Analysis

  • max time kernel
    151s
  • max time network
    211s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/12/2022, 14:40

General

  • Target

    bf328fc6d56a2654a72462cf1cb8d272938e00e1c63080ad1f5bd4955fbda1ca.exe

  • Size

    1014KB

  • MD5

    c831cd269e497ab0f66a7072cc186dc2

  • SHA1

    3030267bbbdaea146c6210a9f377d971886c7cb2

  • SHA256

    bf328fc6d56a2654a72462cf1cb8d272938e00e1c63080ad1f5bd4955fbda1ca

  • SHA512

    a47e5a4f9ec2223312c5b88c3edd247561f217e332a573205b4070e55b030392834563f52012f93095b45e19991f5e3f2cb4df00c0051ffecd7325a74e71bd0b

  • SSDEEP

    24576:8qFCyh0JN6+PebNO4b+bO9XOXAz01dyZVoEbAfLbkLvF/pX/9o:P0AqYbbs4b+gOXAwTyZZbADALppX/9o

Score
10/10

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bf328fc6d56a2654a72462cf1cb8d272938e00e1c63080ad1f5bd4955fbda1ca.exe
    "C:\Users\Admin\AppData\Local\Temp\bf328fc6d56a2654a72462cf1cb8d272938e00e1c63080ad1f5bd4955fbda1ca.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:220
    • C:\Users\Admin\AppData\Local\Temp\bf328fc6d56a2654a72462cf1cb8d272938e00e1c63080ad1f5bd4955fbda1ca.exe
      "C:\Users\Admin\AppData\Local\Temp\bf328fc6d56a2654a72462cf1cb8d272938e00e1c63080ad1f5bd4955fbda1ca.exe"
      2⤵
        PID:2180

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2180-133-0x0000000000400000-0x00000000004A9000-memory.dmp

      Filesize

      676KB

    • memory/2180-134-0x0000000000400000-0x00000000004A9000-memory.dmp

      Filesize

      676KB

    • memory/2180-136-0x0000000000400000-0x00000000004A9000-memory.dmp

      Filesize

      676KB

    • memory/2180-138-0x0000000000400000-0x00000000004A9000-memory.dmp

      Filesize

      676KB

    • memory/2180-139-0x0000000000400000-0x00000000004A9000-memory.dmp

      Filesize

      676KB

    • memory/2180-140-0x0000000000400000-0x00000000004A9000-memory.dmp

      Filesize

      676KB

    • memory/2180-143-0x0000000000400000-0x00000000004A9000-memory.dmp

      Filesize

      676KB