Analysis
-
max time kernel
44s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
28-11-2022 09:20
Behavioral task
behavioral1
Sample
b3a0b7fa8ae2ca1c673f0d57d7f12ee66886dc8f90a1dfa27114588c890e0d6d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b3a0b7fa8ae2ca1c673f0d57d7f12ee66886dc8f90a1dfa27114588c890e0d6d.exe
Resource
win10v2004-20221111-en
General
-
Target
b3a0b7fa8ae2ca1c673f0d57d7f12ee66886dc8f90a1dfa27114588c890e0d6d.exe
-
Size
98KB
-
MD5
723b02c76065004831ab9e96b66419ee
-
SHA1
327e7dd8ce42f9a18980629c692cbfffebc6d15a
-
SHA256
b3a0b7fa8ae2ca1c673f0d57d7f12ee66886dc8f90a1dfa27114588c890e0d6d
-
SHA512
24c520aeaa5171d3a5f25e50f68e835e22a503fc2b16ef98b0816c3e475eb03aa4c4557cd069c5af9da53f0f7c1428a4f0db65432db1bbecffb1f95895f7d40f
-
SSDEEP
1536:kk3vzKr0uisCV0MC5LEklb0TbTFbQXKI5jQGFMA0OtbPtMxmg6ntxgMuTVRG:N39ui/WLEkxWfFbKKKlDrtMonXDg
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1604-56-0x0000000000010000-0x0000000000036000-memory.dmp modiloader_stage2 behavioral1/memory/972-60-0x0000000000010000-0x0000000000036000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
Processes:
apocalyps32.exepid process 972 apocalyps32.exe -
Processes:
resource yara_rule behavioral1/memory/1604-56-0x0000000000010000-0x0000000000036000-memory.dmp upx C:\Windows\apocalyps32.exe upx C:\Windows\apocalyps32.exe upx behavioral1/memory/972-60-0x0000000000010000-0x0000000000036000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
Processes:
b3a0b7fa8ae2ca1c673f0d57d7f12ee66886dc8f90a1dfa27114588c890e0d6d.exeapocalyps32.exedescription ioc process File opened for modification C:\Windows\apocalyps32.exe b3a0b7fa8ae2ca1c673f0d57d7f12ee66886dc8f90a1dfa27114588c890e0d6d.exe File created C:\Windows\apocalyps32.exe apocalyps32.exe File created C:\Windows\apocalyps32.exe b3a0b7fa8ae2ca1c673f0d57d7f12ee66886dc8f90a1dfa27114588c890e0d6d.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
b3a0b7fa8ae2ca1c673f0d57d7f12ee66886dc8f90a1dfa27114588c890e0d6d.exeapocalyps32.exedescription pid process target process PID 1604 wrote to memory of 972 1604 b3a0b7fa8ae2ca1c673f0d57d7f12ee66886dc8f90a1dfa27114588c890e0d6d.exe apocalyps32.exe PID 1604 wrote to memory of 972 1604 b3a0b7fa8ae2ca1c673f0d57d7f12ee66886dc8f90a1dfa27114588c890e0d6d.exe apocalyps32.exe PID 1604 wrote to memory of 972 1604 b3a0b7fa8ae2ca1c673f0d57d7f12ee66886dc8f90a1dfa27114588c890e0d6d.exe apocalyps32.exe PID 1604 wrote to memory of 972 1604 b3a0b7fa8ae2ca1c673f0d57d7f12ee66886dc8f90a1dfa27114588c890e0d6d.exe apocalyps32.exe PID 972 wrote to memory of 592 972 apocalyps32.exe iexplore.exe PID 972 wrote to memory of 592 972 apocalyps32.exe iexplore.exe PID 972 wrote to memory of 592 972 apocalyps32.exe iexplore.exe PID 972 wrote to memory of 592 972 apocalyps32.exe iexplore.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b3a0b7fa8ae2ca1c673f0d57d7f12ee66886dc8f90a1dfa27114588c890e0d6d.exe"C:\Users\Admin\AppData\Local\Temp\b3a0b7fa8ae2ca1c673f0d57d7f12ee66886dc8f90a1dfa27114588c890e0d6d.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\apocalyps32.exe-bs2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Program Files\Internet Explorer\iexplore.exe-bs3⤵PID:592
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
98KB
MD5723b02c76065004831ab9e96b66419ee
SHA1327e7dd8ce42f9a18980629c692cbfffebc6d15a
SHA256b3a0b7fa8ae2ca1c673f0d57d7f12ee66886dc8f90a1dfa27114588c890e0d6d
SHA51224c520aeaa5171d3a5f25e50f68e835e22a503fc2b16ef98b0816c3e475eb03aa4c4557cd069c5af9da53f0f7c1428a4f0db65432db1bbecffb1f95895f7d40f
-
Filesize
98KB
MD5723b02c76065004831ab9e96b66419ee
SHA1327e7dd8ce42f9a18980629c692cbfffebc6d15a
SHA256b3a0b7fa8ae2ca1c673f0d57d7f12ee66886dc8f90a1dfa27114588c890e0d6d
SHA51224c520aeaa5171d3a5f25e50f68e835e22a503fc2b16ef98b0816c3e475eb03aa4c4557cd069c5af9da53f0f7c1428a4f0db65432db1bbecffb1f95895f7d40f