Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2023 13:44
Behavioral task
behavioral1
Sample
Terminal (2).exe
Resource
win7-20231020-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
Terminal (2).exe
Resource
win10v2004-20231127-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
Terminal (2).exe
-
Size
320KB
-
MD5
42ebddec39d2fc524eb8fc54e3225860
-
SHA1
fb05fff1a0ab9a571daaf80d770f249f450043ee
-
SHA256
03c3317ee0c2f30e5fbe621a167c0023740806c33b5875d250d3984fc90f75b3
-
SHA512
ca49184e31f8821297f7d7673b20b3c5b0f866d8488afae4ebd89410fd63a979994b42f52167022e3e631c5abd38009bb5ce26d10048f1d32cfcf714e5deb957
-
SSDEEP
6144:3Gg30MB87kz5Wn4hmnB/uvG11TrnQiEQI6FP+S37jgvYxdQbNEHsp:d30MrVphmTLRP+S34gxKbMg
Score
10/10
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader First Stage 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4560-2-0x0000000000400000-0x00000000004C6000-memory.dmp modiloader_stage1 -
Processes:
resource yara_rule behavioral2/memory/4560-0-0x0000000000400000-0x00000000004C6000-memory.dmp upx behavioral2/memory/4560-2-0x0000000000400000-0x00000000004C6000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Terminal (2).exepid process 4560 Terminal (2).exe