Analysis
-
max time kernel
144s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01-01-2024 02:39
Static task
static1
Behavioral task
behavioral1
Sample
3bacb95a8aba32b2cc216409e7f44fee.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3bacb95a8aba32b2cc216409e7f44fee.exe
Resource
win10v2004-20231215-en
General
-
Target
3bacb95a8aba32b2cc216409e7f44fee.exe
-
Size
283KB
-
MD5
3bacb95a8aba32b2cc216409e7f44fee
-
SHA1
7d692b0db9e84234715f6d0264457132e72d9ed5
-
SHA256
b7a82a6e51fac61545ddf9890a33014882bf30cd553d072f98344117d1c58226
-
SHA512
0a0ad6eb09bc5a640c98e9a9fd556fdae6a1510469bd9c431e7f9c8afd74d6240de3cdae67eb037e755abe069ed997b0e2ea073534360cdd5cad40e3fb15eaab
-
SSDEEP
6144:vmxFPRdzCLBW5caysewzaAOTJbav9+pFwTwthvO6pVR7XHGts:vyNTzCLJaMwzaZ1aV+0TwthWev
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 9 IoCs
resource yara_rule behavioral1/memory/2244-12-0x00000000004C0000-0x000000000056A000-memory.dmp modiloader_stage2 behavioral1/memory/1212-21-0x0000000000400000-0x00000000004B8016-memory.dmp modiloader_stage2 behavioral1/memory/2244-22-0x00000000004C0000-0x000000000056A000-memory.dmp modiloader_stage2 behavioral1/memory/2244-23-0x0000000000400000-0x00000000004B8016-memory.dmp modiloader_stage2 behavioral1/memory/2244-26-0x00000000004C0000-0x000000000056A000-memory.dmp modiloader_stage2 behavioral1/memory/2244-32-0x00000000004C0000-0x000000000056A000-memory.dmp modiloader_stage2 behavioral1/memory/2244-35-0x00000000004C0000-0x000000000056A000-memory.dmp modiloader_stage2 behavioral1/memory/2244-40-0x00000000004C0000-0x000000000056A000-memory.dmp modiloader_stage2 behavioral1/memory/2244-43-0x00000000004C0000-0x000000000056A000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 2244 rejoice08.exe -
Loads dropped DLL 2 IoCs
pid Process 1212 3bacb95a8aba32b2cc216409e7f44fee.exe 1212 3bacb95a8aba32b2cc216409e7f44fee.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\rejoice08.exe 3bacb95a8aba32b2cc216409e7f44fee.exe File opened for modification C:\Program Files\rejoice08.exe 3bacb95a8aba32b2cc216409e7f44fee.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1212 wrote to memory of 2244 1212 3bacb95a8aba32b2cc216409e7f44fee.exe 28 PID 1212 wrote to memory of 2244 1212 3bacb95a8aba32b2cc216409e7f44fee.exe 28 PID 1212 wrote to memory of 2244 1212 3bacb95a8aba32b2cc216409e7f44fee.exe 28 PID 1212 wrote to memory of 2244 1212 3bacb95a8aba32b2cc216409e7f44fee.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3bacb95a8aba32b2cc216409e7f44fee.exe"C:\Users\Admin\AppData\Local\Temp\3bacb95a8aba32b2cc216409e7f44fee.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Program Files\rejoice08.exe"C:\Program Files\rejoice08.exe"2⤵
- Executes dropped EXE
PID:2244
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
283KB
MD53bacb95a8aba32b2cc216409e7f44fee
SHA17d692b0db9e84234715f6d0264457132e72d9ed5
SHA256b7a82a6e51fac61545ddf9890a33014882bf30cd553d072f98344117d1c58226
SHA5120a0ad6eb09bc5a640c98e9a9fd556fdae6a1510469bd9c431e7f9c8afd74d6240de3cdae67eb037e755abe069ed997b0e2ea073534360cdd5cad40e3fb15eaab