Analysis
-
max time kernel
146s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
25/03/2024, 16:17
Static task
static1
Behavioral task
behavioral1
Sample
de6d40168e9392c1f8128e5b174d0b4d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
de6d40168e9392c1f8128e5b174d0b4d.exe
Resource
win10v2004-20240226-en
General
-
Target
de6d40168e9392c1f8128e5b174d0b4d.exe
-
Size
23KB
-
MD5
de6d40168e9392c1f8128e5b174d0b4d
-
SHA1
b7eb7cf4825abfcbfaa61af1214df1bf8cdf213e
-
SHA256
c6fd121e90db71a7178582e8035766ca2a9c20d510fbe9dffb6458dd177b221d
-
SHA512
121a0a596cf400efdf7eb118ff7ac1063fb0ec9c53086a36d0e11c6fe9a1a26a58de34860eb813fc3368aa19d8e373e17975a961bc0906ed98908160a1993e89
-
SSDEEP
384:Iw4fzQLNQUWfe8y8nvYcMLg65RDtL+Y/N06keOhxzjzixX4yNATufgjoWPVeI:SfzQxtJ83vYcMLvnDxx/N6nhxvmxoy+x
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 5 IoCs
resource yara_rule behavioral2/memory/2720-6-0x00000000008D0000-0x00000000008DE000-memory.dmp modiloader_stage2 behavioral2/files/0x000800000002331e-5.dat modiloader_stage2 behavioral2/memory/2720-9-0x00000000008D0000-0x00000000008DE000-memory.dmp modiloader_stage2 behavioral2/memory/2720-11-0x0000000000400000-0x0000000000424000-memory.dmp modiloader_stage2 behavioral2/memory/2720-23-0x00000000008D0000-0x00000000008DE000-memory.dmp modiloader_stage2 -
Loads dropped DLL 2 IoCs
pid Process 2720 de6d40168e9392c1f8128e5b174d0b4d.exe 2720 de6d40168e9392c1f8128e5b174d0b4d.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\SysWFGwd2.dll de6d40168e9392c1f8128e5b174d0b4d.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2720 de6d40168e9392c1f8128e5b174d0b4d.exe 2720 de6d40168e9392c1f8128e5b174d0b4d.exe 2720 de6d40168e9392c1f8128e5b174d0b4d.exe 2720 de6d40168e9392c1f8128e5b174d0b4d.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2720 de6d40168e9392c1f8128e5b174d0b4d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\de6d40168e9392c1f8128e5b174d0b4d.exe"C:\Users\Admin\AppData\Local\Temp\de6d40168e9392c1f8128e5b174d0b4d.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2720
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3820 --field-trial-handle=2496,i,15897292497548307209,13920214570023230813,262144 --variations-seed-version /prefetch:81⤵PID:1456
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD5b868b09a89a9b5ace5cc0dceae06cddb
SHA1145d6a3a4d652b46abbe35d1d2b5940fe033267f
SHA2562d93a754cc333d7f00dcfece199c2a15d617d1611bda135ebaf5bbc2974c5366
SHA512d03a241aa7211180c85ecf53adf03814f54b9c9857b2670ae51f3c1f5032be5c8fe2e510d668f8e65d8155554d7809f655e99510a52b10eca0908632a51b2846