Analysis
-
max time kernel
19s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 14:01
Static task
static1
Behavioral task
behavioral1
Sample
e1821f4c000b21979b7fba2ac8e351fd016ab1423a3e26a8ef41ea1fd92356ed.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e1821f4c000b21979b7fba2ac8e351fd016ab1423a3e26a8ef41ea1fd92356ed.exe
Resource
win10v2004-20220812-en
General
-
Target
e1821f4c000b21979b7fba2ac8e351fd016ab1423a3e26a8ef41ea1fd92356ed.exe
-
Size
718KB
-
MD5
56e89d4673922277b572d943f39e13e4
-
SHA1
99c0263b11f9aee3997d0745fb8a5afb00b0facd
-
SHA256
e1821f4c000b21979b7fba2ac8e351fd016ab1423a3e26a8ef41ea1fd92356ed
-
SHA512
1689e86a4b0ae27e7db334fa79c22f58826d794e2164e44c53e8f542bfa83525c1ada846c9fdaec320b653fdb20117b41c8773e38609f55a5d7634ecbade3037
-
SSDEEP
12288:083nplb2LlNYJBOXyATpkIXhUhdO/fyI7xAhOOdHMflVqY4XofQJuczq:p3npR2Ll+JBuDp9IdthdsfloY4XofYq
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 8 IoCs
Processes:
resource yara_rule behavioral1/memory/1996-55-0x0000000000400000-0x0000000000572000-memory.dmp modiloader_stage2 behavioral1/memory/1996-58-0x0000000000400000-0x0000000000572000-memory.dmp modiloader_stage2 behavioral1/memory/1996-56-0x0000000000400000-0x0000000000572000-memory.dmp modiloader_stage2 behavioral1/memory/1996-59-0x0000000000400000-0x0000000000572000-memory.dmp modiloader_stage2 behavioral1/memory/1996-61-0x0000000000400000-0x0000000000572000-memory.dmp modiloader_stage2 behavioral1/memory/1996-62-0x0000000000400000-0x0000000000572000-memory.dmp modiloader_stage2 behavioral1/memory/1996-63-0x0000000000400000-0x0000000000572000-memory.dmp modiloader_stage2 behavioral1/memory/1996-64-0x0000000000400000-0x0000000000572000-memory.dmp modiloader_stage2 -
Drops file in Program Files directory 1 IoCs
Processes:
e1821f4c000b21979b7fba2ac8e351fd016ab1423a3e26a8ef41ea1fd92356ed.exedescription ioc process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\SetupWay.txt e1821f4c000b21979b7fba2ac8e351fd016ab1423a3e26a8ef41ea1fd92356ed.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
e1821f4c000b21979b7fba2ac8e351fd016ab1423a3e26a8ef41ea1fd92356ed.exedescription pid process target process PID 1996 wrote to memory of 1760 1996 e1821f4c000b21979b7fba2ac8e351fd016ab1423a3e26a8ef41ea1fd92356ed.exe IEXPLORE.EXE PID 1996 wrote to memory of 1760 1996 e1821f4c000b21979b7fba2ac8e351fd016ab1423a3e26a8ef41ea1fd92356ed.exe IEXPLORE.EXE PID 1996 wrote to memory of 1760 1996 e1821f4c000b21979b7fba2ac8e351fd016ab1423a3e26a8ef41ea1fd92356ed.exe IEXPLORE.EXE PID 1996 wrote to memory of 1760 1996 e1821f4c000b21979b7fba2ac8e351fd016ab1423a3e26a8ef41ea1fd92356ed.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\e1821f4c000b21979b7fba2ac8e351fd016ab1423a3e26a8ef41ea1fd92356ed.exe"C:\Users\Admin\AppData\Local\Temp\e1821f4c000b21979b7fba2ac8e351fd016ab1423a3e26a8ef41ea1fd92356ed.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1996-54-0x0000000000400000-0x0000000000572000-memory.dmpFilesize
1.4MB
-
memory/1996-55-0x0000000000400000-0x0000000000572000-memory.dmpFilesize
1.4MB
-
memory/1996-58-0x0000000000400000-0x0000000000572000-memory.dmpFilesize
1.4MB
-
memory/1996-56-0x0000000000400000-0x0000000000572000-memory.dmpFilesize
1.4MB
-
memory/1996-59-0x0000000000400000-0x0000000000572000-memory.dmpFilesize
1.4MB
-
memory/1996-60-0x0000000076171000-0x0000000076173000-memory.dmpFilesize
8KB
-
memory/1996-61-0x0000000000400000-0x0000000000572000-memory.dmpFilesize
1.4MB
-
memory/1996-62-0x0000000000400000-0x0000000000572000-memory.dmpFilesize
1.4MB
-
memory/1996-63-0x0000000000400000-0x0000000000572000-memory.dmpFilesize
1.4MB
-
memory/1996-64-0x0000000000400000-0x0000000000572000-memory.dmpFilesize
1.4MB