Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
06-06-2024 12:20
Static task
static1
Behavioral task
behavioral1
Sample
7395837492.cmd
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7395837492.cmd
Resource
win10v2004-20240508-en
General
-
Target
7395837492.cmd
-
Size
3.4MB
-
MD5
cc1abc1560d882d5b80ddba1847edf14
-
SHA1
5204ae55dbca8042c18664647618c41758464a0f
-
SHA256
e604eca34f7f438d53b775960ec8ae63d1dbc0472338a3a567d5587b4dfeb71c
-
SHA512
278f10a605c5b19ef62de2e435432e8a1d66cb45873c8b8b5ac0beb04416a365ee57ff2a4dc320e940f36fe5a8e4d5dc0b2ab0302ef475bfeaae6932c542467a
-
SSDEEP
49152:wPqmKNNBLnfBMC+YWrAxOdxVFC/X4/T22ywslPINz/yAScxVss:8
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 60 IoCs
Processes:
resource yara_rule behavioral1/memory/1712-34-0x0000000003170000-0x0000000004170000-memory.dmp modiloader_stage2 behavioral1/memory/1712-37-0x0000000003170000-0x0000000004170000-memory.dmp modiloader_stage2 behavioral1/memory/1712-35-0x0000000003170000-0x0000000004170000-memory.dmp modiloader_stage2 behavioral1/memory/1712-36-0x0000000003170000-0x0000000004170000-memory.dmp modiloader_stage2 behavioral1/memory/1712-33-0x0000000003170000-0x0000000004170000-memory.dmp modiloader_stage2 behavioral1/memory/1712-42-0x0000000003170000-0x0000000004170000-memory.dmp modiloader_stage2 behavioral1/memory/1712-43-0x0000000003170000-0x0000000004170000-memory.dmp modiloader_stage2 behavioral1/memory/1712-39-0x0000000003170000-0x0000000004170000-memory.dmp modiloader_stage2 behavioral1/memory/1712-41-0x0000000003170000-0x0000000004170000-memory.dmp modiloader_stage2 behavioral1/memory/1712-40-0x0000000003170000-0x0000000004170000-memory.dmp modiloader_stage2 behavioral1/memory/1712-47-0x0000000003170000-0x0000000004170000-memory.dmp modiloader_stage2 behavioral1/memory/1712-48-0x0000000003170000-0x0000000004170000-memory.dmp modiloader_stage2 behavioral1/memory/1712-50-0x0000000003170000-0x0000000004170000-memory.dmp modiloader_stage2 behavioral1/memory/1712-46-0x0000000003170000-0x0000000004170000-memory.dmp modiloader_stage2 behavioral1/memory/1712-49-0x0000000003170000-0x0000000004170000-memory.dmp modiloader_stage2 behavioral1/memory/1712-52-0x0000000003170000-0x0000000004170000-memory.dmp modiloader_stage2 behavioral1/memory/1712-56-0x0000000003170000-0x0000000004170000-memory.dmp modiloader_stage2 behavioral1/memory/1712-54-0x0000000003170000-0x0000000004170000-memory.dmp modiloader_stage2 behavioral1/memory/1712-55-0x0000000003170000-0x0000000004170000-memory.dmp modiloader_stage2 behavioral1/memory/1712-53-0x0000000003170000-0x0000000004170000-memory.dmp modiloader_stage2 behavioral1/memory/1712-59-0x0000000003170000-0x0000000004170000-memory.dmp modiloader_stage2 behavioral1/memory/1712-84-0x0000000003170000-0x0000000004170000-memory.dmp modiloader_stage2 behavioral1/memory/1712-69-0x0000000003170000-0x0000000004170000-memory.dmp modiloader_stage2 behavioral1/memory/1712-66-0x0000000003170000-0x0000000004170000-memory.dmp modiloader_stage2 behavioral1/memory/1712-65-0x0000000003170000-0x0000000004170000-memory.dmp modiloader_stage2 behavioral1/memory/1712-64-0x0000000003170000-0x0000000004170000-memory.dmp modiloader_stage2 behavioral1/memory/1712-124-0x0000000003170000-0x0000000004170000-memory.dmp modiloader_stage2 behavioral1/memory/1712-122-0x0000000003170000-0x0000000004170000-memory.dmp modiloader_stage2 