Analysis

  • max time kernel
    134s
  • max time network
    170s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/01/2024, 23:16

General

  • Target

    51e44b5c11f51dcc5130b0a9d613746e.exe

  • Size

    237KB

  • MD5

    51e44b5c11f51dcc5130b0a9d613746e

  • SHA1

    0817ee1663d3b6911d56011be7f43e7706824682

  • SHA256

    3fb969ec5b0437e97927c84fe97c767efd848ef113dc92c66068477e78d79e30

  • SHA512

    c2b4c35929dc04740a7eeed74cba08ea622f5ac00f43975844d930395028e9906c3e90fda6fdef66b1221093829a3b13862b89756b4d702d15350ce02f4ec26a

  • SSDEEP

    6144:xhepqwiaX7dofMSncBZSNK0cudVSrHMadEJwxCxV+1LKn7AO5uG:+qw2fUBAEujSQCEqxD1LgAO5uG

Score
10/10

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 4 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 4 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\51e44b5c11f51dcc5130b0a9d613746e.exe
    "C:\Users\Admin\AppData\Local\Temp\51e44b5c11f51dcc5130b0a9d613746e.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:4752
    • C:\Windows\SysWOW64\ddos.exe
      C:\Windows\system32\ddos.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      PID:2248
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Windows\system32\Deleteme.bat
      2⤵
        PID:936

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\Deleteme.bat

      Filesize

      184B

      MD5

      b1fec9eaddd71222fdb5a96f6a32dd84

      SHA1

      be1bf5def620e4a0a109ee5a101529c86b11d8f5

      SHA256

      b4e0719401eee5a5dd34657d62e4e834a70cf55c4c14f65d06ceb72f581dceff

      SHA512

      8a687d1b9057ddcadf3f79c67e9d0eb6dc84d1baea8c45a47a7490ec9f28b3cf9835dbca832a5a5dfdf092523f8f669d44311bff0aab469249889407e3a99574

    • C:\Windows\SysWOW64\ddos.exe

      Filesize

      237KB

      MD5

      51e44b5c11f51dcc5130b0a9d613746e

      SHA1

      0817ee1663d3b6911d56011be7f43e7706824682

      SHA256

      3fb969ec5b0437e97927c84fe97c767efd848ef113dc92c66068477e78d79e30

      SHA512

      c2b4c35929dc04740a7eeed74cba08ea622f5ac00f43975844d930395028e9906c3e90fda6fdef66b1221093829a3b13862b89756b4d702d15350ce02f4ec26a

    • memory/2248-10-0x0000000000400000-0x00000000004CA000-memory.dmp

      Filesize

      808KB

    • memory/2248-11-0x0000000002130000-0x0000000002131000-memory.dmp

      Filesize

      4KB

    • memory/2248-13-0x0000000000400000-0x00000000004CA000-memory.dmp

      Filesize

      808KB

    • memory/4752-0-0x0000000000400000-0x00000000004CA000-memory.dmp

      Filesize

      808KB

    • memory/4752-1-0x0000000000770000-0x0000000000771000-memory.dmp

      Filesize

      4KB

    • memory/4752-2-0x0000000000400000-0x00000000004CA000-memory.dmp

      Filesize

      808KB

    • memory/4752-3-0x0000000000400000-0x00000000004CA000-memory.dmp

      Filesize

      808KB

    • memory/4752-4-0x00000000007C0000-0x00000000007C1000-memory.dmp

      Filesize

      4KB

    • memory/4752-15-0x0000000000400000-0x00000000004CA000-memory.dmp

      Filesize

      808KB