Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 08:50
Static task
static1
Behavioral task
behavioral1
Sample
81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exe
Resource
win10v2004-20240226-en
General
-
Target
81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exe
-
Size
253KB
-
MD5
6d796eb8076512e867bfc7fbbbd185cc
-
SHA1
3123b1b1f2a93ce82f26769b3c4e48c5af031503
-
SHA256
81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3
-
SHA512
7f2b81c24121163c64e0bf648ed366643d2079311ddb3a34e181606d72d56174d3e8c8d3491354612b21df57063c47ae91195b13e35ca858425303ab8a0675c2
-
SSDEEP
3072:KxKNLNEf5scWADv2+DAMKqur5gWrtonM95Jiy/U5rKN20Nn8fLsUYo3F5lA9j:A2coqsSYTgK00Nn8zsW39AJ
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 3 IoCs
Processes:
resource yara_rule behavioral2/memory/4944-2-0x0000000000400000-0x000000000043C000-memory.dmp modiloader_stage2 behavioral2/memory/4944-4-0x0000000000400000-0x000000000043C000-memory.dmp modiloader_stage2 behavioral2/memory/4944-5-0x0000000000400000-0x000000000043C000-memory.dmp modiloader_stage2 -
Suspicious use of SetThreadContext 1 IoCs
Processes:
81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exedescription pid process target process PID 3192 set thread context of 4944 3192 81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exe 81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4380 4944 WerFault.exe 81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exepid process 3192 81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exedescription pid process target process PID 3192 wrote to memory of 4944 3192 81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exe 81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exe PID 3192 wrote to memory of 4944 3192 81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exe 81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exe PID 3192 wrote to memory of 4944 3192 81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exe 81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exe PID 3192 wrote to memory of 4944 3192 81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exe 81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exe PID 3192 wrote to memory of 4944 3192 81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exe 81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exe PID 3192 wrote to memory of 4944 3192 81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exe 81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exe PID 3192 wrote to memory of 4944 3192 81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exe 81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exe PID 3192 wrote to memory of 4944 3192 81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exe 81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exe PID 3192 wrote to memory of 4944 3192 81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exe 81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exe PID 3192 wrote to memory of 4944 3192 81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exe 81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exe PID 3192 wrote to memory of 4944 3192 81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exe 81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exe"C:\Users\Admin\AppData\Local\Temp\81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exe"C:\Users\Admin\AppData\Local\Temp\81d7e9b17f9a1122b2dab1920b4174316656dbbc9504ac35d1202727de5ee4e3.exe"2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4944 -s 2963⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 4944 -ip 49441⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3696 --field-trial-handle=3192,i,2785050981002401924,4037047756083432660,262144 --variations-seed-version /prefetch:81⤵