Analysis
-
max time kernel
32s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 19:27
Static task
static1
Behavioral task
behavioral1
Sample
java.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
java.exe
Resource
win10v2004-20221111-en
General
-
Target
java.exe
-
Size
380KB
-
MD5
1ab27b63c1a49193f4b2f1f9554ca91b
-
SHA1
a746201024f0cd21e1d10f4d435510e3f4de33d2
-
SHA256
a644f4644a53319c1acefcd761d046e98a480f291ac0649f540a80dab570a237
-
SHA512
03d41630e4d4cae5058ad3e9080e53e1657c1f1bae2503410551656cbc1e575b06f8828189ead40e1f96eb7a85bb5e292f2ebea952cc362a7ef6c61d7c2a9af5
-
SSDEEP
6144:Hk8u7jp9fQ6u+JUuWj2bL30ct3PUgXjgc/kS8vyiYESWT5kLo8Xb0FAFnQslaHu3:UplTUJ2bLkct3s1c/kS8vyiYMT5kLoWt
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 9 IoCs
Processes:
resource yara_rule behavioral1/memory/360-57-0x0000000000400000-0x0000000000482000-memory.dmp modiloader_stage2 behavioral1/memory/548-64-0x0000000000400000-0x0000000000482000-memory.dmp modiloader_stage2 behavioral1/memory/548-69-0x0000000000400000-0x0000000000482000-memory.dmp modiloader_stage2 behavioral1/memory/1680-75-0x0000000000400000-0x0000000000482000-memory.dmp modiloader_stage2 behavioral1/memory/1664-82-0x0000000000400000-0x0000000000482000-memory.dmp modiloader_stage2 behavioral1/memory/1920-89-0x0000000000400000-0x0000000000482000-memory.dmp modiloader_stage2 behavioral1/memory/1484-96-0x0000000000400000-0x0000000000482000-memory.dmp modiloader_stage2 behavioral1/memory/1020-104-0x0000000000400000-0x0000000000482000-memory.dmp modiloader_stage2 behavioral1/memory/1092-110-0x0000000000400000-0x0000000000482000-memory.dmp modiloader_stage2 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1344 1092 WerFault.exe java.exe -
Suspicious use of WriteProcessMemory 53 IoCs
Processes:
java.exejava.exejava.exejava.exejava.exejava.exejava.exejava.exedescription pid process target process PID 360 wrote to memory of 548 360 java.exe java.exe PID 360 wrote to memory of 548 360 java.exe java.exe PID 360 wrote to memory of 548 360 java.exe java.exe PID 360 wrote to memory of 548 360 java.exe java.exe PID 360 wrote to memory of 548 360 java.exe java.exe PID 360 wrote to memory of 548 360 java.exe java.exe PID 360 wrote to memory of 548 360 java.exe java.exe PID 548 wrote to memory of 1680 548 java.exe java.exe PID 548 wrote to memory of 1680 548 java.exe java.exe PID 548 wrote to memory of 1680 548 java.exe java.exe PID 548 wrote to memory of 1680 548 java.exe java.exe PID 548 wrote to memory of 1680 548 java.exe java.exe PID 548 wrote to memory of 1680 548 java.exe java.exe PID 548 wrote to memory of 1680 548 java.exe java.exe PID 1680 wrote to memory of 1664 1680 java.exe java.exe PID 1680 wrote to memory of 1664 1680 java.exe java.exe PID 1680 wrote to memory of 1664 1680 java.exe java.exe PID 1680 wrote to memory of 1664 1680 java.exe java.exe PID 1680 wrote to memory of 1664 1680 java.exe java.exe PID 1680 wrote to memory of 1664 1680 java.exe java.exe PID 1680 wrote to memory of 1664 1680 java.exe java.exe PID 1664 wrote to memory of 1920 1664 java.exe java.exe PID 1664 wrote to memory of 1920 1664 java.exe java.exe PID 1664 wrote to memory of 1920 1664 java.exe java.exe PID 1664 wrote to memory of 1920 1664 java.exe java.exe PID 1664 wrote to memory of 1920 1664 java.exe java.exe PID 1664 wrote to memory of 1920 1664 java.exe java.exe PID 1664 wrote to memory of 1920 1664 java.exe java.exe PID 1920 wrote to memory of 1484 1920 java.exe java.exe PID 1920 wrote to memory of 1484 1920 java.exe java.exe PID 1920 wrote to memory of 1484 1920 java.exe java.exe PID 1920 wrote to memory of 1484 1920 java.exe java.exe PID 1920 wrote to memory of 1484 1920 java.exe java.exe PID 1920 wrote to memory of 1484 1920 java.exe java.exe PID 1920 wrote to memory of 1484 1920 java.exe java.exe PID 1484 wrote to memory of 1020 1484 java.exe java.exe PID 1484 wrote to memory of 