Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2022 02:38
Static task
static1
Behavioral task
behavioral1
Sample
80a90fe9b85528f18939cdf26f5bc511547bb5fcecf533bdcbe050d6ebbfb03f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
80a90fe9b85528f18939cdf26f5bc511547bb5fcecf533bdcbe050d6ebbfb03f.exe
Resource
win10v2004-20220812-en
General
-
Target
80a90fe9b85528f18939cdf26f5bc511547bb5fcecf533bdcbe050d6ebbfb03f.exe
-
Size
1.3MB
-
MD5
3ac7016163826d663ca503d5cf0c8c1c
-
SHA1
e456722238c1aba734f54ed1ac5fd2232ffb1984
-
SHA256
80a90fe9b85528f18939cdf26f5bc511547bb5fcecf533bdcbe050d6ebbfb03f
-
SHA512
51350f49f7eea73787e9166973cf7a926be2642e23ad26f137e42207da46485aeeff3f6b4c4f867f0cc9fd3b42ad61c0230f960bc6fcd24edccfcef4e54edb5f
-
SSDEEP
24576:/2c//////2TtYBXGGRyVgZnetZ4RMPw+ntcDzI+t01WF/L5:ec//////Ae5G6yVgZetEmJtcotsD
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 10 IoCs
Processes:
resource yara_rule behavioral2/memory/2728-133-0x0000000000400000-0x0000000000506000-memory.dmp modiloader_stage2 behavioral2/memory/2728-134-0x0000000000400000-0x0000000000506000-memory.dmp modiloader_stage2 behavioral2/memory/2728-135-0x0000000000400000-0x0000000000506000-memory.dmp modiloader_stage2 behavioral2/memory/2728-136-0x0000000000400000-0x0000000000506000-memory.dmp modiloader_stage2 behavioral2/memory/2728-137-0x0000000000400000-0x0000000000506000-memory.dmp modiloader_stage2 behavioral2/memory/2728-138-0x0000000000400000-0x0000000000506000-memory.dmp modiloader_stage2 behavioral2/memory/4972-147-0x0000000000400000-0x0000000000506000-memory.dmp modiloader_stage2 behavioral2/memory/4972-148-0x0000000000400000-0x0000000000506000-memory.dmp modiloader_stage2 behavioral2/memory/2728-149-0x0000000000400000-0x0000000000506000-memory.dmp modiloader_stage2 behavioral2/memory/4972-150-0x0000000000400000-0x0000000000506000-memory.dmp modiloader_stage2 -
Executes dropped EXE 2 IoCs
Processes:
Safari.exeSafari.exepid process 4436 Safari.exe 4972 Safari.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
80a90fe9b85528f18939cdf26f5bc511547bb5fcecf533bdcbe050d6ebbfb03f.exeSafari.exedescription pid process target process PID 4532 set thread context of 2728 4532 80a90fe9b85528f18939cdf26f5bc511547bb5fcecf533bdcbe050d6ebbfb03f.exe 80a90fe9b85528f18939cdf26f5bc511547bb5fcecf533bdcbe050d6ebbfb03f.exe PID 4436 set thread context of 4972 4436 Safari.exe Safari.exe -
Drops file in Program Files directory 2 IoCs
Processes:
80a90fe9b85528f18939cdf26f5bc511547bb5fcecf533bdcbe050d6ebbfb03f.exedescription ioc process File created C:\PROGRA~1\Safari.exe 80a90fe9b85528f18939cdf26f5bc511547bb5fcecf533bdcbe050d6ebbfb03f.exe File opened for modification C:\PROGRA~1\Safari.exe 80a90fe9b85528f18939cdf26f5bc511547bb5fcecf533bdcbe050d6ebbfb03f.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
80a90fe9b85528f18939cdf26f5bc511547bb5fcecf533bdcbe050d6ebbfb03f.exe80a90fe9b85528f18939cdf26f5bc511547bb5fcecf533bdcbe050d6ebbfb03f.exeSafari.exedescription pid process target process PID 4532 wrote to memory of 2728 4532 80a90fe9b85528f18939cdf26f5bc511547bb5fcecf533bdcbe050d6ebbfb03f.exe 80a90fe9b85528f18939cdf26f5bc511547bb5fcecf533bdcbe050d6ebbfb03f.exe PID 4532 wrote to memory of 2728 4532 80a90fe9b85528f18939cdf26f5bc511547bb5fcecf533bdcbe050d6ebbfb03f.exe 80a90fe9b85528f18939cdf26f5bc511547bb5fcecf533bdcbe050d6ebbfb03f.exe PID 4532 wrote to memory of 2728 4532 80a90fe9b85528f18939cdf26f5bc511547bb5fcecf533bdcbe050d6ebbfb03f.exe 80a90fe9b85528f18939cdf26f5bc511547bb5fcecf533bdcbe050d6ebbfb03f.exe PID 4532 wrote to memory of 2728 4532 