Analysis
-
max time kernel
134s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
10/01/2024, 23:16
Static task
static1
Behavioral task
behavioral1
Sample
51e44b5c11f51dcc5130b0a9d613746e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
51e44b5c11f51dcc5130b0a9d613746e.exe
Resource
win10v2004-20231215-en
General
-
Target
51e44b5c11f51dcc5130b0a9d613746e.exe
-
Size
237KB
-
MD5
51e44b5c11f51dcc5130b0a9d613746e
-
SHA1
0817ee1663d3b6911d56011be7f43e7706824682
-
SHA256
3fb969ec5b0437e97927c84fe97c767efd848ef113dc92c66068477e78d79e30
-
SHA512
c2b4c35929dc04740a7eeed74cba08ea622f5ac00f43975844d930395028e9906c3e90fda6fdef66b1221093829a3b13862b89756b4d702d15350ce02f4ec26a
-
SSDEEP
6144:xhepqwiaX7dofMSncBZSNK0cudVSrHMadEJwxCxV+1LKn7AO5uG:+qw2fUBAEujSQCEqxD1LgAO5uG
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 4 IoCs
resource yara_rule behavioral2/memory/4752-2-0x0000000000400000-0x00000000004CA000-memory.dmp modiloader_stage2 behavioral2/memory/2248-10-0x0000000000400000-0x00000000004CA000-memory.dmp modiloader_stage2 behavioral2/memory/2248-13-0x0000000000400000-0x00000000004CA000-memory.dmp modiloader_stage2 behavioral2/memory/4752-15-0x0000000000400000-0x00000000004CA000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 2248 ddos.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\ddos.exe 51e44b5c11f51dcc5130b0a9d613746e.exe File opened for modification C:\Windows\SysWOW64\ddos.exe 51e44b5c11f51dcc5130b0a9d613746e.exe File opened for modification C:\Windows\SysWOW64\ddos.exe ddos.exe File created C:\Windows\SysWOW64\Deleteme.bat 51e44b5c11f51dcc5130b0a9d613746e.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4752 wrote to memory of 2248 4752 51e44b5c11f51dcc5130b0a9d613746e.exe 95 PID 4752 wrote to memory of 2248 4752 51e44b5c11f51dcc5130b0a9d613746e.exe 95 PID 4752 wrote to memory of 2248 4752 51e44b5c11f51dcc5130b0a9d613746e.exe 95 PID 4752 wrote to memory of 936 4752 51e44b5c11f51dcc5130b0a9d613746e.exe 96 PID 4752 wrote to memory of 936 4752 51e44b5c11f51dcc5130b0a9d613746e.exe 96 PID 4752 wrote to memory of 936 4752 51e44b5c11f51dcc5130b0a9d613746e.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\51e44b5c11f51dcc5130b0a9d613746e.exe"C:\Users\Admin\AppData\Local\Temp\51e44b5c11f51dcc5130b0a9d613746e.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Windows\SysWOW64\ddos.exeC:\Windows\system32\ddos.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2248
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\Deleteme.bat2⤵PID:936
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184B
MD5b1fec9eaddd71222fdb5a96f6a32dd84
SHA1be1bf5def620e4a0a109ee5a101529c86b11d8f5
SHA256b4e0719401eee5a5dd34657d62e4e834a70cf55c4c14f65d06ceb72f581dceff
SHA5128a687d1b9057ddcadf3f79c67e9d0eb6dc84d1baea8c45a47a7490ec9f28b3cf9835dbca832a5a5dfdf092523f8f669d44311bff0aab469249889407e3a99574
-
Filesize
237KB
MD551e44b5c11f51dcc5130b0a9d613746e
SHA10817ee1663d3b6911d56011be7f43e7706824682
SHA2563fb969ec5b0437e97927c84fe97c767efd848ef113dc92c66068477e78d79e30
SHA512c2b4c35929dc04740a7eeed74cba08ea622f5ac00f43975844d930395028e9906c3e90fda6fdef66b1221093829a3b13862b89756b4d702d15350ce02f4ec26a