Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 16:54
Static task
static1
Behavioral task
behavioral1
Sample
2ed136416bade7cb60ce5d275338cfc4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2ed136416bade7cb60ce5d275338cfc4.exe
Resource
win10v2004-20231222-en
General
-
Target
2ed136416bade7cb60ce5d275338cfc4.exe
-
Size
355KB
-
MD5
2ed136416bade7cb60ce5d275338cfc4
-
SHA1
5d6a704ee4c24a16f8f5c9798e2220332a0bb77f
-
SHA256
3f9ce882a7be1c832e14bd1f764abcab1d18b03cbb99f34d0a1ef9fd7ec8c9b0
-
SHA512
f4f61fca7bd89f7dd8921418bbd6890686e2f0f0c9d2381d83952be53fb8de08a21b7102b9ad13637bf82761ac065089c167772808f5cddc88828afc0363dbb8
-
SSDEEP
6144:oyR6GeEsunvaspPsPNb+/lqDFo75XVcmu8NuVmsllTIwvgyTzcXLO0Flv0x:XempPsNRsXeydhs3zCLdj8x
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral1/memory/1732-2-0x0000000000400000-0x00000000004BE000-memory.dmp modiloader_stage2 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\Fiele Ps.txt 2ed136416bade7cb60ce5d275338cfc4.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2116 1732 2ed136416bade7cb60ce5d275338cfc4.exe 14 PID 1732 wrote to memory of 2116 1732 2ed136416bade7cb60ce5d275338cfc4.exe 14 PID 1732 wrote to memory of 2116 1732 2ed136416bade7cb60ce5d275338cfc4.exe 14 PID 1732 wrote to memory of 2116 1732 2ed136416bade7cb60ce5d275338cfc4.exe 14
Processes
-
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"1⤵PID:2116
-
C:\Users\Admin\AppData\Local\Temp\2ed136416bade7cb60ce5d275338cfc4.exe"C:\Users\Admin\AppData\Local\Temp\2ed136416bade7cb60ce5d275338cfc4.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1732