80a90fe9b85528f18939cdf26f5bc511547bb5fcecf533bdcbe050d6ebbfb03f.exe 80a90fe9b85528f18939cdf26f5bc511547bb5fcecf533bdcbe050d6ebbfb03f.exe PID 4532 wrote to memory of 2728 4532 80a90fe9b85528f18939cdf26f5bc511547bb5fcecf533bdcbe050d6ebbfb03f.exe 80a90fe9b85528f18939cdf26f5bc511547bb5fcecf533bdcbe050d6ebbfb03f.exe PID 2728 wrote to memory of 4436 2728 80a90fe9b85528f18939cdf26f5bc511547bb5fcecf533bdcbe050d6ebbfb03f.exe Safari.exe PID 2728 wrote to memory of 4436 2728 80a90fe9b85528f18939cdf26f5bc511547bb5fcecf533bdcbe050d6ebbfb03f.exe Safari.exe PID 2728 wrote to memory of 4436 2728 80a90fe9b85528f18939cdf26f5bc511547bb5fcecf533bdcbe050d6ebbfb03f.exe Safari.exe PID 4436 wrote to memory of 4972 4436 Safari.exe Safari.exe PID 4436 wrote to memory of 4972 4436 Safari.exe Safari.exe PID 4436 wrote to memory of 4972 4436 Safari.exe Safari.exe PID 4436 wrote to memory of 4972 4436 Safari.exe Safari.exe PID 4436 wrote to memory of 4972 4436 Safari.exe Safari.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\80a90fe9b85528f18939cdf26f5bc511547bb5fcecf533bdcbe050d6ebbfb03f.exe"C:\Users\Admin\AppData\Local\Temp\80a90fe9b85528f18939cdf26f5bc511547bb5fcecf533bdcbe050d6ebbfb03f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\80a90fe9b85528f18939cdf26f5bc511547bb5fcecf533bdcbe050d6ebbfb03f.exeC:\Users\Admin\AppData\Local\Temp\80a90fe9b85528f18939cdf26f5bc511547bb5fcecf533bdcbe050d6ebbfb03f.exe2⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\PROGRA~1\Safari.exeC:\PROGRA~1\Safari.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\PROGRA~1\Safari.exeC:\PROGRA~1\Safari.exe4⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\PROGRA~1\Safari.exeFilesize
1.3MB
MD53ac7016163826d663ca503d5cf0c8c1c
SHA1e456722238c1aba734f54ed1ac5fd2232ffb1984
SHA25680a90fe9b85528f18939cdf26f5bc511547bb5fcecf533bdcbe050d6ebbfb03f
SHA51251350f49f7eea73787e9166973cf7a926be2642e23ad26f137e42207da46485aeeff3f6b4c4f867f0cc9fd3b42ad61c0230f960bc6fcd24edccfcef4e54edb5f
-
C:\Program Files\Safari.exeFilesize
1.3MB
MD53ac7016163826d663ca503d5cf0c8c1c
SHA1e456722238c1aba734f54ed1ac5fd2232ffb1984
SHA25680a90fe9b85528f18939cdf26f5bc511547bb5fcecf533bdcbe050d6ebbfb03f
SHA51251350f49f7eea73787e9166973cf7a926be2642e23ad26f137e42207da46485aeeff3f6b4c4f867f0cc9fd3b42ad61c0230f960bc6fcd24edccfcef4e54edb5f
-
C:\Program Files\Safari.exeFilesize
1.3MB
MD53ac7016163826d663ca503d5cf0c8c1c
SHA1e456722238c1aba734f54ed1ac5fd2232ffb1984
SHA25680a90fe9b85528f18939cdf26f5bc511547bb5fcecf533bdcbe050d6ebbfb03f
SHA51251350f49f7eea73787e9166973cf7a926be2642e23ad26f137e42207da46485aeeff3f6b4c4f867f0cc9fd3b42ad61c0230f960bc6fcd24edccfcef4e54edb5f
-
memory/2728-133-0x0000000000400000-0x0000000000506000-memory.dmpFilesize
1.0MB
-
memory/2728-134-0x0000000000400000-0x0000000000506000-memory.dmpFilesize
1.0MB
-
memory/2728-135-0x0000000000400000-0x0000000000506000-memory.dmpFilesize
1.0MB
-
memory/2728-136-0x0000000000400000-0x0000000000506000-memory.dmpFilesize
1.0MB
-
memory/2728-137-0x0000000000400000-0x0000000000506000-memory.dmpFilesize
1.0MB
-
memory/2728-138-0x0000000000400000-0x0000000000506000-memory.dmpFilesize
1.0MB
-
memory/2728-132-0x0000000000000000-mapping.dmp
-
memory/2728-149-0x0000000000400000-0x0000000000506000-memory.dmpFilesize
1.0MB
-
memory/4436-139-0x0000000000000000-mapping.dmp
-
memory/4972-147-0x0000000000400000-0x0000000000506000-memory.dmpFilesize
1.0MB
-
memory/4972-148-0x0000000000400000-0x0000000000506000-memory.dmpFilesize
1.0MB
-
memory/4972-142-0x0000000000000000-mapping.dmp
-
memory/4972-150-0x0000000000400000-0x0000000000506000-memory.dmpFilesize
1.0MB