Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
28-01-2024 21:34
Static task
static1
Behavioral task
behavioral1
Sample
7e0fe4e13b8d2a480d6fbaff31146e52.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7e0fe4e13b8d2a480d6fbaff31146e52.exe
Resource
win10v2004-20231215-en
General
-
Target
7e0fe4e13b8d2a480d6fbaff31146e52.exe
-
Size
208KB
-
MD5
7e0fe4e13b8d2a480d6fbaff31146e52
-
SHA1
5ac7f241001bda88ce19192d3c363cd8784efbdf
-
SHA256
161beb2b60b7ab52e7fef7fadfd369a96ae392d58ba0b3c5b2149bb20a271d0b
-
SHA512
77bf8f808fe92ee430486776bc185d9adafbcfcb52c1eecf980b5a912821a023becd02371af03279321a221f82156b8dc19b94714d9735cdcebd61931c27090a
-
SSDEEP
3072:2tgah3UfzCgI8EGnANZFAk195aDl6qvQrlLKjB6OK92tx/MOZG15t3EdwpDi0BeH:2iahkznANTAk15uGotFwbEqD32Hj
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral1/memory/2020-14-0x0000000000400000-0x0000000000434000-memory.dmp modiloader_stage2 behavioral1/memory/2020-42-0x0000000000400000-0x0000000000434000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 1848 server.exe -
Loads dropped DLL 2 IoCs
pid Process 2020 7e0fe4e13b8d2a480d6fbaff31146e52.exe 2020 7e0fe4e13b8d2a480d6fbaff31146e52.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1848 server.exe 1848 server.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2632 DllHost.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2020 wrote to memory of 1848 2020 7e0fe4e13b8d2a480d6fbaff31146e52.exe 28 PID 2020 wrote to memory of 1848 2020 7e0fe4e13b8d2a480d6fbaff31146e52.exe 28 PID 2020 wrote to memory of 1848 2020 7e0fe4e13b8d2a480d6fbaff31146e52.exe 28 PID 2020 wrote to memory of 1848 2020 7e0fe4e13b8d2a480d6fbaff31146e52.exe 28 PID 1848 wrote to memory of 1340 1848 server.exe 7 PID 1848 wrote to memory of 1340 1848 server.exe 7 PID 1848 wrote to memory of 1340 1848 server.exe 7 PID 1848 wrote to memory of 1340 1848 server.exe 7 PID 1848 wrote to memory of 1340 1848 server.exe 7 PID 1848 wrote to memory of 1340 1848 server.exe 7
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e0fe4e13b8d2a480d6fbaff31146e52.exe"C:\Users\Admin\AppData\Local\Temp\7e0fe4e13b8d2a480d6fbaff31146e52.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1848
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1340
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:2632
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD5f4feda35626896a85b8d4a173601977c
SHA13c91218fbcfbba0eb07f8030625e0a879de4519f
SHA2569e861b106d2a90f9894692820cf56274ed1a015b99a7ee65860fec49100e7778
SHA51201776d5748cd1dc5a14a784c25d65c4e200ce10dda461e44997983707b89568f0d9a2c8699e1ad2ca4f875f241d569cb2790eddbd6cc4d8b1c4607841fce62d2
-
Filesize
28KB
MD59533e658b110decbaaaa2a46548505cf
SHA17654a137fd0c44cdc43f63c70aa210cc6ab58593
SHA256b5fef81ee1dfbc2e12295da3c41ad1deab686c745f15141ea66b31626a69139a
SHA512f7284231e9a5e702e8315a3c89215ece2978f4313d2f110b939fe2d842aff11e6e94206db1d741662fb053dc89899c5e0f741e131ec2408b8f9a4abd791da6e4