Analysis
-
max time kernel
134s -
max time network
158s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 21:07
Behavioral task
behavioral1
Sample
040aca8d02fc6a108b68307c02072a7a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
040aca8d02fc6a108b68307c02072a7a.exe
Resource
win10v2004-20231215-en
General
-
Target
040aca8d02fc6a108b68307c02072a7a.exe
-
Size
349KB
-
MD5
040aca8d02fc6a108b68307c02072a7a
-
SHA1
69364840bdd631936946821c25dbf8b3af91ece0
-
SHA256
d7a5d33e16575014aedeab65957171ec968ca0a9a82e57c3b32e671fae3b4459
-
SHA512
86cbe3ed9b2c46667f6358138db98e4e2a7eedac8395a003b8d51cf33ede9f6bbb7e74beea1b21f76fa961495d5355df45626018d7f298d96bf2be2d497c44b8
-
SSDEEP
6144:dVD7AZbxaNRGq+8JutmRuWPJDCO3OoaTzloTs6gjTBPuLT8rOfu:dVDawNRGq5gwuSIoWjTMLT8rO2
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 17 IoCs
resource yara_rule behavioral1/memory/2292-5-0x0000000000400000-0x000000000045E000-memory.dmp modiloader_stage2 behavioral1/memory/2716-4-0x0000000000180000-0x00000000001D9000-memory.dmp modiloader_stage2 behavioral1/files/0x000a000000012266-3.dat modiloader_stage2 behavioral1/files/0x000a000000012266-2.dat modiloader_stage2 behavioral1/memory/2716-7-0x0000000000180000-0x00000000001D9000-memory.dmp modiloader_stage2 behavioral1/memory/2716-8-0x0000000000180000-0x00000000001D9000-memory.dmp modiloader_stage2 behavioral1/memory/2716-9-0x0000000000180000-0x00000000001D9000-memory.dmp modiloader_stage2 behavioral1/memory/2716-10-0x0000000000180000-0x00000000001D9000-memory.dmp modiloader_stage2 behavioral1/memory/2716-11-0x0000000000180000-0x00000000001D9000-memory.dmp modiloader_stage2 behavioral1/memory/2716-12-0x0000000000180000-0x00000000001D9000-memory.dmp modiloader_stage2 behavioral1/memory/2716-13-0x0000000000180000-0x00000000001D9000-memory.dmp modiloader_stage2 behavioral1/memory/2716-14-0x0000000000180000-0x00000000001D9000-memory.dmp modiloader_stage2 behavioral1/memory/2716-15-0x0000000000180000-0x00000000001D9000-memory.dmp modiloader_stage2 behavioral1/memory/2716-16-0x0000000000180000-0x00000000001D9000-memory.dmp modiloader_stage2 behavioral1/memory/2716-17-0x0000000000180000-0x00000000001D9000-memory.dmp modiloader_stage2 behavioral1/memory/2716-18-0x0000000000180000-0x00000000001D9000-memory.dmp modiloader_stage2 behavioral1/memory/2716-19-0x0000000000180000-0x00000000001D9000-memory.dmp modiloader_stage2 -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\xxoxx\Parameters\ServiceDLL = "%SystemRoot%\\system32\\xxoxx.dll" 040aca8d02fc6a108b68307c02072a7a.exe -
Deletes itself 1 IoCs
pid Process 2808 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 2716 svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\xxoxx.dll 040aca8d02fc6a108b68307c02072a7a.exe File opened for modification C:\Windows\SysWOW64\xxoxx.dll 040aca8d02fc6a108b68307c02072a7a.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2292 wrote to memory of 2808 2292 040aca8d02fc6a108b68307c02072a7a.exe 30 PID 2292 wrote to memory of 2808 2292 040aca8d02fc6a108b68307c02072a7a.exe 30 PID 2292 wrote to memory of 2808 2292 040aca8d02fc6a108b68307c02072a7a.exe 30 PID 2292 wrote to memory of 2808 2292 040aca8d02fc6a108b68307c02072a7a.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\040aca8d02fc6a108b68307c02072a7a.exe"C:\Users\Admin\AppData\Local\Temp\040aca8d02fc6a108b68307c02072a7a.exe"1⤵
- Sets DLL path for service in the registry
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\040aca8d02fc6a108b68307c02072a7a.exe"2⤵
- Deletes itself
PID:2808
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k krnlsrvc1⤵PID:2300
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k krnlsrvc1⤵
- Loads dropped DLL
PID:2716
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD508aa4382ad4da4fc4785e1f4c53f6b90
SHA18f3543af7b252f880595fd1df9759dcd93e513f0
SHA256ad536d77e59322ad54887485f3684741778834b4ab0689fd476c3737fd11288b
SHA5122375981bc21fe10eb06581a8a9f2447297274d327d0318f9acafc0845af47e3968252613361c669fdb1440be08916debc6abec0971f1a0bbac5f4314e367b36a
-
Filesize
99KB
MD5bcbd3c2cf36e6465a1f9844a279c89a3
SHA1591b4ca91dcc101e82a9eca116c3bc01a357d162
SHA25694b89007cb1e647b2e7b84e6b1490c465006b7baeefc70cff1120523616d38f8
SHA512b9e71dea4a9132e3b20604ea214fd722793715efcf8644e9602b59c796ac63fc23143b863a3c1276818022a3314ca6f36384fc1b62194443624c51ce3245935b