Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
12/06/2023, 11:48
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
07640799.exe
Resource
win7-20230220-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
07640799.exe
Resource
win10v2004-20230220-en
4 signatures
150 seconds
General
-
Target
07640799.exe
-
Size
891KB
-
MD5
05448a55f9ad1b0ca58b32bb01c371b7
-
SHA1
a150fb7d510f2802a72c7bf94c200f9d4dc2e3b9
-
SHA256
bddb79b43d9173dba1eaa807096a8d2f09fbcec0f9adb9c7f5f5fbb97cc82b48
-
SHA512
a4e0bcb50963d5b2c305e31173b6d456ee49d1a02342f6876fca02898e5e5226e0f2d93937afc8bf1e576d3b01bd9e14a33ceee9b265f426ee2eb08447498e33
-
SSDEEP
24576:DqdXPn4tl29UFPWmKoyk4TLmgvky46i95nwkac:DqdfXUFPjKoNw714x
Score
10/10
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 48 IoCs
resource yara_rule behavioral2/memory/3920-135-0x0000000002400000-0x0000000002432000-memory.dmp modiloader_stage2 behavioral2/memory/3920-136-0x0000000002400000-0x0000000002432000-memory.dmp modiloader_stage2 behavioral2/memory/3920-137-0x0000000002400000-0x0000000002432000-memory.dmp modiloader_stage2 behavioral2/memory/3920-138-0x0000000002400000-0x0000000002432000-memory.dmp modiloader_stage2 behavioral2/memory/3920-139-0x0000000002400000-0x0000000002432000-memory.dmp modiloader_stage2 behavioral2/memory/3920-140-0x0000000002400000-0x0000000002432000-memory.dmp modiloader_stage2 behavioral2/memory/3920-141-0x0000000002400000-0x0000000002432000-memory.dmp modiloader_stage2 behavioral2/memory/3920-142-0x0000000002400000-0x0000000002432000-memory.dmp modiloader_stage2 behavioral2/memory/3920-143-0x0000000002400000-0x0000000002432000-memory.dmp modiloader_stage2 behavioral2/memory/3920-144-0x0000000002400000-0x0000000002432000-memory.dmp modiloader_stage2 behavioral2/memory/3920-145-0x0000000002400000-0x0000000002432000-memory.dmp modiloader_stage2 behavioral2/memory/3920-146-0x0000000002400000-0x0000000002432000-memory.dmp modiloader_stage2 behavioral2/memory/3920-147-0x0000000002400000-0x0000000002432000-memory.dmp modiloader_stage2 behavioral2/memory/3920-148-0x0000000002400000-0x0000000002432000-memory.dmp modiloader_stage2 behavioral2/memory/3920-149-0x0000000002400000-0x0000000002432000-memory.dmp modiloader_stage2 behavioral2/memory/3920-150-0x0000000002400000-0x0000000002432000-memory.dmp modiloader_stage2 behavioral2/memory/3920-151-0x0000000002400000-0x0000000002432000-memory.dmp modiloader_stage2 behavioral2/memory/3920-152-0x0000000002400000-0x0000000002432000-memory.dmp modiloader_stage2 behavioral2/memory/3920-153-0x0000000002400000-0x0000000002432000-memory.dmp modiloader_stage2 behavioral2/memory/3920-154-0x0000000002400000-0x0000000002432000-memory.dmp modiloader_stage2 behavioral2/memory/3920-155-0x0000000002400000-0x0000000002432000-memory.dmp modiloader_stage2 behavioral2/memory/3920-156-0x0000000002400000-0x0000000002432000-memory.dmp modiloader_stage2 behavioral2/memory/3920-157-0x0000000002400000-0x0000000002432000-memory.dmp modiloader_stage2 behavioral2/memory/3920-158-0x0000000002400000-0x0000000002432000-memory.dmp modiloader_stage2 behavioral2/memory/3920-159-0x0000000002400000-0x0000000002432000-memory.dmp modiloader_stage2 behavioral2/memory/3920-160-0x0000000002400000-0x0000000002432000-memory.dmp modiloader_stage2 behavioral2/memory/3920-161-0x0000000002400000-0x0000000002432000-memory.dmp modiloader_stage2 behavioral2/memory/3920-162-0x0000000002400000-0x0000000002432000-memory.dmp modiloader_stage2 behavioral2/memory/3920-163-0x0000000002400000-0x0000000002432000-memory.dmp modiloader_stage2 behavioral2/memory/3920-164-0x0000000002400000-0x0000000002432000-memory.dmp modiloader_stage2 behavioral2/memory/3920-165-0x0000000002400000-0x0000000002432000-memory.dmp modiloader_stage2 behavioral2/memory/3920-169-0x0000000002400000-0x0000000002432000-memory.dmp modiloader_stage2 behavioral2/memory/3920-170-0x0000000002400000-0x0000000002432000-memory.dmp modiloader_stage2 behavioral2/memory/3920-168-0x0000000002400000-0x0000000002432000-memory.dmp modiloader_stage2 behavioral2/memory/3920-167-0x0000000002400000-0x0000000002432000-memory.dmp modiloader_stage2 behavioral2/memory/3920-171-0x0000000002400000-0x0000000002432000-memory.dmp modiloader_stage2 behavioral2/memory/3920-166-0x0000000002400000-0x0000000002432000-memory.dmp modiloader_stage2 behavioral2/memory/3920-172-0x0000000002400000-0x0000000002432000-memory.dmp modiloader_stage2 behavioral2/memory/3920-173-0x0000000002400000-0x0000000002432000-memory.dmp modiloader_stage2 behavioral2/memory/3920-174-0x0000000002400000-0x0000000002432000-memory.dmp modiloader_stage2 behavioral2/memory/3920-175-0x0000000002400000-0x0000000002432000-memory.dmp modiloader_stage2 behavioral2/memory/3920-176-0x0000000002400000-0x0000000002432000-memory.dmp modiloader_stage2 behavioral2/memory/3920-177-0x0000000002400000-0x0000000002432000-memory.dmp modiloader_stage2 behavioral2/memory/3920-178-0x0000000002400000-0x0000000002432000-memory.dmp modiloader_stage2 behavioral2/memory/3920-179-0x0000000002400000-0x0000000002432000-memory.dmp modiloader_stage2 behavioral2/memory/3920-180-0x0000000002400000-0x0000000002432000-memory.dmp modiloader_stage2 behavioral2/memory/3920-181-0x0000000002400000-0x0000000002432000-memory.dmp modiloader_stage2 behavioral2/memory/3920-182-0x0000000002400000-0x0000000002432000-memory.dmp modiloader_stage2 -
Program crash 1 IoCs
pid pid_target Process procid_target 4388 3920 WerFault.exe 83 -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 23 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
Processes
-
C:\Users\Admin\AppData\Local\Temp\07640799.exe"C:\Users\Admin\AppData\Local\Temp\07640799.exe"1⤵PID:3920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3920 -s 17282⤵
- Program crash
PID:4388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 3920 -ip 39201⤵PID:4656