behavioral1/memory/1712-120-0x0000000003170000-0x0000000004170000-memory.dmp modiloader_stage2 behavioral1/memory/1712-117-0x0000000003170000-0x0000000004170000-memory.dmp modiloader_stage2 behavioral1/memory/1712-115-0x0000000003170000-0x0000000004170000-memory.dmp modiloader_stage2 behavioral1/memory/1712-113-0x0000000003170000-0x0000000004170000-memory.dmp modiloader_stage2 behavioral1/memory/1712-111-0x0000000003170000-0x0000000004170000-memory.dmp modiloader_stage2 behavioral1/memory/1712-109-0x0000000003170000-0x0000000004170000-memory.dmp modiloader_stage2 behavioral1/memory/1712-107-0x0000000003170000-0x0000000004170000-memory.dmp modiloader_stage2 behavioral1/memory/1712-104-0x0000000003170000-0x0000000004170000-memory.dmp modiloader_stage2 behavioral1/memory/1712-103-0x0000000003170000-0x0000000004170000-memory.dmp modiloader_stage2 behavioral1/memory/1712-101-0x0000000003170000-0x0000000004170000-memory.dmp modiloader_stage2 behavioral1/memory/1712-100-0x0000000003170000-0x0000000004170000-memory.dmp modiloader_stage2 behavioral1/memory/1712-97-0x0000000003170000-0x0000000004170000-memory.dmp modiloader_stage2 behavioral1/memory/1712-95-0x0000000003170000-0x0000000004170000-memory.dmp modiloader_stage2 behavioral1/memory/1712-93-0x0000000003170000-0x0000000004170000-memory.dmp modiloader_stage2 behavioral1/memory/1712-91-0x0000000003170000-0x0000000004170000-memory.dmp modiloader_stage2 behavioral1/memory/1712-89-0x0000000003170000-0x0000000004170000-memory.dmp modiloader_stage2 behavioral1/memory/1712-87-0x0000000003170000-0x0000000004170000-memory.dmp modiloader_stage2 behavioral1/memory/1712-83-0x0000000003170000-0x0000000004170000-memory.dmp modiloader_stage2 behavioral1/memory/1712-81-0x0000000003170000-0x0000000004170000-memory.dmp modiloader_stage2 behavioral1/memory/1712-78-0x0000000003170000-0x0000000004170000-memory.dmp modiloader_stage2 behavioral1/memory/1712-76-0x0000000003170000-0x0000000004170000-memory.dmp modiloader_stage2 behavioral1/memory/1712-74-0x0000000003170000-0x0000000004170000-memory.dmp modiloader_stage2 behavioral1/memory/1712-72-0x0000000003170000-0x0000000004170000-memory.dmp modiloader_stage2 behavioral1/memory/1712-70-0x0000000003170000-0x0000000004170000-memory.dmp modiloader_stage2 behavioral1/memory/1712-68-0x0000000003170000-0x0000000004170000-memory.dmp modiloader_stage2 behavioral1/memory/1712-67-0x0000000003170000-0x0000000004170000-memory.dmp modiloader_stage2 behavioral1/memory/1712-57-0x0000000003170000-0x0000000004170000-memory.dmp modiloader_stage2 behavioral1/memory/1712-63-0x0000000003170000-0x0000000004170000-memory.dmp modiloader_stage2 behavioral1/memory/1712-62-0x0000000003170000-0x0000000004170000-memory.dmp modiloader_stage2 behavioral1/memory/1712-61-0x0000000003170000-0x0000000004170000-memory.dmp modiloader_stage2 behavioral1/memory/1712-60-0x0000000003170000-0x0000000004170000-memory.dmp modiloader_stage2 behavioral1/memory/1712-58-0x0000000003170000-0x0000000004170000-memory.dmp modiloader_stage2 -
Executes dropped EXE 8 IoCs
Processes:
alpha.exealpha.exekn.exealpha.exekn.exeAudio.pifalpha.exealpha.exepid process 2064 alpha.exe 2288 alpha.exe 2712 kn.exe 2756 alpha.exe 2616 kn.exe 1712 Audio.pif 2760 alpha.exe 2648 alpha.exe -
Loads dropped DLL 9 IoCs
Processes:
cmd.exealpha.exealpha.exeWerFault.exepid process 2364 cmd.exe 2364 cmd.exe 2288 alpha.exe 2364 cmd.exe 2756 alpha.exe 2364 cmd.exe 2364 cmd.exe 1628 WerFault.exe 1628 WerFault.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1628 1712 WerFault.exe Audio.pif -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
