Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
27-02-2023 19:30
Static task
static1
Behavioral task
behavioral1
Sample
fc137b673379a46d1a48945e7616e4ad607dfbd1f9778847ed2b4a78f52c9434.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
fc137b673379a46d1a48945e7616e4ad607dfbd1f9778847ed2b4a78f52c9434.exe
Resource
win10v2004-20230221-en
General
-
Target
fc137b673379a46d1a48945e7616e4ad607dfbd1f9778847ed2b4a78f52c9434.exe
-
Size
37.2MB
-
MD5
cf88f8e774757b2fe4f478b80d8a7855
-
SHA1
5679c77c5b4e6e8fcac610aff7d47e58356dc63f
-
SHA256
fc137b673379a46d1a48945e7616e4ad607dfbd1f9778847ed2b4a78f52c9434
-
SHA512
3af591b00a2e60e79b7d148898c2bd13bb03d695378930ced8e55e1e5589a89f28b461377486f8272fc663227830b56fccd2843a0581bc55317948868ef7035b
-
SSDEEP
12288:Cb8A+lyMML0gN55kXFyqf0bGBvGoE3IhAf1nAhglR:C4ZzML0gN5WXFaK9GoEHf1nAhglR
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4800-134-0x00000000021C0000-0x00000000021EC000-memory.dmp modiloader_stage2 -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1660 4800 WerFault.exe fc137b673379a46d1a48945e7616e4ad607dfbd1f9778847ed2b4a78f52c9434.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc137b673379a46d1a48945e7616e4ad607dfbd1f9778847ed2b4a78f52c9434.exe"C:\Users\Admin\AppData\Local\Temp\fc137b673379a46d1a48945e7616e4ad607dfbd1f9778847ed2b4a78f52c9434.exe"1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4800 -s 19842⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4800 -ip 48001⤵
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4800-133-0x0000000002150000-0x0000000002151000-memory.dmpFilesize
4KB
-
memory/4800-134-0x00000000021C0000-0x00000000021EC000-memory.dmpFilesize
176KB
-
memory/4800-136-0x0000000000400000-0x00000000004E6000-memory.dmpFilesize
920KB
-
memory/4800-147-0x00000000045C0000-0x0000000004768000-memory.dmpFilesize
1.7MB
-
memory/4800-148-0x0000000004790000-0x0000000004821000-memory.dmpFilesize
580KB
-
memory/4800-150-0x0000000004840000-0x0000000004898000-memory.dmpFilesize
352KB
-
memory/4800-151-0x00000000048B0000-0x0000000004928000-memory.dmpFilesize
480KB
-
memory/4800-149-0x0000000004830000-0x0000000004838000-memory.dmpFilesize
32KB
-
memory/4800-153-0x0000000004940000-0x0000000004968000-memory.dmpFilesize
160KB
-
memory/4800-152-0x0000000004930000-0x0000000004940000-memory.dmpFilesize
64KB
-
memory/4800-154-0x0000000004970000-0x000000000497E000-memory.dmpFilesize
56KB
-
memory/4800-155-0x0000000004980000-0x0000000004988000-memory.dmpFilesize
32KB
-
memory/4800-156-0x0000000004990000-0x00000000049A3000-memory.dmpFilesize
76KB
-
memory/4800-157-0x0000000004A70000-0x0000000004A9F000-memory.dmpFilesize
188KB
-
memory/4800-158-0x0000000004AA0000-0x0000000004AAA000-memory.dmpFilesize
40KB
-
memory/4800-159-0x0000000004BF0000-0x0000000004C16000-memory.dmpFilesize
152KB
-
memory/4800-160-0x0000000004D70000-0x0000000004D84000-memory.dmpFilesize
80KB
-
memory/4800-161-0x0000000004D90000-0x0000000004DA6000-memory.dmpFilesize
88KB
-
memory/4800-162-0x0000000004DB0000-0x0000000004E24000-memory.dmpFilesize
464KB
-
memory/4800-164-0x0000000004CF0000-0x0000000004D0F000-memory.dmpFilesize
124KB
-
memory/4800-163-0x0000000004C70000-0x0000000004C91000-memory.dmpFilesize
132KB