1020 1484 java.exe java.exe PID 1484 wrote to memory of 1020 1484 java.exe java.exe PID 1484 wrote to memory of 1020 1484 java.exe java.exe PID 1484 wrote to memory of 1020 1484 java.exe java.exe PID 1484 wrote to memory of 1020 1484 java.exe java.exe PID 1484 wrote to memory of 1020 1484 java.exe java.exe PID 1020 wrote to memory of 1092 1020 java.exe java.exe PID 1020 wrote to memory of 1092 1020 java.exe java.exe PID 1020 wrote to memory of 1092 1020 java.exe java.exe PID 1020 wrote to memory of 1092 1020 java.exe java.exe PID 1020 wrote to memory of 1092 1020 java.exe java.exe PID 1020 wrote to memory of 1092 1020 java.exe java.exe PID 1020 wrote to memory of 1092 1020 java.exe java.exe PID 1092 wrote to memory of 1344 1092 java.exe WerFault.exe PID 1092 wrote to memory of 1344 1092 java.exe WerFault.exe PID 1092 wrote to memory of 1344 1092 java.exe WerFault.exe PID 1092 wrote to memory of 1344 1092 java.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\java.exe"C:\Users\Admin\AppData\Local\Temp\java.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:360 -
C:\Users\Admin\AppData\Local\Temp\java.exe"C:\Users\Admin\AppData\Local\Temp\java.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Users\Admin\AppData\Local\Temp\java.exe"C:\Users\Admin\AppData\Local\Temp\java.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\java.exe"C:\Users\Admin\AppData\Local\Temp\java.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\java.exe"C:\Users\Admin\AppData\Local\Temp\java.exe"5⤵
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\java.exe"C:\Users\Admin\AppData\Local\Temp\java.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Users\Admin\AppData\Local\Temp\java.exe"C:\Users\Admin\AppData\Local\Temp\java.exe"7⤵
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Users\Admin\AppData\Local\Temp\java.exe"C:\Users\Admin\AppData\Local\Temp\java.exe"8⤵
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1092 -s 6089⤵
- Program crash
PID:1344
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408KB
MD59e180ca72b208490d6c96ef2f022cd0b
SHA1b825a029383ca68cd51cf7dc2ee9418ad3a05bb9
SHA256676fab8ec046888f98e8b61bec9ac10fe561f7d3004af1a60692396f80fe98f7
SHA5123cded93e2062dbf141225a90cf49d75b5c4c89862ed3809b4ace2ffaa63811993c44d9aa10e44120f41595c32aecf8c3dde586c0c1721299cc6b115f4ee9dd24
-
Filesize
408KB
MD59e180ca72b208490d6c96ef2f022cd0b
SHA1b825a029383ca68cd51cf7dc2ee9418ad3a05bb9
SHA256676fab8ec046888f98e8b61bec9ac10fe561f7d3004af1a60692396f80fe98f7
SHA5123cded93e2062dbf141225a90cf49d75b5c4c89862ed3809b4ace2ffaa63811993c44d9aa10e44120f41595c32aecf8c3dde586c0c1721299cc6b115f4ee9dd24
-
Filesize
408KB
MD59e180ca72b208490d6c96ef2f022cd0b
SHA1b825a029383ca68cd51cf7dc2ee9418ad3a05bb9
SHA256676fab8ec046888f98e8b61bec9ac10fe561f7d3004af1a60692396f80fe98f7
SHA5123cded93e2062dbf141225a90cf49d75b5c4c89862ed3809b4ace2ffaa63811993c44d9aa10e44120f41595c32aecf8c3dde586c0c1721299cc6b115f4ee9dd24
-
Filesize
408KB
MD59e180ca72b208490d6c96ef2f022cd0b
SHA1b825a029383ca68cd51cf7dc2ee9418ad3a05bb9
SHA256676fab8ec046888f98e8b61bec9ac10fe561f7d3004af1a60692396f80fe98f7
SHA5123cded93e2062dbf141225a90cf49d75b5c4c89862ed3809b4ace2ffaa63811993c44d9aa10e44120f41595c32aecf8c3dde586c0c1721299cc6b115f4ee9dd24
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
408KB
MD59e180ca72b208490d6c96ef2f022cd0b
SHA1b825a029383ca68cd51cf7dc2ee9418ad3a05bb9
SHA256676fab8ec046888f98e8b61bec9ac10fe561f7d3004af1a60692396f80fe98f7
SHA5123cded93e2062dbf141225a90cf49d75b5c4c89862ed3809b4ace2ffaa63811993c44d9aa10e44120f41595c32aecf8c3dde586c0c1721299cc6b115f4ee9dd24
-
Filesize
408KB
MD59e180ca72b208490d6c96ef2f022cd0b
SHA1b825a029383ca68cd51cf7dc2ee9418ad3a05bb9
SHA256676fab8ec046888f98e8b61bec9ac10fe561f7d3004af1a60692396f80fe98f7
SHA5123cded93e2062dbf141225a90cf49d75b5c4c89862ed3809b4ace2ffaa63811993c44d9aa10e44120f41595c32aecf8c3dde586c0c1721299cc6b115f4ee9dd24