Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
05/01/2024, 22:24
Static task
static1
Behavioral task
behavioral1
Sample
449588d9086c6e7426be652cdf4f9ba2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
449588d9086c6e7426be652cdf4f9ba2.exe
Resource
win10v2004-20231222-en
General
-
Target
449588d9086c6e7426be652cdf4f9ba2.exe
-
Size
581KB
-
MD5
449588d9086c6e7426be652cdf4f9ba2
-
SHA1
fc5bf8e069f40b71150669958b5ce6f87d24450a
-
SHA256
e992ed075c75b885810ffebfba3d0d20c9b7be49f3119f500ef4d30304b2c584
-
SHA512
4e0aba30437ae3274b526b6f4ccab3c7df3e6c01fde0400b9324cbf5b06839ee217b9338e1c7e47f5f0a10a21b1cc5b2239caa98fd62f2a47a7d44cbc623a33c
-
SSDEEP
12288:yO1jMK5uQtP1Eep4reZ03grkp5UF3Z4mxx7qJwnjSQIrb0hO9qF/3:yO1pNNbpSenMUQmX7qJwnjXIH0hOm/3
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral1/memory/2408-17-0x0000000000400000-0x000000000054D000-memory.dmp modiloader_stage2 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\FieleWay.txt 449588d9086c6e7426be652cdf4f9ba2.exe -
Program crash 1 IoCs
pid pid_target Process 2692 2408 WerFault.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2408 wrote to memory of 2672 2408 449588d9086c6e7426be652cdf4f9ba2.exe 16 PID 2408 wrote to memory of 2672 2408 449588d9086c6e7426be652cdf4f9ba2.exe 16 PID 2408 wrote to memory of 2672 2408 449588d9086c6e7426be652cdf4f9ba2.exe 16 PID 2408 wrote to memory of 2672 2408 449588d9086c6e7426be652cdf4f9ba2.exe 16 PID 2408 wrote to memory of 2692 2408 449588d9086c6e7426be652cdf4f9ba2.exe 17 PID 2408 wrote to memory of 2692 2408 449588d9086c6e7426be652cdf4f9ba2.exe 17 PID 2408 wrote to memory of 2692 2408 449588d9086c6e7426be652cdf4f9ba2.exe 17 PID 2408 wrote to memory of 2692 2408 449588d9086c6e7426be652cdf4f9ba2.exe 17
Processes
-
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"1⤵PID:2672
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2408 -s 3161⤵
- Program crash
PID:2692
-
C:\Users\Admin\AppData\Local\Temp\449588d9086c6e7426be652cdf4f9ba2.exe"C:\Users\Admin\AppData\Local\Temp\449588d9086c6e7426be652cdf4f9ba2.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2408