Processes:
Audio.pifpid process 1712 Audio.pif -
Suspicious use of WriteProcessMemory 35 IoCs
Processes:
cmd.exealpha.exealpha.exealpha.exeAudio.pifdescription pid process target process PID 2364 wrote to memory of 2380 2364 cmd.exe extrac32.exe PID 2364 wrote to memory of 2380 2364 cmd.exe extrac32.exe PID 2364 wrote to memory of 2380 2364 cmd.exe extrac32.exe PID 2364 wrote to memory of 2064 2364 cmd.exe alpha.exe PID 2364 wrote to memory of 2064 2364 cmd.exe alpha.exe PID 2364 wrote to memory of 2064 2364 cmd.exe alpha.exe PID 2064 wrote to memory of 1912 2064 alpha.exe extrac32.exe PID 2064 wrote to memory of 1912 2064 alpha.exe extrac32.exe PID 2064 wrote to memory of 1912 2064 alpha.exe extrac32.exe PID 2364 wrote to memory of 2288 2364 cmd.exe alpha.exe PID 2364 wrote to memory of 2288 2364 cmd.exe alpha.exe PID 2364 wrote to memory of 2288 2364 cmd.exe alpha.exe PID 2288 wrote to memory of 2712 2288 alpha.exe kn.exe PID 2288 wrote to memory of 2712 2288 alpha.exe kn.exe PID 2288 wrote to memory of 2712 2288 alpha.exe kn.exe PID 2364 wrote to memory of 2756 2364 cmd.exe alpha.exe PID 2364 wrote to memory of 2756 2364 cmd.exe alpha.exe PID 2364 wrote to memory of 2756 2364 cmd.exe alpha.exe PID 2756 wrote to memory of 2616 2756 alpha.exe kn.exe PID 2756 wrote to memory of 2616 2756 alpha.exe kn.exe PID 2756 wrote to memory of 2616 2756 alpha.exe kn.exe PID 2364 wrote to memory of 1712 2364 cmd.exe Audio.pif PID 2364 wrote to memory of 1712 2364 cmd.exe Audio.pif PID 2364 wrote to memory of 1712 2364 cmd.exe Audio.pif PID 2364 wrote to memory of 1712 2364 cmd.exe Audio.pif PID 2364 wrote to memory of 2760 2364 cmd.exe alpha.exe PID 2364 wrote to memory of 2760 2364 cmd.exe alpha.exe PID 2364 wrote to memory of 2760 2364 cmd.exe alpha.exe PID 2364 wrote to memory of 2648 2364 cmd.exe alpha.exe PID 2364 wrote to memory of 2648 2364 cmd.exe alpha.exe PID 2364 wrote to memory of 2648 2364 cmd.exe alpha.exe PID 1712 wrote to memory of 1628 1712 Audio.pif WerFault.exe PID 1712 wrote to memory of 1628 1712 Audio.pif WerFault.exe PID 1712 wrote to memory of 1628 1712 Audio.pif WerFault.exe PID 1712 wrote to memory of 1628 1712 Audio.pif WerFault.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7395837492.cmd"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\extrac32.exeC:\\Windows\\System32\\extrac32 /C /Y C:\\Windows\\System32\\cmd.exe "C:\\Users\\Public\\alpha.exe"2⤵
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c extrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\extrac32.exeextrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe3⤵
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c C:\\Users\\Public\\kn -decodehex -F "C:\Users\Admin\AppData\Local\Temp\7395837492.cmd" "C:\\Users\\Public\\Audio.mp4" 92⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Public\kn.exeC:\\Users\\Public\\kn -decodehex -F "C:\Users\Admin\AppData\Local\Temp\7395837492.cmd" "C:\\Users\\Public\\Audio.mp4" 93⤵
- Executes dropped EXE
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c C:\\Users\\Public\\kn -decodehex -F "C:\\Users\\Public\\Audio.mp4" "C:\\Users\\Public\\Libraries\\Audio.pif" 122⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Public\kn.exeC:\\Users\\Public\\kn -decodehex -F "C:\\Users\\Public\\Audio.mp4" "C:\\Users\\Public\\Libraries\\Audio.pif" 123⤵
