Analysis
-
max time kernel
0s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 13:14
Behavioral task
behavioral1
Sample
036244e73f392c54c6c70107dd6563a3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
036244e73f392c54c6c70107dd6563a3.exe
Resource
win10v2004-20231215-en
General
-
Target
036244e73f392c54c6c70107dd6563a3.exe
-
Size
720KB
-
MD5
036244e73f392c54c6c70107dd6563a3
-
SHA1
6ce030303b1490b7c4dcae5ebe1787951a15ea06
-
SHA256
174721f9d5861a0415a3128debaa2147ef10dab5552454b5da3e2ae7b01b8033
-
SHA512
dfe0de63efe212f4a4e7b2edc9357e059b23c421c0b31344cd327e4fa6e7f89e03bdd13acdbcc71e9658c107e2c241eda968ae0dc8aff60bc3ccb9e71ef7d568
-
SSDEEP
12288:0t31oSg+d+coajNNQGJ7dAjsVE6wpNIyDG:0tpd+coaRglpN6
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 10 IoCs
resource yara_rule behavioral1/memory/1712-16-0x0000000000400000-0x0000000000510000-memory.dmp modiloader_stage2 behavioral1/memory/2080-40-0x0000000000400000-0x0000000000510000-memory.dmp modiloader_stage2 behavioral1/memory/2080-41-0x0000000000400000-0x0000000000510000-memory.dmp modiloader_stage2 behavioral1/memory/2080-42-0x0000000000400000-0x0000000000510000-memory.dmp modiloader_stage2 behavioral1/memory/2080-43-0x0000000000400000-0x0000000000510000-memory.dmp modiloader_stage2 behavioral1/memory/2080-44-0x0000000000400000-0x0000000000510000-memory.dmp modiloader_stage2 behavioral1/memory/2080-45-0x0000000000400000-0x0000000000510000-memory.dmp modiloader_stage2 behavioral1/memory/2080-46-0x0000000000400000-0x0000000000510000-memory.dmp modiloader_stage2 behavioral1/memory/2080-47-0x0000000000400000-0x0000000000510000-memory.dmp modiloader_stage2 behavioral1/memory/2080-48-0x0000000000400000-0x0000000000510000-memory.dmp modiloader_stage2 -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 036244e73f392c54c6c70107dd6563a3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 036244e73f392c54c6c70107dd6563a3.exe -
resource yara_rule behavioral1/memory/1712-1-0x0000000000400000-0x0000000000510000-memory.dmp upx behavioral1/files/0x000d00000001232d-24.dat upx behavioral1/memory/2080-20-0x0000000000400000-0x0000000000510000-memory.dmp upx behavioral1/memory/1712-16-0x0000000000400000-0x0000000000510000-memory.dmp upx behavioral1/files/0x000d00000001232d-14.dat upx behavioral1/files/0x000d00000001232d-12.dat upx behavioral1/memory/2080-40-0x0000000000400000-0x0000000000510000-memory.dmp upx behavioral1/memory/2080-41-0x0000000000400000-0x0000000000510000-memory.dmp upx behavioral1/memory/2080-42-0x0000000000400000-0x0000000000510000-memory.dmp upx behavioral1/memory/2080-43-0x0000000000400000-0x0000000000510000-memory.dmp upx behavioral1/memory/2080-44-0x0000000000400000-0x0000000000510000-memory.dmp upx behavioral1/memory/2080-45-0x0000000000400000-0x0000000000510000-memory.dmp upx behavioral1/memory/2080-46-0x0000000000400000-0x0000000000510000-memory.dmp upx behavioral1/memory/2080-47-0x0000000000400000-0x0000000000510000-memory.dmp upx behavioral1/memory/2080-48-0x0000000000400000-0x0000000000510000-memory.dmp upx -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA} 036244e73f392c54c6c70107dd6563a3.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
720KB
MD5036244e73f392c54c6c70107dd6563a3
SHA16ce030303b1490b7c4dcae5ebe1787951a15ea06
SHA256174721f9d5861a0415a3128debaa2147ef10dab5552454b5da3e2ae7b01b8033
SHA512dfe0de63efe212f4a4e7b2edc9357e059b23c421c0b31344cd327e4fa6e7f89e03bdd13acdbcc71e9658c107e2c241eda968ae0dc8aff60bc3ccb9e71ef7d568
-
Filesize
382KB
MD5c6e22417350b3f6f8f05d28ac50c6adb
SHA1080d389936f5310685974dbf46ae5f33b54ab6f8
SHA2563b784a0b9705e1806f40cd1cfcf0f1b5052daefe8e56593ca7e03dfbdeaa88b3
SHA512258fccc1477f7f9933e970d601d0c1421fd56eb03562a33b5d60fa9c1053033688db52626198ffcbd3387473bbbddc6cef1ce6bfe1367f079bcb7eacb603faff
-
Filesize
92KB
MD5d870979e12647ff636b19f5652bf4de9
SHA12559e6962046c48bbcabfc2b8c5e86c71b50c1f9
SHA256d25491b0f7df7df562b18d6aa6bd1063401683333ae1d4d5b2f0066555801db3
SHA512404927e5e4c0fa57d6c604a036385024c75a15dfd8915a042823eb88673e6a42a12adb7a90a0ca430da44bcb38fd5f6de23fa1c46dd971157d804f9c8ae16aa9