Analysis
-
max time kernel
141s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28-05-2024 14:17
Behavioral task
behavioral1
Sample
63f842dd168caff5a6c32cd15cf8025459489ef15ba7d01b07af13aad3d348c5.dll
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
63f842dd168caff5a6c32cd15cf8025459489ef15ba7d01b07af13aad3d348c5.dll
Resource
win10v2004-20240508-en
General
-
Target
63f842dd168caff5a6c32cd15cf8025459489ef15ba7d01b07af13aad3d348c5.dll
-
Size
284KB
-
MD5
94a4956b383842cfcaadaecf07249f48
-
SHA1
1ff11b9bf098fa173f887d3f66b8066db8027071
-
SHA256
63f842dd168caff5a6c32cd15cf8025459489ef15ba7d01b07af13aad3d348c5
-
SHA512
c40c7e32f21631294a1d29516308db4219a9ed805d39cc4e12023de261f57418ad8c26a062f856bd2ade09a0eaf65da943778ae2e6e302d5d22dc2e6048fcdf1
-
SSDEEP
6144:1Q6PpWjDN4Z+6aB+Cl8VabJO2NRPS1AnWlnrE/HFuilU2pnd1hPWnU0f79uW6E/X:nWjDiDYoB2lhMsw
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 2 IoCs
Processes:
resource yara_rule behavioral2/memory/4040-0-0x00000000005C0000-0x0000000000607000-memory.dmp modiloader_stage2 behavioral2/memory/4040-1-0x00000000005C0000-0x0000000000607000-memory.dmp modiloader_stage2 -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 5036 wrote to memory of 4040 5036 rundll32.exe rundll32.exe PID 5036 wrote to memory of 4040 5036 rundll32.exe rundll32.exe PID 5036 wrote to memory of 4040 5036 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\63f842dd168caff5a6c32cd15cf8025459489ef15ba7d01b07af13aad3d348c5.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\63f842dd168caff5a6c32cd15cf8025459489ef15ba7d01b07af13aad3d348c5.dll,#12⤵