Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
08/01/2024, 22:54
Static task
static1
Behavioral task
behavioral1
Sample
4cab603af94ed3047e42a284a535d415.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4cab603af94ed3047e42a284a535d415.exe
Resource
win10v2004-20231215-en
General
-
Target
4cab603af94ed3047e42a284a535d415.exe
-
Size
579KB
-
MD5
4cab603af94ed3047e42a284a535d415
-
SHA1
c15c9e26bf6df69162ca4a664809ef76d0562e37
-
SHA256
f4cd37ddc7e2fd3a0cbb20a080d1aa31a311968585177d5f763ed4eead0b0322
-
SHA512
e2386acb702ee73b0ed5d5b48dabf7ad13fd9f781b956b24b733d3656a7a95413ca5f020e73afcabe8694c70f18b71ffb352b878381b305fdf178d3f99cfacaf
-
SSDEEP
12288:GBNqc2sUQvNi2+m0ilhXWjeZKwF3Z4mxxN4IxSo62jDrkAc:GCLsliHeX6eowQmXNsohkr
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral1/memory/2492-13-0x0000000000400000-0x0000000000551000-memory.dmp modiloader_stage2 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\FieleWay.txt 4cab603af94ed3047e42a284a535d415.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2184 2492 WerFault.exe 18 -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2492 wrote to memory of 2660 2492 4cab603af94ed3047e42a284a535d415.exe 28 PID 2492 wrote to memory of 2660 2492 4cab603af94ed3047e42a284a535d415.exe 28 PID 2492 wrote to memory of 2660 2492 4cab603af94ed3047e42a284a535d415.exe 28 PID 2492 wrote to memory of 2660 2492 4cab603af94ed3047e42a284a535d415.exe 28 PID 2492 wrote to memory of 2184 2492 4cab603af94ed3047e42a284a535d415.exe 29 PID 2492 wrote to memory of 2184 2492 4cab603af94ed3047e42a284a535d415.exe 29 PID 2492 wrote to memory of 2184 2492 4cab603af94ed3047e42a284a535d415.exe 29 PID 2492 wrote to memory of 2184 2492 4cab603af94ed3047e42a284a535d415.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\4cab603af94ed3047e42a284a535d415.exe"C:\Users\Admin\AppData\Local\Temp\4cab603af94ed3047e42a284a535d415.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"2⤵PID:2660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2492 -s 3162⤵
- Program crash
PID:2184
-