Analysis
-
max time kernel
95s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
23-02-2024 23:36
Static task
static1
Behavioral task
behavioral1
Sample
a0a3e5ff158b098e55f3b0b04f1d0e6d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a0a3e5ff158b098e55f3b0b04f1d0e6d.exe
Resource
win10v2004-20240221-en
General
-
Target
a0a3e5ff158b098e55f3b0b04f1d0e6d.exe
-
Size
414KB
-
MD5
a0a3e5ff158b098e55f3b0b04f1d0e6d
-
SHA1
1cb9f0f9a59a1b1616965ca79dbab69da199fdfe
-
SHA256
75c9db42ef25042cecc0f07c8eabc7cb7b4dd50ceed4134e4374fd0588b88b12
-
SHA512
3a7e05589f98bc7dffb855eff469219867b8613ca4cb98d44d60a26345d2b8dda8576889fa80065a3dff09e3b8f40fc113a6c6a1c86630845a5f46d23a47e7fa
-
SSDEEP
12288:m7e+mKm0DWnJ8I3MR3PWjf0lNLZXm8TrA5R:xKnDWR3MR3OT0zZ1TrAX
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral2/memory/3096-3-0x0000000000400000-0x00000000004BE02F-memory.dmp modiloader_stage2 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\SetupWay.txt a0a3e5ff158b098e55f3b0b04f1d0e6d.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3096 wrote to memory of 3076 3096 a0a3e5ff158b098e55f3b0b04f1d0e6d.exe 88 PID 3096 wrote to memory of 3076 3096 a0a3e5ff158b098e55f3b0b04f1d0e6d.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\a0a3e5ff158b098e55f3b0b04f1d0e6d.exe"C:\Users\Admin\AppData\Local\Temp\a0a3e5ff158b098e55f3b0b04f1d0e6d.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"2⤵PID:3076
-