Analysis

  • max time kernel
    105s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    03-12-2022 13:36

General

  • Target

    f648a4e352e8beb3c2fbc65780fe4e7c2739245e79985380aab01eef398a5023.exe

  • Size

    401KB

  • MD5

    af96fc74c498c6567346bdc3d1fdcb02

  • SHA1

    3dfd54efbd86bf37be09a6a203dd75543e2d0499

  • SHA256

    f648a4e352e8beb3c2fbc65780fe4e7c2739245e79985380aab01eef398a5023

  • SHA512

    c2730cc5ef8bd8f6844e998c0ca37744aefae6cd20d7003f11b6301eeb9e556d0cd92b34084c946ea10e17ddb8a93925fd019c7d1ab4bd79e30d31f32dfe9602

  • SSDEEP

    12288:AoZsctbM7a1V8RQf7K/p5erHc2BPau8Q/:Ao3QI7Kx5er82J

Score
10/10

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 8 IoCs
  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f648a4e352e8beb3c2fbc65780fe4e7c2739245e79985380aab01eef398a5023.exe
    "C:\Users\Admin\AppData\Local\Temp\f648a4e352e8beb3c2fbc65780fe4e7c2739245e79985380aab01eef398a5023.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:1544
    • C:\PROGRA~1\COMMON~1\MICROS~1\MSInfo\360.exe
      C:\PROGRA~1\COMMON~1\MICROS~1\MSInfo\360.exe
      2⤵
      • Executes dropped EXE
      PID:936
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c erase /F "C:\Users\Admin\AppData\Local\Temp\f648a4e352e8beb3c2fbc65780fe4e7c2739245e79985380aab01eef398a5023.exe"
      2⤵
      • Deletes itself
      PID:680

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~1\COMMON~1\MICROS~1\MSInfo\360.exe
    Filesize

    401KB

    MD5

    af96fc74c498c6567346bdc3d1fdcb02

    SHA1

    3dfd54efbd86bf37be09a6a203dd75543e2d0499

    SHA256

    f648a4e352e8beb3c2fbc65780fe4e7c2739245e79985380aab01eef398a5023

    SHA512

    c2730cc5ef8bd8f6844e998c0ca37744aefae6cd20d7003f11b6301eeb9e556d0cd92b34084c946ea10e17ddb8a93925fd019c7d1ab4bd79e30d31f32dfe9602

  • \PROGRA~1\COMMON~1\MICROS~1\MSInfo\360.exe
    Filesize

    401KB

    MD5

    af96fc74c498c6567346bdc3d1fdcb02

    SHA1

    3dfd54efbd86bf37be09a6a203dd75543e2d0499

    SHA256

    f648a4e352e8beb3c2fbc65780fe4e7c2739245e79985380aab01eef398a5023

    SHA512

    c2730cc5ef8bd8f6844e998c0ca37744aefae6cd20d7003f11b6301eeb9e556d0cd92b34084c946ea10e17ddb8a93925fd019c7d1ab4bd79e30d31f32dfe9602

  • memory/680-67-0x0000000000000000-mapping.dmp
  • memory/936-66-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/936-60-0x0000000000000000-mapping.dmp
  • memory/936-69-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/1544-58-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/1544-57-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/1544-56-0x0000000000401000-0x000000000049B000-memory.dmp
    Filesize

    616KB

  • memory/1544-65-0x0000000003030000-0x0000000003156000-memory.dmp
    Filesize

    1.1MB

  • memory/1544-54-0x00000000764C1000-0x00000000764C3000-memory.dmp
    Filesize

    8KB

  • memory/1544-55-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/1544-68-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB