Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
26-05-2024 03:06
Behavioral task
behavioral1
Sample
cd48e197d765c765a1cafd60762e51c4e021191d64bddbb2cdcfee3975788740.dll
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
cd48e197d765c765a1cafd60762e51c4e021191d64bddbb2cdcfee3975788740.dll
Resource
win10v2004-20240426-en
General
-
Target
cd48e197d765c765a1cafd60762e51c4e021191d64bddbb2cdcfee3975788740.dll
-
Size
144KB
-
MD5
851c08df406454b94f69234408e1c1f0
-
SHA1
68100c75878ce7dd6fe66a68ab95f05a65857602
-
SHA256
cd48e197d765c765a1cafd60762e51c4e021191d64bddbb2cdcfee3975788740
-
SHA512
7713cb6805d88c61076a6b82f445ec7a02e31a968b1d7a6a5f3c62043a61c533d5c4b9f91ac1f75e05e21fb42a917adde1b70941f02a9c433c1341743c735a2d
-
SSDEEP
3072:pWQhfw25OtOj/1c/8GJI2v874kKRtX24rzbK02qY+ivrWz:pW52sCcH61Q24HO02qY+iq
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2888-0-0x0000000000100000-0x000000000012C000-memory.dmp modiloader_stage2 behavioral1/memory/2888-1-0x0000000000100000-0x000000000012C000-memory.dmp modiloader_stage2 -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2488 2888 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 2012 wrote to memory of 2888 2012 rundll32.exe rundll32.exe PID 2012 wrote to memory of 2888 2012 rundll32.exe rundll32.exe PID 2012 wrote to memory of 2888 2012 rundll32.exe rundll32.exe PID 2012 wrote to memory of 2888 2012 rundll32.exe rundll32.exe PID 2012 wrote to memory of 2888 2012 rundll32.exe rundll32.exe PID 2012 wrote to memory of 2888 2012 rundll32.exe rundll32.exe PID 2012 wrote to memory of 2888 2012 rundll32.exe rundll32.exe PID 2888 wrote to memory of 2488 2888 rundll32.exe WerFault.exe PID 2888 wrote to memory of 2488 2888 rundll32.exe WerFault.exe PID 2888 wrote to memory of 2488 2888 rundll32.exe WerFault.exe PID 2888 wrote to memory of 2488 2888 rundll32.exe WerFault.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cd48e197d765c765a1cafd60762e51c4e021191d64bddbb2cdcfee3975788740.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cd48e197d765c765a1cafd60762e51c4e021191d64bddbb2cdcfee3975788740.dll,#12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2888 -s 2483⤵
- Program crash