Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 04:26
Static task
static1
Behavioral task
behavioral1
Sample
0e6ed2e439d7f746e6422493feef3ed1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0e6ed2e439d7f746e6422493feef3ed1.exe
Resource
win10v2004-20231215-en
General
-
Target
0e6ed2e439d7f746e6422493feef3ed1.exe
-
Size
485KB
-
MD5
0e6ed2e439d7f746e6422493feef3ed1
-
SHA1
85a01fcd09e760beae0a34a26bdc5b4d5153ff1a
-
SHA256
1fd4b64b2bd2dd65e7abb3bf8d208bcafa16aa8b995a173f6f5e037eb7f4ad3e
-
SHA512
5cd4c4b44067482af4ed3fb766992b57bd02e7789b0f9cad1c634ceb76f8d52eb5789a8d867755a335c2777765e4b3eebb6b78a897508771f836478fa1740d87
-
SSDEEP
6144:QXwMdw/rSJNmrDeMjFILDoAF2idZecnl20lHRxp3gHlGOeuxkDOPD7QdyjFegFia:QXm/LrDeM8FF3Z4mxx0oua09jUgFH
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 18 IoCs
resource yara_rule behavioral2/memory/2148-40-0x00000000034B0000-0x00000000035B0000-memory.dmp modiloader_stage2 behavioral2/memory/2148-72-0x0000000000400000-0x00000000004AF000-memory.dmp modiloader_stage2 behavioral2/files/0x00050000000006e9-74.dat modiloader_stage2 behavioral2/files/0x00050000000006e9-70.dat modiloader_stage2 behavioral2/memory/528-78-0x0000000000400000-0x0000000000459000-memory.dmp modiloader_stage2 behavioral2/memory/528-79-0x0000000000400000-0x0000000000459000-memory.dmp modiloader_stage2 behavioral2/memory/528-82-0x0000000000400000-0x0000000000459000-memory.dmp modiloader_stage2 behavioral2/memory/528-83-0x0000000000400000-0x0000000000459000-memory.dmp modiloader_stage2 behavioral2/memory/528-84-0x0000000000400000-0x0000000000459000-memory.dmp modiloader_stage2 behavioral2/memory/528-85-0x0000000000400000-0x0000000000459000-memory.dmp modiloader_stage2 behavioral2/memory/528-86-0x0000000000400000-0x0000000000459000-memory.dmp modiloader_stage2 behavioral2/memory/528-87-0x0000000000400000-0x0000000000459000-memory.dmp modiloader_stage2 behavioral2/memory/528-88-0x0000000000400000-0x0000000000459000-memory.dmp modiloader_stage2 behavioral2/memory/528-89-0x0000000000400000-0x0000000000459000-memory.dmp modiloader_stage2 behavioral2/memory/528-90-0x0000000000400000-0x0000000000459000-memory.dmp modiloader_stage2 behavioral2/memory/528-91-0x0000000000400000-0x0000000000459000-memory.dmp modiloader_stage2 behavioral2/memory/528-92-0x0000000000400000-0x0000000000459000-memory.dmp modiloader_stage2 behavioral2/memory/528-93-0x0000000000400000-0x0000000000459000-memory.dmp modiloader_stage2 -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\xxoxx\Parameters\ServiceDLL = "%SystemRoot%\\system32\\xxoxx.dll" 0e6ed2e439d7f746e6422493feef3ed1.exe -
Loads dropped DLL 1 IoCs
pid Process 528 svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\xxoxx.dll 0e6ed2e439d7f746e6422493feef3ed1.exe File opened for modification C:\Windows\SysWOW64\xxoxx.dll 0e6ed2e439d7f746e6422493feef3ed1.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2148 wrote to memory of 2816 2148 0e6ed2e439d7f746e6422493feef3ed1.exe 46 PID 2148 wrote to memory of 2816 2148 0e6ed2e439d7f746e6422493feef3ed1.exe 46 PID 2148 wrote to memory of 2816 2148 0e6ed2e439d7f746e6422493feef3ed1.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e6ed2e439d7f746e6422493feef3ed1.exe"C:\Users\Admin\AppData\Local\Temp\0e6ed2e439d7f746e6422493feef3ed1.exe"1⤵
- Sets DLL path for service in the registry
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\0e6ed2e439d7f746e6422493feef3ed1.exe"2⤵PID:2816
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k krnlsrvc1⤵
- Loads dropped DLL
PID:528
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k krnlsrvc1⤵PID:2344
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD50daad0cb33fa710f71ab3339c13a439b
SHA179d3705eee917d272bdd1356f807b2466f724191
SHA256af1b71d8faca74788159419555c8f0f9b9ea774d2a99d863270420f754be9b59
SHA512ac39ebaca4e9571fdbeb5640e62c10cc2223a81d40452d4dd223b59c69cc7c762fb50b8e9cce2c5546819fbcdeedbb86d3175631a11c864081b1c9964220ecd4
-
Filesize
71KB
MD51819bb74c788beb97f9ccae2b91ec358
SHA1fb59bcea709e29c499ff5108869ec4cedeba93a3
SHA256c6855b88e0c92955bd8b4f400000c557d9c8421fd7b3fd6ed93689a3cce88c45
SHA5126eeef76332a818530e361c5b44c2c4d86962e9f51336e99ddc74eae69a8371c1fd12a763f8af6b22b85df2e8107ac70e284e2256cc97e2120d8a0df23358359c