Analysis
-
max time kernel
130s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
03-08-2023 13:45
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.DropperX-gen.19020.29434.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Win32.DropperX-gen.19020.29434.exe
Resource
win10v2004-20230703-en
General
-
Target
SecuriteInfo.com.Win32.DropperX-gen.19020.29434.exe
-
Size
1.1MB
-
MD5
4205e9fe92e166b7646469a84217cab3
-
SHA1
4f46cd8e752cc5937a32fefa01bcde8061eb5b73
-
SHA256
c2603fdcd24aba4629f3a8e3822f8c8ca84a97c89f163e05f9f5e1492da81036
-
SHA512
1ef6394cf11e62a284a830e42062959c6f330b25e84b8d2620396b50f44237bb069a5461781dc2a6cf0a4538feb460d84027a4de2985545bd7c85f6b6d7d9de5
-
SSDEEP
24576:+GBEKQCWCWF4bH7yT+YLWPP7/NCo9LboxSYVuDpa7Dfavrjnpi0JN:rDpd7/NCgLRYwNa7mvrjJ
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 43 IoCs
resource yara_rule behavioral1/memory/1356-56-0x0000000001CB0000-0x0000000001D0D000-memory.dmp modiloader_stage2 behavioral1/memory/1356-60-0x0000000001CB0000-0x0000000001D0D000-memory.dmp modiloader_stage2 behavioral1/memory/1356-59-0x0000000001CB0000-0x0000000001D0D000-memory.dmp modiloader_stage2 behavioral1/memory/1356-64-0x0000000001CB0000-0x0000000001D0D000-memory.dmp modiloader_stage2 behavioral1/memory/1356-63-0x0000000001CB0000-0x0000000001D0D000-memory.dmp modiloader_stage2 behavioral1/memory/1356-62-0x0000000001CB0000-0x0000000001D0D000-memory.dmp modiloader_stage2 behavioral1/memory/1356-61-0x0000000001CB0000-0x0000000001D0D000-memory.dmp modiloader_stage2 behavioral1/memory/1356-66-0x0000000001CB0000-0x0000000001D0D000-memory.dmp modiloader_stage2 behavioral1/memory/1356-65-0x0000000001CB0000-0x0000000001D0D000-memory.dmp modiloader_stage2 behavioral1/memory/1356-67-0x0000000001CB0000-0x0000000001D0D000-memory.dmp modiloader_stage2 behavioral1/memory/1356-68-0x0000000001CB0000-0x0000000001D0D000-memory.dmp modiloader_stage2 behavioral1/memory/1356-69-0x0000000001CB0000-0x0000000001D0D000-memory.dmp modiloader_stage2 behavioral1/memory/1356-70-0x0000000001CB0000-0x0000000001D0D000-memory.dmp modiloader_stage2 behavioral1/memory/1356-71-0x0000000001CB0000-0x0000000001D0D000-memory.dmp modiloader_stage2 behavioral1/memory/1356-72-0x0000000001CB0000-0x0000000001D0D000-memory.dmp modiloader_stage2 behavioral1/memory/1356-73-0x0000000001CB0000-0x0000000001D0D000-memory.dmp modiloader_stage2 behavioral1/memory/1356-74-0x0000000001CB0000-0x0000000001D0D000-memory.dmp modiloader_stage2 behavioral1/memory/1356-75-0x0000000001CB0000-0x0000000001D0D000-memory.dmp modiloader_stage2 behavioral1/memory/1356-76-0x0000000001CB0000-0x0000000001D0D000-memory.dmp modiloader_stage2 behavioral1/memory/1356-77-0x0000000001CB0000-0x0000000001D0D000-memory.dmp modiloader_stage2 behavioral1/memory/1356-79-0x0000000001CB0000-0x0000000001D0D000-memory.dmp modiloader_stage2 behavioral1/memory/1356-78-0x0000000001CB0000-0x0000000001D0D000-memory.dmp modiloader_stage2 behavioral1/memory/1356-80-0x0000000001CB0000-0x0000000001D0D000-memory.dmp modiloader_stage2 behavioral1/memory/1356-81-0x0000000001CB0000-0x0000000001D0D000-memory.dmp modiloader_stage2 behavioral1/memory/1356-82-0x0000000001CB0000-0x0000000001D0D000-memory.dmp modiloader_stage2 behavioral1/memory/1356-83-0x0000000001CB0000-0x0000000001D0D000-memory.dmp modiloader_stage2 behavioral1/memory/1356-86-0x0000000001CB0000-0x0000000001D0D000-memory.dmp modiloader_stage2 behavioral1/memory/1356-87-0x0000000001CB0000-0x0000000001D0D000-memory.dmp modiloader_stage2 behavioral1/memory/1356-85-0x0000000001CB0000-0x0000000001D0D000-memory.dmp modiloader_stage2 behavioral1/memory/1356-84-0x0000000001CB0000-0x0000000001D0D000-memory.dmp modiloader_stage2 behavioral1/memory/1356-90-0x0000000001CB0000-0x0000000001D0D000-memory.dmp modiloader_stage2 behavioral1/memory/1356-91-0x0000000001CB0000-0x0000000001D0D000-memory.dmp modiloader_stage2 behavioral1/memory/1356-89-0x0000000001CB0000-0x0000000001D0D000-memory.dmp modiloader_stage2 behavioral1/memory/1356-88-0x0000000001CB0000-0x0000000001D0D000-memory.dmp modiloader_stage2 behavioral1/memory/1356-93-0x0000000001CB0000-0x0000000001D0D000-memory.dmp modiloader_stage2 behavioral1/memory/1356-92-0x0000000001CB0000-0x0000000001D0D000-memory.dmp modiloader_stage2 behavioral1/memory/1356-94-0x0000000001CB0000-0x0000000001D0D000-memory.dmp modiloader_stage2 behavioral1/memory/1356-95-0x0000000001CB0000-0x0000000001D0D000-memory.dmp modiloader_stage2 behavioral1/memory/1356-96-0x0000000001CB0000-0x0000000001D0D000-memory.dmp modiloader_stage2 behavioral1/memory/1356-97-0x0000000001CB0000-0x0000000001D0D000-memory.dmp modiloader_stage2 behavioral1/memory/1356-98-0x0000000001CB0000-0x0000000001D0D000-memory.dmp modiloader_stage2 behavioral1/memory/1356-99-0x0000000001CB0000-0x0000000001D0D000-memory.dmp modiloader_stage2 behavioral1/memory/1356-100-0x0000000001CB0000-0x0000000001D0D000-memory.dmp modiloader_stage2 -
Program crash 1 IoCs
pid pid_target Process procid_target 2780 1356 WerFault.exe 27 -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1356 wrote to memory of 0 1356 SecuriteInfo.com.Win32.DropperX-gen.19020.29434.exe PID 1356 wrote to memory of 2780 1356 SecuriteInfo.com.Win32.DropperX-gen.19020.29434.exe 28 PID 1356 wrote to memory of 2780 1356 SecuriteInfo.com.Win32.DropperX-gen.19020.29434.exe 28 PID 1356 wrote to memory of 2780 1356 SecuriteInfo.com.Win32.DropperX-gen.19020.29434.exe 28 PID 1356 wrote to memory of 2780 1356 SecuriteInfo.com.Win32.DropperX-gen.19020.29434.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.DropperX-gen.19020.29434.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.DropperX-gen.19020.29434.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1356 -s 7162⤵
- Program crash
PID:2780
-