Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
24-05-2024 08:50
Static task
static1
Behavioral task
behavioral1
Sample
81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exe
Resource
win10v2004-20240226-en
General
-
Target
81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exe
-
Size
253KB
-
MD5
6d796eb8076512e867bfc7fbbbd185cc
-
SHA1
3123b1b1f2a93ce82f26769b3c4e48c5af031503
-
SHA256
81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3
-
SHA512
7f2b81c24121163c64e0bf648ed366643d2079311ddb3a34e181606d72d56174d3e8c8d3491354612b21df57063c47ae91195b13e35ca858425303ab8a0675c2
-
SSDEEP
3072:KxKNLNEf5scWADv2+DAMKqur5gWrtonM95Jiy/U5rKN20Nn8fLsUYo3F5lA9j:A2coqsSYTgK00Nn8zsW39AJ
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 3 IoCs
Processes:
resource yara_rule behavioral1/memory/2916-2-0x0000000000400000-0x000000000043C000-memory.dmp modiloader_stage2 behavioral1/memory/2916-4-0x0000000000400000-0x000000000043C000-memory.dmp modiloader_stage2 behavioral1/memory/2916-5-0x0000000000400000-0x000000000043C000-memory.dmp modiloader_stage2 -
Suspicious use of SetThreadContext 1 IoCs
Processes:
81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exedescription pid process target process PID 3064 set thread context of 2916 3064 81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exe 81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2516 2916 WerFault.exe 81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exepid process 3064 81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exe81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exedescription pid process target process PID 3064 wrote to memory of 2916 3064 81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exe 81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exe PID 3064 wrote to memory of 2916 3064 81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exe 81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exe PID 3064 wrote to memory of 2916 3064 81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exe 81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exe PID 3064 wrote to memory of 2916 3064 81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exe 81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exe PID 3064 wrote to memory of 2916 3064 81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exe 81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exe PID 3064 wrote to memory of 2916 3064 81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exe 81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exe PID 3064 wrote to memory of 2916 3064 81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exe 81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exe PID 3064 wrote to memory of 2916 3064 81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exe 81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exe PID 3064 wrote to memory of 2916 3064 81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exe 81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exe PID 3064 wrote to memory of 2916 3064 81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exe 81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exe PID 3064 wrote to memory of 2916 3064 81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exe 81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exe PID 3064 wrote to memory of 2916 3064 81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exe 81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exe PID 2916 wrote to memory of 2516 2916 81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exe WerFault.exe PID 2916 wrote to memory of 2516 2916 81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exe WerFault.exe PID 2916 wrote to memory of 2516 2916 81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exe WerFault.exe PID 2916 wrote to memory of 2516 2916 81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exe"C:\Users\Admin\AppData\Local\Temp\81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exe"C:\Users\Admin\AppData\Local\Temp\81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2916 -s 1203⤵
- Program crash