Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    12-02-2024 09:30

General

  • Target

    96d50342db8038f2577817c08e1730f4.exe

  • Size

    586KB

  • MD5

    96d50342db8038f2577817c08e1730f4

  • SHA1

    1c03d3e556783a49e8b1a585fc825ecd5b44bd24

  • SHA256

    2e584ac69793ddbb064043747fa10caf4d969bf6e65d8dfaf68d1302bbb1cfca

  • SHA512

    f4b69d553b673185fe7fb9cc68d687827d98556ef0ae0e37263c66748e2ccd912e9a1f84c23501e1c54ead3119149be35193b43a801d151978259fa82b14489b

  • SSDEEP

    12288:wESTVGNd20hQW85d6F2itF3Z4mxxJ+jAh/078w5jAlCh:toIhQWclitQmXJ+ss7/lAQ

Score
10/10

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\96d50342db8038f2577817c08e1730f4.exe
    "C:\Users\Admin\AppData\Local\Temp\96d50342db8038f2577817c08e1730f4.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1944
    • C:\Windows\SysWOW64\svchost.exe
      "C:\Windows\system32\svchost.exe"
      2⤵
        PID:2988

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1944-2-0x0000000000620000-0x0000000000621000-memory.dmp

      Filesize

      4KB

    • memory/1944-1-0x0000000000280000-0x00000000002D4000-memory.dmp

      Filesize

      336KB

    • memory/1944-3-0x0000000000400000-0x0000000000516000-memory.dmp

      Filesize

      1.1MB

    • memory/1944-5-0x0000000000400000-0x0000000000516000-memory.dmp

      Filesize

      1.1MB

    • memory/1944-6-0x00000000003E0000-0x00000000003E1000-memory.dmp

      Filesize

      4KB

    • memory/1944-4-0x0000000000900000-0x0000000000901000-memory.dmp

      Filesize

      4KB

    • memory/1944-0-0x0000000000400000-0x0000000000516000-memory.dmp

      Filesize

      1.1MB

    • memory/1944-16-0x00000000003E0000-0x00000000003E1000-memory.dmp

      Filesize

      4KB

    • memory/1944-14-0x0000000000400000-0x0000000000516000-memory.dmp

      Filesize

      1.1MB

    • memory/1944-15-0x0000000000280000-0x00000000002D4000-memory.dmp

      Filesize

      336KB

    • memory/2988-10-0x0000000000400000-0x0000000000516000-memory.dmp

      Filesize

      1.1MB

    • memory/2988-12-0x0000000000400000-0x0000000000516000-memory.dmp

      Filesize

      1.1MB

    • memory/2988-8-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB