Analysis
-
max time kernel
45s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
30-12-2022 15:20
Static task
static1
Behavioral task
behavioral1
Sample
e680554fa3ec812160ea4fe8bbcafeac.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e680554fa3ec812160ea4fe8bbcafeac.exe
Resource
win10v2004-20220812-en
General
-
Target
e680554fa3ec812160ea4fe8bbcafeac.exe
-
Size
5.2MB
-
MD5
e680554fa3ec812160ea4fe8bbcafeac
-
SHA1
d5b2d9f227a419d60af8c93fd890e1858682055f
-
SHA256
b79b20c44857f5d00ebc2e4be8226a7f23460a25eaad85023127af6a09c48980
-
SHA512
680559a7d3eab6a45a76d87e3ed393b7247b43a2556786c4bd180b61104cf337da58d8206f0111a916e0df12554eaada5aa99a3b9abc6a59574591785f59a340
-
SSDEEP
98304:TdVwc5vJ8o/UUhsAn32ennaMjUckirsnS/PpJhanPiO+XtkF9xBf7m1709ooMDP:xVVvJxFjnmeaMjUckiYcBCnPiOemF9xG
Malware Config
Extracted
systembc
oversizetights.com:4246
myprettysocks.com:4246
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1600-56-0x0000000010000000-0x00000000110D9000-memory.dmp modiloader_stage2 behavioral1/memory/1600-60-0x0000000010000000-0x00000000110D9000-memory.dmp modiloader_stage2 behavioral1/memory/1600-65-0x0000000010000000-0x00000000110D9000-memory.dmp modiloader_stage2 -
Suspicious use of SetThreadContext 1 IoCs
Processes:
e680554fa3ec812160ea4fe8bbcafeac.exedescription pid process target process PID 1600 set thread context of 1596 1600 e680554fa3ec812160ea4fe8bbcafeac.exe e680554fa3ec812160ea4fe8bbcafeac.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
e680554fa3ec812160ea4fe8bbcafeac.exepid process 1600 e680554fa3ec812160ea4fe8bbcafeac.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
e680554fa3ec812160ea4fe8bbcafeac.exedescription pid process target process PID 1600 wrote to memory of 1596 1600 e680554fa3ec812160ea4fe8bbcafeac.exe e680554fa3ec812160ea4fe8bbcafeac.exe PID 1600 wrote to memory of 1596 1600 e680554fa3ec812160ea4fe8bbcafeac.exe e680554fa3ec812160ea4fe8bbcafeac.exe PID 1600 wrote to memory of 1596 1600 e680554fa3ec812160ea4fe8bbcafeac.exe e680554fa3ec812160ea4fe8bbcafeac.exe PID 1600 wrote to memory of 1596 1600 e680554fa3ec812160ea4fe8bbcafeac.exe e680554fa3ec812160ea4fe8bbcafeac.exe PID 1600 wrote to memory of 1596 1600 e680554fa3ec812160ea4fe8bbcafeac.exe e680554fa3ec812160ea4fe8bbcafeac.exe PID 1600 wrote to memory of 1596 1600 e680554fa3ec812160ea4fe8bbcafeac.exe e680554fa3ec812160ea4fe8bbcafeac.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e680554fa3ec812160ea4fe8bbcafeac.exe"C:\Users\Admin\AppData\Local\Temp\e680554fa3ec812160ea4fe8bbcafeac.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\e680554fa3ec812160ea4fe8bbcafeac.exeC:\Users\Admin\AppData\Local\Temp\e680554fa3ec812160ea4fe8bbcafeac.exe2⤵PID:1596