Analysis
-
max time kernel
153s -
max time network
181s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2022 20:31
Static task
static1
Behavioral task
behavioral1
Sample
db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542.exe
Resource
win10v2004-20221111-en
General
-
Target
db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542.exe
-
Size
392KB
-
MD5
af2128552eabd4babb6a1c62009b37ae
-
SHA1
d76b5565dd06a9311da0341b24b2727b99fbf90b
-
SHA256
db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542
-
SHA512
77d62dd522080df9494603be6b185809c971075defc424ace5a15cc3afacd02496d88201a63331336fa64a208b4b5e937c5fe38e49a02602ab9d45ccd82b80c5
-
SSDEEP
6144:/+cdsMVwuY52sBtk7o/8RLzhcc1TBMmUtVmfjaROH0iva2ta6P96AF48kx71qwxM:c2akcQRh17UtQfmExaYHPg4QxpxM
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\pzpCBC1.tmp modiloader_stage2 C:\Users\Admin\AppData\Local\Temp\pzpCBC1.tmp modiloader_stage2 -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\pzpCBC1.tmp aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\pzpCBC1.tmp aspack_v212_v242 -
Executes dropped EXE 1 IoCs
Processes:
pzpCBC1.tmppid process 1636 pzpCBC1.tmp -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542.exepid process 2480 db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542.exe 2480 db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542.exe 2480 db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542.exe 2480 db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542.exe 2480 db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542.exe 2480 db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542.exe 2480 db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542.exe 2480 db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542.exe 2480 db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542.exe 2480 db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542.exe 2480 db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542.exe 2480 db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542.exe 2480 db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542.exe 2480 db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542.exe 2480 db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542.exe 2480 db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542.exe 2480 db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542.exe 2480 db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542.exe 2480 db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542.exe 2480 db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542.exe 2480 db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542.exe 2480 db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542.exe 2480 db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542.exe 2480 db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542.exe 2480 db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542.exe 2480 db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542.exe 2480 db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542.exe 2480 db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542.exe 2480 db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542.exe 2480 db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542.exe 2480 db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542.exe 2480 db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542.exe 2480 db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542.exe 2480 db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542.exe 2480 db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542.exe 2480 db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542.exe 2480 db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542.exe 2480 db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542.exe 2480 db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542.exe 2480 db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542.exe 2480 db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542.exe 2480 db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542.exe 2480 db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542.exe 2480 db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542.exe 2480 db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542.exe 2480 db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542.exe 2480 db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542.exe 2480 db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542.exe 2480 db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542.exe 2480 db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542.exe 2480 db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542.exe 2480 db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542.exe 2480 db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542.exe 2480 db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542.exe 2480 db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542.exe 2480 db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542.exe 2480 db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542.exe 2480 db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542.exe 2480 db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542.exe 2480 db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542.exe 2480 db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542.exe 2480 db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542.exe 2480 db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542.exe 2480 db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542.exedescription pid process target process PID 2480 wrote to memory of 1636 2480 db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542.exe pzpCBC1.tmp PID 2480 wrote to memory of 1636 2480 db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542.exe pzpCBC1.tmp PID 2480 wrote to memory of 1636 2480 db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542.exe pzpCBC1.tmp
Processes
-
C:\Users\Admin\AppData\Local\Temp\db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542.exe"C:\Users\Admin\AppData\Local\Temp\db7a94ad447367b7fe433e96a695e28f673732b085661e386ce064165e5f5542.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\pzpCBC1.tmp"C:\Users\Admin\AppData\Local\Temp\pzpCBC1.tmp"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1636 -ip 16361⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\pzpCBC1.tmpFilesize
701KB
MD5768d8511d9a1cd217c08c2b0ffeb9773
SHA1848aa94346f2b858133ed6b829306fbf8cf775da
SHA256107e51d694d43ae46b183e0165ec5499a2764cd24be5a98f6e5cf0d5caf4d05c
SHA5127ebf11b66fd44cbe9f2fb6702a349013d7e72e51e92ca0458eabd627c4ca62467d3cc11a834baae02ed044b390ca5f038e2a1cd88687c633ad40f96b7218a451
-
C:\Users\Admin\AppData\Local\Temp\pzpCBC1.tmpFilesize
701KB
MD5768d8511d9a1cd217c08c2b0ffeb9773
SHA1848aa94346f2b858133ed6b829306fbf8cf775da
SHA256107e51d694d43ae46b183e0165ec5499a2764cd24be5a98f6e5cf0d5caf4d05c
SHA5127ebf11b66fd44cbe9f2fb6702a349013d7e72e51e92ca0458eabd627c4ca62467d3cc11a834baae02ed044b390ca5f038e2a1cd88687c633ad40f96b7218a451
-
memory/1636-132-0x0000000000000000-mapping.dmp