Analysis

  • max time kernel
    139s
  • max time network
    39s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    04/01/2024, 21:04

General

  • Target

    41e90b9cb286e2be25ac95d3e7180e28.exe

  • Size

    420KB

  • MD5

    41e90b9cb286e2be25ac95d3e7180e28

  • SHA1

    4bce3594dd2709a9ca1e1a580b022556794f1f2a

  • SHA256

    5c32dd84a20a1c892702433f5cad7c0cf14dcf62df6ce5bc3f6ec3afdbaba178

  • SHA512

    f5aa04b8903d037d768907698c506a97496f880752671cbd88449f307327a4c9fdbdd46f201e3875bf34aa41a0d496faa10a4d14a1a3083f48e2b43e6b010d9a

  • SSDEEP

    12288:D18E+ESMbk2ZcVxG0qRJopA8ZwYqwTYb4f:v6Ak2Zcu0mJoiZYqwTYb4f

Score
10/10

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 6 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\41e90b9cb286e2be25ac95d3e7180e28.exe
    "C:\Users\Admin\AppData\Local\Temp\41e90b9cb286e2be25ac95d3e7180e28.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:2792
    • C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice082.exe
      "C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice082.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1968
      • C:\Windows\SysWOW64\calc.exe
        "C:\Windows\system32\calc.exe"
        3⤵
          PID:700
        • C:\program files\internet explorer\IEXPLORE.EXE
          "C:\program files\internet explorer\IEXPLORE.EXE"
          3⤵
            PID:1680
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\Program Files\Common Files\Microsoft Shared\MSINFO\SetupDel.bat""
          2⤵
          • Deletes itself
          PID:1272

      Network

            MITRE ATT&CK Matrix

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files\Common Files\Microsoft Shared\MSInfo\SetupDel.bat

              Filesize

              184B

              MD5

              cae504e87648e829e68bb5932915fa4f

              SHA1

              d4dd676c274c1bf98f1b9e42f8a888f24f83104b

              SHA256

              0e37029ea9b7f3183b36b4a0e9561f8425858670537f7c671ca69400d54a1dd1

              SHA512

              9197ea4902965ebdc1bd189bd00440da9ed3ddda94df56319b66ebd665a0b91c1006527976d6ba646fac5becf0a7c06e22bd3a1d4e11963aba23eaf1df4dc04d

            • \Program Files\Common Files\Microsoft Shared\MSInfo\rejoice082.exe

              Filesize

              420KB

              MD5

              41e90b9cb286e2be25ac95d3e7180e28

              SHA1

              4bce3594dd2709a9ca1e1a580b022556794f1f2a

              SHA256

              5c32dd84a20a1c892702433f5cad7c0cf14dcf62df6ce5bc3f6ec3afdbaba178

              SHA512

              f5aa04b8903d037d768907698c506a97496f880752671cbd88449f307327a4c9fdbdd46f201e3875bf34aa41a0d496faa10a4d14a1a3083f48e2b43e6b010d9a

            • memory/700-27-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

              Filesize

              4KB

            • memory/1968-20-0x0000000000400000-0x00000000004C103E-memory.dmp

              Filesize

              772KB

            • memory/1968-35-0x0000000000400000-0x00000000004C103E-memory.dmp

              Filesize

              772KB

            • memory/1968-25-0x0000000000240000-0x0000000000241000-memory.dmp

              Filesize

              4KB

            • memory/2792-5-0x0000000000400000-0x00000000004C103E-memory.dmp

              Filesize

              772KB

            • memory/2792-24-0x0000000002010000-0x00000000020D2000-memory.dmp

              Filesize

              776KB

            • memory/2792-18-0x0000000002010000-0x00000000020D2000-memory.dmp

              Filesize

              776KB

            • memory/2792-11-0x0000000000400000-0x00000000004C103E-memory.dmp

              Filesize

              772KB

            • memory/2792-0-0x0000000000400000-0x00000000004C103E-memory.dmp

              Filesize

              772KB

            • memory/2792-4-0x0000000000240000-0x0000000000241000-memory.dmp

              Filesize

              4KB

            • memory/2792-1-0x0000000000400000-0x00000000004C103E-memory.dmp

              Filesize

              772KB

            • memory/2792-42-0x0000000000400000-0x00000000004C103E-memory.dmp

              Filesize

              772KB