Analysis
-
max time kernel
141s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28-01-2024 07:55
Behavioral task
behavioral1
Sample
7c91f57e9c8c1b2216662d4e70deef82.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7c91f57e9c8c1b2216662d4e70deef82.exe
Resource
win10v2004-20231215-en
General
-
Target
7c91f57e9c8c1b2216662d4e70deef82.exe
-
Size
47KB
-
MD5
7c91f57e9c8c1b2216662d4e70deef82
-
SHA1
405c75f3f29145ab85baadf5960f5aa8f4ff945c
-
SHA256
2a450f60c215eac864468cf757d1dfe3d6db2e772ff75cbbcd3c3c02c282d9cf
-
SHA512
854d7797e59b1606efa858c41ebadfd4535c86e60993e3ac921f267fd9cce49e0f6f3458b9e852a3849de79506acf7a80c30dc54ba0d1026f30d097e0736ffbb
-
SSDEEP
768:GVhwVJXmsuBlNxZOPFNdRCuNqdSSQ57uf1WyDgXKcNDPhBkuI1IR:Qhulp6zxZO9Nd46qYSQ5Swy86cNDPEVa
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 3 IoCs
resource yara_rule behavioral2/memory/3948-19-0x0000000000400000-0x0000000000420000-memory.dmp modiloader_stage2 behavioral2/memory/4452-17-0x0000000000400000-0x0000000000420000-memory.dmp modiloader_stage2 behavioral2/memory/4452-20-0x0000000000400000-0x0000000000420000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 4452 WinRaR.exe -
Loads dropped DLL 2 IoCs
pid Process 4452 WinRaR.exe 4452 WinRaR.exe -
resource yara_rule behavioral2/memory/3948-0-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/3948-19-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/4452-17-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/files/0x00070000000231f3-9.dat upx behavioral2/memory/4452-20-0x0000000000400000-0x0000000000420000-memory.dmp upx -
Drops file in Windows directory 7 IoCs
description ioc Process File opened for modification C:\Windows\WinRaR\ 7c91f57e9c8c1b2216662d4e70deef82.exe File created C:\Windows\WinRaR\WinRaR.exe 7c91f57e9c8c1b2216662d4e70deef82.exe File opened for modification C:\Windows\WinRaR\WinRaR.exe 7c91f57e9c8c1b2216662d4e70deef82.exe File created C:\Windows\WinRaR\WinRaR.dll 7c91f57e9c8c1b2216662d4e70deef82.exe File opened for modification C:\Windows\WinRaR\ WinRaR.exe File created C:\Windows\WinRaR\WinRaR.exe WinRaR.exe File created C:\Windows\WinRaR\WinRaR.dll WinRaR.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeBackupPrivilege 3948 7c91f57e9c8c1b2216662d4e70deef82.exe Token: SeRestorePrivilege 3948 7c91f57e9c8c1b2216662d4e70deef82.exe Token: SeBackupPrivilege 3948 7c91f57e9c8c1b2216662d4e70deef82.exe Token: SeRestorePrivilege 3948 7c91f57e9c8c1b2216662d4e70deef82.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4452 WinRaR.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3948 wrote to memory of 4452 3948 7c91f57e9c8c1b2216662d4e70deef82.exe 56 PID 3948 wrote to memory of 4452 3948 7c91f57e9c8c1b2216662d4e70deef82.exe 56 PID 3948 wrote to memory of 4452 3948 7c91f57e9c8c1b2216662d4e70deef82.exe 56
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c91f57e9c8c1b2216662d4e70deef82.exe"C:\Users\Admin\AppData\Local\Temp\7c91f57e9c8c1b2216662d4e70deef82.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Windows\WinRaR\WinRaR.exeC:\Windows\WinRaR\WinRaR.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:4452
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25KB
MD5f6d1588a70559ba8f57eefd10c3f9878
SHA10712011ad8e6e07b590e912edca9ca7425b617ef
SHA25611f491aeb909d3f22c977258738848b1655814f5b9d8c1e69052a42aca9065b5
SHA51234b29b61fbc4fd1382aacbeaa07dea4fbf1061aafd17525036d8cc6776c23227d229733b475c9c8139b458a558527615c59d83e47f2e7e44abcf7abe85e0d8d8
-
Filesize
47KB
MD57c91f57e9c8c1b2216662d4e70deef82
SHA1405c75f3f29145ab85baadf5960f5aa8f4ff945c
SHA2562a450f60c215eac864468cf757d1dfe3d6db2e772ff75cbbcd3c3c02c282d9cf
SHA512854d7797e59b1606efa858c41ebadfd4535c86e60993e3ac921f267fd9cce49e0f6f3458b9e852a3849de79506acf7a80c30dc54ba0d1026f30d097e0736ffbb