Analysis
-
max time kernel
1622s -
max time network
1632s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
07-03-2023 20:24
Static task
static1
Behavioral task
behavioral1
Sample
Documents/KILTAS 2034_Company Profile and acredit Certification.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Documents/KILTAS 2034_Company Profile and acredit Certification.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
Documents/Specification Details_KILTAS_ORD645_TUR_pdf8756994.exe
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
Documents/Specification Details_KILTAS_ORD645_TUR_pdf8756994.exe
Resource
win10v2004-20230220-en
General
-
Target
Documents/Specification Details_KILTAS_ORD645_TUR_pdf8756994.exe
-
Size
42.0MB
-
MD5
2a84907628128ab7401ee4e962ed3d87
-
SHA1
08966d0baa71f985d1f99d7591ca6e65a802b4e6
-
SHA256
46945987476e8248788f30577cb9146326583b8d79a5641c5dda490034c625f7
-
SHA512
0c49f30709e2bda4e3e034db6a3face51b76a060cf526ae56e139a125fea9e58d67ae8b2d743e8733cf52676ddf1606855793047795d879bd970df903fbd3552
-
SSDEEP
98304:dUv6mICvmKOd4fGygAPtliUa2qZ6XyfX4tA7+M:dUuF1XFaM
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
Processes:
resource yara_rule behavioral3/memory/1960-54-0x0000000000360000-0x000000000038C000-memory.dmp modiloader_stage2 -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1680 1960 WerFault.exe Specification Details_KILTAS_ORD645_TUR_pdf8756994.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
Specification Details_KILTAS_ORD645_TUR_pdf8756994.exedescription pid process target process PID 1960 wrote to memory of 1680 1960 Specification Details_KILTAS_ORD645_TUR_pdf8756994.exe WerFault.exe PID 1960 wrote to memory of 1680 1960 Specification Details_KILTAS_ORD645_TUR_pdf8756994.exe WerFault.exe PID 1960 wrote to memory of 1680 1960 Specification Details_KILTAS_ORD645_TUR_pdf8756994.exe WerFault.exe PID 1960 wrote to memory of 1680 1960 Specification Details_KILTAS_ORD645_TUR_pdf8756994.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Documents\Specification Details_KILTAS_ORD645_TUR_pdf8756994.exe"C:\Users\Admin\AppData\Local\Temp\Documents\Specification Details_KILTAS_ORD645_TUR_pdf8756994.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1960 -s 9282⤵
- Program crash
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1960-54-0x0000000000360000-0x000000000038C000-memory.dmpFilesize
176KB
-
memory/1960-56-0x0000000000230000-0x0000000000231000-memory.dmpFilesize
4KB
-
memory/1960-57-0x0000000002080000-0x0000000002096000-memory.dmpFilesize
88KB
-
memory/1960-58-0x0000000003670000-0x00000000036AB000-memory.dmpFilesize
236KB
-
memory/1960-59-0x00000000036B0000-0x00000000036BE000-memory.dmpFilesize
56KB
-
memory/1960-60-0x0000000000400000-0x00000000004EE000-memory.dmpFilesize
952KB
-
memory/1960-61-0x0000000003D60000-0x0000000003D6D000-memory.dmpFilesize
52KB
-
memory/1960-62-0x0000000003D70000-0x0000000003DCA000-memory.dmpFilesize
360KB
-
memory/1960-63-0x0000000003DD0000-0x0000000003DE0000-memory.dmpFilesize
64KB
-
memory/1960-64-0x0000000003E10000-0x0000000003E22000-memory.dmpFilesize
72KB
-
memory/1960-65-0x0000000003E30000-0x0000000003E68000-memory.dmpFilesize
224KB