Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 01:46
Static task
static1
Behavioral task
behavioral1
Sample
2347ad437f76f2f320b6ed31457ad714.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2347ad437f76f2f320b6ed31457ad714.exe
Resource
win10v2004-20231215-en
General
-
Target
2347ad437f76f2f320b6ed31457ad714.exe
-
Size
306KB
-
MD5
2347ad437f76f2f320b6ed31457ad714
-
SHA1
7c91a8cbd9317d7040fe59152b9ca59cfe69fde5
-
SHA256
f2ef85f663e6d410200a97b9385f48183b50c535bce5c192be1dbdd2ba4a518a
-
SHA512
5f32835d7c2a6614feea2badef56fdd8baed57af631edab82f17d639aedfbae3d1753ef79af715b812d377c776b040e7e2dfa5205c54fc9d4032d8892addc6be
-
SSDEEP
6144:9904nSHAweAgILkafnL0z2RdMO2t30chy8HfUjJxhdCWZT7UB8izcp52oHt:U4nSgwLFfnL06RjaEchfHOxhRYeiW2St
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 4 IoCs
resource yara_rule behavioral1/memory/3044-11-0x0000000000400000-0x0000000000556000-memory.dmp modiloader_stage2 behavioral1/memory/2932-13-0x0000000000400000-0x0000000000556000-memory.dmp modiloader_stage2 behavioral1/memory/3044-15-0x0000000000400000-0x0000000000556000-memory.dmp modiloader_stage2 behavioral1/memory/2932-23-0x0000000000400000-0x0000000000556000-memory.dmp modiloader_stage2 -
Deletes itself 1 IoCs
pid Process 2708 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 3044 explorer.bat -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\explorer.bat 2347ad437f76f2f320b6ed31457ad714.exe File created C:\Windows\SgotoDel.bat 2347ad437f76f2f320b6ed31457ad714.exe File created C:\Windows\explorer.bat 2347ad437f76f2f320b6ed31457ad714.exe -
Program crash 1 IoCs
pid pid_target Process 3068 3044 WerFault.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2932 wrote to memory of 3044 2932 2347ad437f76f2f320b6ed31457ad714.exe 29 PID 2932 wrote to memory of 3044 2932 2347ad437f76f2f320b6ed31457ad714.exe 29 PID 2932 wrote to memory of 3044 2932 2347ad437f76f2f320b6ed31457ad714.exe 29 PID 2932 wrote to memory of 3044 2932 2347ad437f76f2f320b6ed31457ad714.exe 29 PID 3044 wrote to memory of 3068 3044 explorer.bat 28 PID 3044 wrote to memory of 3068 3044 explorer.bat 28 PID 3044 wrote to memory of 3068 3044 explorer.bat 28 PID 3044 wrote to memory of 3068 3044 explorer.bat 28 PID 2932 wrote to memory of 2708 2932 2347ad437f76f2f320b6ed31457ad714.exe 31 PID 2932 wrote to memory of 2708 2932 2347ad437f76f2f320b6ed31457ad714.exe 31 PID 2932 wrote to memory of 2708 2932 2347ad437f76f2f320b6ed31457ad714.exe 31 PID 2932 wrote to memory of 2708 2932 2347ad437f76f2f320b6ed31457ad714.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2347ad437f76f2f320b6ed31457ad714.exe"C:\Users\Admin\AppData\Local\Temp\2347ad437f76f2f320b6ed31457ad714.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\explorer.batC:\Windows\explorer.bat2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3044
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\SgotoDel.bat2⤵
- Deletes itself
PID:2708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3044 -s 2841⤵
- Program crash
PID:3068
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184B
MD5f7c64a07915674d41effe0615c8edfec
SHA13c9eb42d605736ae1b349de5d031bfd03469971d
SHA2567de0cc0a47b57fdeb276f9774352cf38cc5ea7064a39e4811801f9685fc23112
SHA512e4dbf75575c7fd2379bce9eb0373e6fe889654a63a802a7c6da0e4876417affce74b33f81121c5598d5f1bba80e513b869a8cfa9cdce70dbd262a75af52998f9