/2696-177-0x00000000021D0000-0x00000000021FB000-memory.dmp modiloader_stage2 behavioral2/memory/2696-178-0x00000000021D0000-0x00000000021FB000-memory.dmp modiloader_stage2 behavioral2/memory/2696-179-0x00000000021D0000-0x00000000021FB000-memory.dmp modiloader_stage2 behavioral2/memory/2696-180-0x00000000021D0000-0x00000000021FB000-memory.dmp modiloader_stage2 behavioral2/memory/2696-181-0x00000000021D0000-0x00000000021FB000-memory.dmp modiloader_stage2 behavioral2/memory/2696-182-0x00000000021D0000-0x00000000021FB000-memory.dmp modiloader_stage2 behavioral2/memory/2696-183-0x00000000021D0000-0x00000000021FB000-memory.dmp modiloader_stage2 behavioral2/memory/2696-184-0x00000000021D0000-0x00000000021FB000-memory.dmp modiloader_stage2 behavioral2/memory/2696-185-0x00000000021D0000-0x00000000021FB000-memory.dmp modiloader_stage2 behavioral2/memory/2696-186-0x00000000021D0000-0x00000000021FB000-memory.dmp modiloader_stage2 behavioral2/memory/2696-187-0x00000000021D0000-0x00000000021FB000-memory.dmp modiloader_stage2 behavioral2/memory/2696-188-0x00000000021D0000-0x00000000021FB000-memory.dmp modiloader_stage2 behavioral2/memory/2696-189-0x00000000021D0000-0x00000000021FB000-memory.dmp modiloader_stage2 behavioral2/memory/2696-191-0x00000000021D0000-0x00000000021FB000-memory.dmp modiloader_stage2 behavioral2/memory/2696-192-0x00000000021D0000-0x00000000021FB000-memory.dmp modiloader_stage2 behavioral2/memory/2696-190-0x00000000021D0000-0x00000000021FB000-memory.dmp modiloader_stage2 behavioral2/memory/2696-193-0x00000000021D0000-0x00000000021FB000-memory.dmp modiloader_stage2 behavioral2/memory/2696-194-0x00000000021D0000-0x00000000021FB000-memory.dmp modiloader_stage2 behavioral2/memory/2696-195-0x00000000021D0000-0x00000000021FB000-memory.dmp modiloader_stage2 -
Processes:
resource yara_rule behavioral2/memory/4364-335-0x0000000010410000-0x00000000107F4000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
SecuriteInfo.com.Win32.InjectorX-gen.18903.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Prdtjvjj = "C:\\Users\\Public\\Libraries\\jjvjtdrP.url" SecuriteInfo.com.Win32.InjectorX-gen.18903.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
SecuriteInfo.com.Win32.InjectorX-gen.18903.exepid process 2696 SecuriteInfo.com.Win32.InjectorX-gen.18903.exe 2696 SecuriteInfo.com.Win32.InjectorX-gen.18903.exe -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
SecuriteInfo.com.Win32.InjectorX-gen.18903.exedescription pid process target process PID 2696 wrote to memory of 4364 2696 SecuriteInfo.com.Win32.InjectorX-gen.18903.exe wscript.exe PID 2696 wrote to memory of 4364 2696 SecuriteInfo.com.Win32.InjectorX-gen.18903.exe wscript.exe PID 2696 wrote to memory of 4364 2696 SecuriteInfo.com.Win32.InjectorX-gen.18903.exe wscript.exe PID 2696 wrote to memory of 4364 2696 SecuriteInfo.com.Win32.InjectorX-gen.18903.exe wscript.exe PID 2696 wrote to memory of 4364 2696 SecuriteInfo.com.Win32.InjectorX-gen.18903.exe wscript.exe PID 2696 wrote to memory of 4364 2696 SecuriteInfo.com.Win32.InjectorX-gen.18903.exe wscript.exe PID 2696 wrote to memory of 4364 2696 SecuriteInfo.com.Win32.InjectorX-gen.18903.exe wscript.exe PID 2696 wrote to memory of 4364 2696 SecuriteInfo.com.Win32.InjectorX-gen.18903.exe wscript.exe PID 2696 wrote to memory of 4364 2696 SecuriteInfo.com.Win32.InjectorX-gen.18903.exe wscript.exe PID 2696 wrote to memory of 4364 2696 SecuriteInfo.com.Win32.InjectorX-gen.18903.exe wscript.exe PID 2696 wrote to memory of 4364 2696 SecuriteInfo.com.Win32.InjectorX-gen.18903.exe wscript.exe PID 2696 wrote to memory of 4364 2696 SecuriteInfo.com.Win32.InjectorX-gen.18903.exe wscript.exe PID 2696 wrote to memory of 4364 2696 SecuriteInfo.com.Win32.InjectorX-gen.18903.exe wscript.exe PID 2696 wrote to memory of 4364 2696 SecuriteInfo.com.Win32.InjectorX-gen.18903.exe wscript.exe PID 2696 wrote to memory of 4364 2696 SecuriteInfo.com.Win32.InjectorX-gen.18903.exe wscript.exe PID 2696 wrote to memory of 4364 2696 SecuriteInfo.com.Win32.InjectorX-gen.18903.exe wscript.exe PID 2696 wrote to memory of 4364 2696 SecuriteInfo.com.Win32.InjectorX-gen.18903.exe wscript.exe PID 2696 wrote to memory of 4364 2696 SecuriteInfo.com.Win32.InjectorX-gen.18903.exe wscript.exe PID 2696 wrote to memory of 4364 2696 SecuriteInfo.com.Win32.InjectorX-gen.18903.exe wscript.exe PID 2696 wrote to memory of 4364 2696 SecuriteInfo.com.Win32.InjectorX-gen.18903.exe wscript.exe PID 2696 wrote to memory of 4364 2696 SecuriteInfo.com.Win32.InjectorX-gen.18903.exe wscript.exe PID 2696 wrote to memory of 4364 2696 SecuriteInfo.com.Win32.InjectorX-gen.18903.exe wscript.exe PID 2696 wrote to memory of 4364 2696 SecuriteInfo.com.Win32.InjectorX-gen.18903.exe wscript.exe PID 2696 wrote to memory of 4364 2696 SecuriteInfo.com.Win32.InjectorX-gen.18903.exe wscript.exe PID 2696 wrote to memory of 4364 2696 SecuriteInfo.com.Win32.InjectorX-gen.18903.exe wscript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.InjectorX-gen.18903.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.InjectorX-gen.18903.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\wscript.exeC:\Windows\System32\wscript.exe2⤵PID:4364