Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 11:00
Static task
static1
Behavioral task
behavioral1
Sample
6945e6a10f2bbcc922fbbffd4a649ae1.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
6945e6a10f2bbcc922fbbffd4a649ae1.exe
Resource
win10v2004-20231222-en
General
-
Target
6945e6a10f2bbcc922fbbffd4a649ae1.exe
-
Size
182KB
-
MD5
6945e6a10f2bbcc922fbbffd4a649ae1
-
SHA1
b02b81f02006c402e7f8791354bcde3b2aa5aeca
-
SHA256
77e7b338dd8f463b9dcdbec9a4d816437015e241b90cf73dac935ca601e73ab5
-
SHA512
4bafbf2b36eed1a6897d3af0b1ccc1425ef5d49dff36dd226df89b555b37f25304ed2c87ac03051b74e627cca4ff1750e03e02def3629790090045869440f95e
-
SSDEEP
3072:5Ur6ZPLQ8wmAgxzR0kc6R95Dek7iYPOYItT9FBrZhwiqSZfHYVghkE54FOo/m:5UroPcf+zRBcoDek7iYPOrtT9FBdhwi5
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 3 IoCs
resource yara_rule behavioral1/memory/2660-1-0x0000000000400000-0x000000000048D726-memory.dmp modiloader_stage2 behavioral1/memory/2660-0-0x0000000000400000-0x000000000048D726-memory.dmp modiloader_stage2 behavioral1/memory/2660-3-0x0000000000400000-0x000000000048D726-memory.dmp modiloader_stage2 -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\netctrol\Parameters\ServiceDll = "C:\\Windows\\system32\\sysi.dll" 6945e6a10f2bbcc922fbbffd4a649ae1.exe -
Deletes itself 1 IoCs
pid Process 2356 cmd.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\sysi.dll 6945e6a10f2bbcc922fbbffd4a649ae1.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2660 wrote to memory of 2356 2660 6945e6a10f2bbcc922fbbffd4a649ae1.exe 29 PID 2660 wrote to memory of 2356 2660 6945e6a10f2bbcc922fbbffd4a649ae1.exe 29 PID 2660 wrote to memory of 2356 2660 6945e6a10f2bbcc922fbbffd4a649ae1.exe 29 PID 2660 wrote to memory of 2356 2660 6945e6a10f2bbcc922fbbffd4a649ae1.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\6945e6a10f2bbcc922fbbffd4a649ae1.exe"C:\Users\Admin\AppData\Local\Temp\6945e6a10f2bbcc922fbbffd4a649ae1.exe"1⤵
- Sets DLL path for service in the registry
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\6945e6a10f2bbcc922fbbffd4a649ae1.exe"2⤵
- Deletes itself
PID:2356
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k network1⤵PID:1908