- Executes dropped EXE
-
C:\Users\Public\Libraries\Audio.pifC:\Users\Public\Libraries\Audio.pif2⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1712 -s 6963⤵
- Loads dropped DLL
- Program crash
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c del /q "C:\Users\Public\kn.exe" / A / F / Q / S2⤵
- Executes dropped EXE
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c del /q "C:\Users\Public\Audio.mp4" / A / F / Q / S2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Public\Audio.mp4Filesize
2.4MB
MD57419c06138aa4d9692adfc1399731e94
SHA1762a2bf5e36ecf4fda2552fd466bd0e058d29ea9
SHA256cc6c5e8ef9f60533c5b983545f0036abad1320f894aff3250ec528e55d5fb8f4
SHA5121b4344b44bb5ee9f21a94cc5a7b4e4ebf4741404660de2da70b8504c95ebb4f6572e221ceaf93b6865869f6a78092958b8f9a3dd233dfb5d20afd99e81e6b7a0
-
C:\Users\Public\Libraries\Audio.pifFilesize
1.2MB
MD525d0f1e403cf2130097ae11f9ff493cd
SHA19e3d4e7062e8fff5951018062f471b5b902674c1
SHA2563d9e028b26eacd6302e1a2e6e1914ec9f6ca76824eafbf2ff0cd35be22fbefec
SHA512f3d5755e3848f9a2b004d65f8357dcaa11b07d74b8603ed59baba7325e528ac7252d682d7f1c8334948f88b70746fd7b90ee89eadec2bafe2369586852d86f26
-
\Users\Public\alpha.exeFilesize
337KB
MD55746bd7e255dd6a8afa06f7c42c1ba41
SHA10f3c4ff28f354aede202d54e9d1c5529a3bf87d8
SHA256db06c3534964e3fc79d2763144ba53742d7fa250ca336f4a0fe724b75aaff386
SHA5123a968356d7b94cc014f78ca37a3c03f354c3970c9e027ed4ccb8e59f0f9f2a32bfa22e7d6b127d44631d715ea41bf8ace91f0b4d69d1714d55552b064ffeb69e
-
\Users\Public\kn.exeFilesize
1.1MB
MD5ec1fd3050dbc40ec7e87ab99c7ca0b03
SHA1ae7fdfc29f4ef31e38ebf381e61b503038b5cb35
SHA2561e19c5a26215b62de1babd5633853344420c1e673bb83e8a89213085e17e16e3
SHA5124e47331f2fdce77b01d86cf8e21cd7d6df13536f09b70c53e5a6b82f66512faa10e38645884c696b47a27ea6bddc6c1fdb905ee78684dca98cbda5f39fbafcc2
-
memory/1712-34-0x0000000003170000-0x0000000004170000-memory.dmpFilesize
16.0MB
-
memory/1712-37-0x0000000003170000-0x0000000004170000-memory.dmpFilesize
16.0MB
-
memory/1712-35-0x0000000003170000-0x0000000004170000-memory.dmpFilesize
16.0MB
-
memory/1712-36-0x0000000003170000-0x0000000004170000-memory.dmpFilesize
16.0MB
-
memory/1712-33-0x0000000003170000-0x0000000004170000-memory.dmpFilesize
16.0MB
-
memory/1712-38-0x0000000000400000-0x0000000000536000-memory.dmpFilesize
1.2MB
-
memory/1712-42-0x0000000003170000-0x0000000004170000-memory.dmpFilesize
16.0MB
-
memory/1712-43-0x0000000003170000-0x0000000004170000-memory.dmpFilesize
16.0MB
-
memory/1712-39-0x0000000003170000-0x0000000004170000-memory.dmpFilesize
16.0MB
-
memory/1712-41-0x0000000003170000-0x0000000004170000-memory.dmpFilesize
16.0MB
-
memory/1712-40-0x0000000003170000-0x0000000004170000-memory.dmpFilesize
16.0MB
-
memory/1712-47-0x0000000003170000-0x0000000004170000-memory.dmpFilesize
16.0MB
-
memory/1712-48-0x0000000003170000-0x0000000004170000-memory.dmpFilesize
16.0MB
-
memory/1712-50-0x0000000003170000-0x0000000004170000-memory.dmpFilesize
16.0MB
-
memory/1712-46-0x0000000003170000-0x0000000004170000-memory.dmpFilesize
16.0MB
-
memory/1712-49-0x0000000003170000-0x0000000004170000-memory.dmpFilesize
16.0MB
-
memory/1712-52-0x0000000003170000-0x0000000004170000-memory.dmpFilesize
16.0MB
-
memory/1712-56-0x0000000003170000-0x0000000004170000-memory.dmpFilesize
16.0MB
-
memory/1712-54-0x0000000003170000-0x0000000004170000-memory.dmpFilesize
16.0MB
