Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 13:10
Static task
static1
Behavioral task
behavioral1
Sample
19855febe87d07f746f7809f3c0d7d24.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
19855febe87d07f746f7809f3c0d7d24.exe
Resource
win10v2004-20231222-en
General
-
Target
19855febe87d07f746f7809f3c0d7d24.exe
-
Size
611KB
-
MD5
19855febe87d07f746f7809f3c0d7d24
-
SHA1
1446bbb187148e458d39fb5d75f4653325b92300
-
SHA256
e3b460d725925124eebda2b6a08c641056db2dc5b4ffd957dc11361c1a6a2247
-
SHA512
700caa9f1b8925f76ba221666ecc28a0579514e15fbeaad2eb330b4ea45ed92ba8cc4d0386105d21c525cfda9c0ebf238ea0a95bbfbd0f8b70fc25fae6ff7d42
-
SSDEEP
12288:6DvQ93MYXE2RuwkBFAEaTGCYifEeYEvvwfwHF3Z4mxxcg4DE9YpKN2Fx:6DvQ9hXxVuFfpCY/ePvvwfwHQmXVZ9qL
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral1/memory/2376-36-0x0000000000400000-0x000000000058F000-memory.dmp modiloader_stage2 behavioral1/memory/2376-32-0x0000000000400000-0x000000000058F000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 2376 2008_serve.exe -
Loads dropped DLL 2 IoCs
pid Process 1900 19855febe87d07f746f7809f3c0d7d24.exe 1900 19855febe87d07f746f7809f3c0d7d24.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\program files\common files\microsoft shared\msinfo\2008_serve.jpg 19855febe87d07f746f7809f3c0d7d24.exe File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\Fiele Ps.txt 2008_serve.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1900 wrote to memory of 2376 1900 19855febe87d07f746f7809f3c0d7d24.exe 14 PID 1900 wrote to memory of 2376 1900 19855febe87d07f746f7809f3c0d7d24.exe 14 PID 1900 wrote to memory of 2376 1900 19855febe87d07f746f7809f3c0d7d24.exe 14 PID 1900 wrote to memory of 2376 1900 19855febe87d07f746f7809f3c0d7d24.exe 14
Processes
-
C:\program files\common files\microsoft shared\msinfo\2008_serve.exe"C:\program files\common files\microsoft shared\msinfo\2008_serve.exe"1⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2376
-
C:\Users\Admin\AppData\Local\Temp\19855febe87d07f746f7809f3c0d7d24.exe"C:\Users\Admin\AppData\Local\Temp\19855febe87d07f746f7809f3c0d7d24.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1900