Analysis

  • max time kernel
    76s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-05-2023 05:57

General

  • Target

    swift103.exe

  • Size

    1.1MB

  • MD5

    8983a4b99c0e4d0f73ff5d266dd67530

  • SHA1

    aeea9b73d6e3da69bc813f8631da539bb68e5a45

  • SHA256

    4d8f8def81704bbd8e31779ecb3b8d25f0d8bc0d2a3dbd55c1f18217dd1ecf5f

  • SHA512

    3d9dc1abf87ccb3ec3d686fb412af94230820bd550abd3fd16aeedc09cb255342904ee82d67e639056d31522d778db4bb0c7abc2978e808a7d4904fbe9168366

  • SSDEEP

    12288:NtN+qFRD49GYo3EU9Aj4aNJqASiMOUS+6IjfG80A5ZXYsLgzCROfekqQz/sYgVgw:NLX89GZ9Na2lO0Zf1/VgOk1zkfVc1M

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\swift103.exe
    "C:\Users\Admin\AppData\Local\Temp\swift103.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1008
    • C:\Windows\SysWOW64\wscript.exe
      C:\Windows\System32\wscript.exe
      2⤵
        PID:1452

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1008-133-0x0000000002870000-0x000000000290F000-memory.dmp

      Filesize

      636KB

    • memory/1008-135-0x0000000002220000-0x0000000002221000-memory.dmp

      Filesize

      4KB

    • memory/1008-136-0x0000000000400000-0x0000000000490000-memory.dmp

      Filesize

      576KB

    • memory/1008-139-0x0000000010590000-0x000000001060F000-memory.dmp

      Filesize

      508KB

    • memory/1008-144-0x0000000010590000-0x000000001060F000-memory.dmp

      Filesize

      508KB

    • memory/1452-140-0x00000000039A0000-0x00000000039A1000-memory.dmp

      Filesize

      4KB

    • memory/1452-141-0x0000000003C40000-0x0000000003C41000-memory.dmp

      Filesize

      4KB