-
memory/1712-55-0x0000000003170000-0x0000000004170000-memory.dmpFilesize
16.0MB
-
memory/1712-53-0x0000000003170000-0x0000000004170000-memory.dmpFilesize
16.0MB
-
memory/1712-59-0x0000000003170000-0x0000000004170000-memory.dmpFilesize
16.0MB
-
memory/1712-84-0x0000000003170000-0x0000000004170000-memory.dmpFilesize
16.0MB
-
memory/1712-69-0x0000000003170000-0x0000000004170000-memory.dmpFilesize
16.0MB
-
memory/1712-66-0x0000000003170000-0x0000000004170000-memory.dmpFilesize
16.0MB
-
memory/1712-65-0x0000000003170000-0x0000000004170000-memory.dmpFilesize
16.0MB
-
memory/1712-64-0x0000000003170000-0x0000000004170000-memory.dmpFilesize
16.0MB
-
memory/1712-124-0x0000000003170000-0x0000000004170000-memory.dmpFilesize
16.0MB
-
memory/1712-122-0x0000000003170000-0x0000000004170000-memory.dmpFilesize
16.0MB
-
memory/1712-120-0x0000000003170000-0x0000000004170000-memory.dmpFilesize
16.0MB
-
memory/1712-117-0x0000000003170000-0x0000000004170000-memory.dmpFilesize
16.0MB
-
memory/1712-115-0x0000000003170000-0x0000000004170000-memory.dmpFilesize
16.0MB
-
memory/1712-113-0x0000000003170000-0x0000000004170000-memory.dmpFilesize
16.0MB
-
memory/1712-111-0x0000000003170000-0x0000000004170000-memory.dmpFilesize
16.0MB
-
memory/1712-109-0x0000000003170000-0x0000000004170000-memory.dmpFilesize
16.0MB
-
memory/1712-107-0x0000000003170000-0x0000000004170000-memory.dmpFilesize
16.0MB
-
memory/1712-104-0x0000000003170000-0x0000000004170000-memory.dmpFilesize
16.0MB
-
memory/1712-103-0x0000000003170000-0x0000000004170000-memory.dmpFilesize
16.0MB
-
memory/1712-101-0x0000000003170000-0x0000000004170000-memory.dmpFilesize
16.0MB
-
memory/1712-100-0x0000000003170000-0x0000000004170000-memory.dmpFilesize
16.0MB
-
memory/1712-97-0x0000000003170000-0x0000000004170000-memory.dmpFilesize
16.0MB
-
memory/1712-95-0x0000000003170000-0x0000000004170000-memory.dmpFilesize
16.0MB
-
memory/1712-93-0x0000000003170000-0x0000000004170000-memory.dmpFilesize
16.0MB
-
memory/1712-91-0x0000000003170000-0x0000000004170000-memory.dmpFilesize
16.0MB
-
memory/1712-89-0x0000000003170000-0x0000000004170000-memory.dmpFilesize
16.0MB
-
memory/1712-87-0x0000000003170000-0x0000000004170000-memory.dmpFilesize
16.0MB
-
memory/1712-83-0x0000000003170000-0x0000000004170000-memory.dmpFilesize
16.0MB
-
memory/1712-81-0x0000000003170000-0x0000000004170000-memory.dmpFilesize
16.0MB
-
memory/1712-78-0x0000000003170000-0x0000000004170000-memory.dmpFilesize
16.0MB
-
memory/1712-76-0x0000000003170000-0x0000000004170000-memory.dmpFilesize
16.0MB
-
memory/1712-74-0x0000000003170000-0x0000000004170000-memory.dmpFilesize
16.0MB
-
memory/1712-72-0x0000000003170000-0x0000000004170000-memory.dmpFilesize
16.0MB
-
memory/1712-70-0x0000000003170000-0x0000000004170000-memory.dmpFilesize
16.0MB
-
memory/1712-68-0x0000000003170000-0x0000000004170000-memory.dmpFilesize
16.0MB
-
memory/1712-67-0x0000000003170000-0x0000000004170000-memory.dmpFilesize
16.0MB
-
memory/1712-57-0x0000000003170000-0x0000000004170000-memory.dmpFilesize
16.0MB
-
memory/1712-63-0x0000000003170000-0x0000000004170000-memory.dmpFilesize
16.0MB
-
memory/1712-62-0x0000000003170000-0x0000000004170000-memory.dmpFilesize
16.0MB
-
memory/1712-61-0x0000000003170000-0x0000000004170000-memory.dmpFilesize
16.0MB
-
memory/1712-60-0x0000000003170000-0x0000000004170000-memory.dmpFilesize
16.0MB
-
memory/1712-58-0x0000000003170000-0x0000000004170000-memory.dmpFilesize
16.0MB