Analysis
-
max time kernel
12s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 14:24
Behavioral task
behavioral1
Sample
ba96d9368a8304833daa6303ed9380092c88f787d1518de9b5dccd527573ff12.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ba96d9368a8304833daa6303ed9380092c88f787d1518de9b5dccd527573ff12.exe
Resource
win10v2004-20220812-en
General
-
Target
ba96d9368a8304833daa6303ed9380092c88f787d1518de9b5dccd527573ff12.exe
-
Size
111KB
-
MD5
bd3231b921923a1f895e35a86b1a81c4
-
SHA1
417cded58cd7f18a4967a51b8998401437f8af46
-
SHA256
ba96d9368a8304833daa6303ed9380092c88f787d1518de9b5dccd527573ff12
-
SHA512
fdcca32de3b9cb389cbc67158f1760413761c875bb8532c189f131b5b59269352db8cb1dbe82dcf037b0f05263081a8a4e52814daa3b13ce90282eaa6524a9cb
-
SSDEEP
3072:/1+cJKrUnFYY5z1i0Nmbi5fJBNPhkout:5IrPj0NmWtNyoS
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1948-55-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 -
Processes:
resource yara_rule behavioral1/memory/1948-55-0x0000000000400000-0x0000000000450000-memory.dmp upx -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2036 1948 WerFault.exe ba96d9368a8304833daa6303ed9380092c88f787d1518de9b5dccd527573ff12.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
ba96d9368a8304833daa6303ed9380092c88f787d1518de9b5dccd527573ff12.exedescription pid process target process PID 1948 wrote to memory of 2036 1948 ba96d9368a8304833daa6303ed9380092c88f787d1518de9b5dccd527573ff12.exe WerFault.exe PID 1948 wrote to memory of 2036 1948 ba96d9368a8304833daa6303ed9380092c88f787d1518de9b5dccd527573ff12.exe WerFault.exe PID 1948 wrote to memory of 2036 1948 ba96d9368a8304833daa6303ed9380092c88f787d1518de9b5dccd527573ff12.exe WerFault.exe PID 1948 wrote to memory of 2036 1948 ba96d9368a8304833daa6303ed9380092c88f787d1518de9b5dccd527573ff12.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba96d9368a8304833daa6303ed9380092c88f787d1518de9b5dccd527573ff12.exe"C:\Users\Admin\AppData\Local\Temp\ba96d9368a8304833daa6303ed9380092c88f787d1518de9b5dccd527573ff12.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1948 -s 2042⤵
- Program crash