Analysis
-
max time kernel
173s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2022 09:09
Static task
static1
Behavioral task
behavioral1
Sample
a9cef1067309239b20b2945884eaa8d51b14865561c025fcceb07fdfff63b5a5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a9cef1067309239b20b2945884eaa8d51b14865561c025fcceb07fdfff63b5a5.exe
Resource
win10v2004-20221111-en
General
-
Target
a9cef1067309239b20b2945884eaa8d51b14865561c025fcceb07fdfff63b5a5.exe
-
Size
164KB
-
MD5
8f8378abc03505ca46399652a92b7bcb
-
SHA1
29665e238461154a97d8baacdbc73709963f5115
-
SHA256
a9cef1067309239b20b2945884eaa8d51b14865561c025fcceb07fdfff63b5a5
-
SHA512
40b4827a247a951630cc1e80f57bcdf5d1068a409e09acaea90fc5260159bb358473f5a62bd11aba506074565fd4a7fe726db195ce45480d71f439c987e9b0d2
-
SSDEEP
3072:jftS4+Bs7FQfdf/+YdF9uObdysv0n51DEIcRJqATkc6z6buTe:jfx7a5bdyw0noIcTFv6uu
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 2 IoCs
Processes:
resource yara_rule behavioral2/memory/1316-134-0x00000000021A0000-0x00000000021AA000-memory.dmp modiloader_stage2 behavioral2/memory/1316-138-0x00000000021A0000-0x00000000021AA000-memory.dmp modiloader_stage2 -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4708 1316 WerFault.exe a9cef1067309239b20b2945884eaa8d51b14865561c025fcceb07fdfff63b5a5.exe 3688 1316 WerFault.exe a9cef1067309239b20b2945884eaa8d51b14865561c025fcceb07fdfff63b5a5.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
a9cef1067309239b20b2945884eaa8d51b14865561c025fcceb07fdfff63b5a5.exepid process 1316 a9cef1067309239b20b2945884eaa8d51b14865561c025fcceb07fdfff63b5a5.exe 1316 a9cef1067309239b20b2945884eaa8d51b14865561c025fcceb07fdfff63b5a5.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a9cef1067309239b20b2945884eaa8d51b14865561c025fcceb07fdfff63b5a5.exe"C:\Users\Admin\AppData\Local\Temp\a9cef1067309239b20b2945884eaa8d51b14865561c025fcceb07fdfff63b5a5.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1316 -s 3562⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1316 -s 3802⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1316 -ip 13161⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1316 -ip 13161⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1316-132-0x0000000020000000-0x000000002001D000-memory.dmpFilesize
116KB
-
memory/1316-133-0x0000000002140000-0x0000000002195000-memory.dmpFilesize
340KB
-
memory/1316-134-0x00000000021A0000-0x00000000021AA000-memory.dmpFilesize
40KB
-
memory/1316-135-0x0000000020000000-0x000000002001D000-memory.dmpFilesize
116KB
-
memory/1316-136-0x0000000020000000-0x000000002001D000-memory.dmpFilesize
116KB
-
memory/1316-137-0x0000000002140000-0x0000000002195000-memory.dmpFilesize
340KB
-
memory/1316-138-0x00000000021A0000-0x00000000021AA000-memory.dmpFilesize
40KB