Analysis
-
max time kernel
151s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07-11-2022 01:24
Static task
static1
Behavioral task
behavioral1
Sample
b3730370f383a6d8c101a6ed08e1f77d8b151504c7d166870098f4f68843e7b1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b3730370f383a6d8c101a6ed08e1f77d8b151504c7d166870098f4f68843e7b1.exe
Resource
win10v2004-20220901-en
General
-
Target
b3730370f383a6d8c101a6ed08e1f77d8b151504c7d166870098f4f68843e7b1.exe
-
Size
958KB
-
MD5
05aba4cc82b80da0e989dde8a7740d8b
-
SHA1
01a42eeb2e13b6214d0db6af7d6daa6fdda3f818
-
SHA256
b3730370f383a6d8c101a6ed08e1f77d8b151504c7d166870098f4f68843e7b1
-
SHA512
19c40937f1c3f92eb20e32dded9a4305e02f92e09d463fa2cf55d5049144150b9766caf9fb9dcad12ea49c388091a72bce341154f97f6ef2bedec32562630675
-
SSDEEP
12288:BOz6myAFq+8MU0nQ0yWg7CfKaEtRIzkdF4Tm8cHPa9qgbcLARXkS/3Ce/aL4/wcr:BUNH9QYg7htj4ePaE9kKS/3Ce/9TZs
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 4 IoCs
resource yara_rule behavioral1/memory/1488-56-0x0000000000400000-0x000000000086A000-memory.dmp modiloader_stage2 behavioral1/memory/1488-64-0x0000000000400000-0x000000000086A000-memory.dmp modiloader_stage2 behavioral1/memory/2036-65-0x0000000000400000-0x000000000086A000-memory.dmp modiloader_stage2 behavioral1/memory/2036-67-0x0000000000400000-0x000000000086A000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 2036 camfrags.exe -
Deletes itself 1 IoCs
pid Process 1532 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 1488 b3730370f383a6d8c101a6ed08e1f77d8b151504c7d166870098f4f68843e7b1.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 2036 camfrags.exe 2036 camfrags.exe 2036 camfrags.exe 2036 camfrags.exe 2036 camfrags.exe 2036 camfrags.exe 2036 camfrags.exe 2036 camfrags.exe 2036 camfrags.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~1\COMMON~1\MICROS~1\MSInfo\camfrags.exe b3730370f383a6d8c101a6ed08e1f77d8b151504c7d166870098f4f68843e7b1.exe File opened for modification C:\PROGRA~1\COMMON~1\MICROS~1\MSInfo\camfrags.exe b3730370f383a6d8c101a6ed08e1f77d8b151504c7d166870098f4f68843e7b1.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1488 b3730370f383a6d8c101a6ed08e1f77d8b151504c7d166870098f4f68843e7b1.exe 2036 camfrags.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1488 wrote to memory of 2036 1488 b3730370f383a6d8c101a6ed08e1f77d8b151504c7d166870098f4f68843e7b1.exe 27 PID 1488 wrote to memory of 2036 1488 b3730370f383a6d8c101a6ed08e1f77d8b151504c7d166870098f4f68843e7b1.exe 27 PID 1488 wrote to memory of 2036 1488 b3730370f383a6d8c101a6ed08e1f77d8b151504c7d166870098f4f68843e7b1.exe 27 PID 1488 wrote to memory of 2036 1488 b3730370f383a6d8c101a6ed08e1f77d8b151504c7d166870098f4f68843e7b1.exe 27 PID 1488 wrote to memory of 1532 1488 b3730370f383a6d8c101a6ed08e1f77d8b151504c7d166870098f4f68843e7b1.exe 28 PID 1488 wrote to memory of 1532 1488 b3730370f383a6d8c101a6ed08e1f77d8b151504c7d166870098f4f68843e7b1.exe 28 PID 1488 wrote to memory of 1532 1488 b3730370f383a6d8c101a6ed08e1f77d8b151504c7d166870098f4f68843e7b1.exe 28 PID 1488 wrote to memory of 1532 1488 b3730370f383a6d8c101a6ed08e1f77d8b151504c7d166870098f4f68843e7b1.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\b3730370f383a6d8c101a6ed08e1f77d8b151504c7d166870098f4f68843e7b1.exe"C:\Users\Admin\AppData\Local\Temp\b3730370f383a6d8c101a6ed08e1f77d8b151504c7d166870098f4f68843e7b1.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\PROGRA~1\COMMON~1\MICROS~1\MSInfo\camfrags.exeC:\PROGRA~1\COMMON~1\MICROS~1\MSInfo\camfrags.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:2036
-
-
C:\Windows\SysWOW64\cmd.execmd /c erase /F "C:\Users\Admin\AppData\Local\Temp\b3730370f383a6d8c101a6ed08e1f77d8b151504c7d166870098f4f68843e7b1.exe"2⤵
- Deletes itself
PID:1532
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
958KB
MD505aba4cc82b80da0e989dde8a7740d8b
SHA101a42eeb2e13b6214d0db6af7d6daa6fdda3f818
SHA256b3730370f383a6d8c101a6ed08e1f77d8b151504c7d166870098f4f68843e7b1
SHA51219c40937f1c3f92eb20e32dded9a4305e02f92e09d463fa2cf55d5049144150b9766caf9fb9dcad12ea49c388091a72bce341154f97f6ef2bedec32562630675
-
Filesize
958KB
MD505aba4cc82b80da0e989dde8a7740d8b
SHA101a42eeb2e13b6214d0db6af7d6daa6fdda3f818
SHA256b3730370f383a6d8c101a6ed08e1f77d8b151504c7d166870098f4f68843e7b1
SHA51219c40937f1c3f92eb20e32dded9a4305e02f92e09d463fa2cf55d5049144150b9766caf9fb9dcad12ea49c388091a72bce341154f97f6ef2bedec32562630675