Analysis
-
max time kernel
15s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 12:39
Behavioral task
behavioral1
Sample
cff82cb6fdccb79849e2819b7b96b6fcd2dfb201e1a1e59400acec379f365862.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
cff82cb6fdccb79849e2819b7b96b6fcd2dfb201e1a1e59400acec379f365862.exe
Resource
win10v2004-20220812-en
General
-
Target
cff82cb6fdccb79849e2819b7b96b6fcd2dfb201e1a1e59400acec379f365862.exe
-
Size
111KB
-
MD5
3b48fb17c5f942a4603077d16dbef1e1
-
SHA1
c00a7f760e551587b6d3850710c757d7d1f9d3a6
-
SHA256
cff82cb6fdccb79849e2819b7b96b6fcd2dfb201e1a1e59400acec379f365862
-
SHA512
18229990071995c5ff0045f8ca9870f137eb16c50be7b83d8af856ad89ff4459cdc85169b41fa9032d11aa0b728d3d81cde055e604fc3e44e8e26c58b6a9396b
-
SSDEEP
3072:91+MJKrUnFYY5z1i0Nmbi5fdBNPhkout:LIrPj0NmWxNyoS
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1228-56-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 -
Processes:
resource yara_rule behavioral1/memory/1228-56-0x0000000000400000-0x0000000000450000-memory.dmp upx -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2012 1228 WerFault.exe cff82cb6fdccb79849e2819b7b96b6fcd2dfb201e1a1e59400acec379f365862.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
cff82cb6fdccb79849e2819b7b96b6fcd2dfb201e1a1e59400acec379f365862.exedescription pid process target process PID 1228 wrote to memory of 2012 1228 cff82cb6fdccb79849e2819b7b96b6fcd2dfb201e1a1e59400acec379f365862.exe WerFault.exe PID 1228 wrote to memory of 2012 1228 cff82cb6fdccb79849e2819b7b96b6fcd2dfb201e1a1e59400acec379f365862.exe WerFault.exe PID 1228 wrote to memory of 2012 1228 cff82cb6fdccb79849e2819b7b96b6fcd2dfb201e1a1e59400acec379f365862.exe WerFault.exe PID 1228 wrote to memory of 2012 1228 cff82cb6fdccb79849e2819b7b96b6fcd2dfb201e1a1e59400acec379f365862.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cff82cb6fdccb79849e2819b7b96b6fcd2dfb201e1a1e59400acec379f365862.exe"C:\Users\Admin\AppData\Local\Temp\cff82cb6fdccb79849e2819b7b96b6fcd2dfb201e1a1e59400acec379f365862.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1228 -s 2042⤵
- Program crash