Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-06-2024 13:51
Static task
static1
Behavioral task
behavioral1
Sample
Swift_Banco_Lacaixa_03985098y709704830000986965069929.cmd
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Swift_Banco_Lacaixa_03985098y709704830000986965069929.cmd
Resource
win10v2004-20240508-en
General
-
Target
Swift_Banco_Lacaixa_03985098y709704830000986965069929.cmd
-
Size
3.0MB
-
MD5
c6a27d493b2d86fd5e6cb323d79a7cc1
-
SHA1
0002d64961aa5e85c8c051821ded45c8cbfa6fd0
-
SHA256
cedb2a15eafab50e46e737ab54f4868f7dc32130b657036e7425122842213f9f
-
SHA512
ba0f9088eb5ae6cb596b5c16fd64a3d4f9f333b9c510ec3e3a2c16ce5bc8322b8293caea16c81eb7ed056869e2207b159c49a721ee58fbf3e763f8eaad4f6079
-
SSDEEP
24576:EL49v/AB0iDiIle024r8b92SueW48Wal8iGxwvxA4TeEd6ys/8aOiFzdX:EsVYB1Dle03u92s78WNROezdX
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 61 IoCs
Processes:
resource yara_rule behavioral1/memory/2656-34-0x0000000003230000-0x0000000004230000-memory.dmp modiloader_stage2 behavioral1/memory/2656-37-0x0000000003230000-0x0000000004230000-memory.dmp modiloader_stage2 behavioral1/memory/2656-36-0x0000000003230000-0x0000000004230000-memory.dmp modiloader_stage2 behavioral1/memory/2656-38-0x0000000003230000-0x0000000004230000-memory.dmp modiloader_stage2 behavioral1/memory/2656-35-0x0000000003230000-0x0000000004230000-memory.dmp modiloader_stage2 behavioral1/memory/2656-42-0x0000000003230000-0x0000000004230000-memory.dmp modiloader_stage2 behavioral1/memory/2656-40-0x0000000003230000-0x0000000004230000-memory.dmp modiloader_stage2 behavioral1/memory/2656-44-0x0000000003230000-0x0000000004230000-memory.dmp modiloader_stage2 behavioral1/memory/2656-43-0x0000000003230000-0x0000000004230000-memory.dmp modiloader_stage2 behavioral1/memory/2656-41-0x0000000003230000-0x0000000004230000-memory.dmp modiloader_stage2 behavioral1/memory/2656-50-0x0000000003230000-0x0000000004230000-memory.dmp modiloader_stage2 behavioral1/memory/2656-47-0x0000000003230000-0x0000000004230000-memory.dmp modiloader_stage2 behavioral1/memory/2656-49-0x0000000003230000-0x0000000004230000-memory.dmp modiloader_stage2 behavioral1/memory/2656-48-0x0000000003230000-0x0000000004230000-memory.dmp modiloader_stage2 behavioral1/memory/2656-51-0x0000000003230000-0x0000000004230000-memory.dmp modiloader_stage2 behavioral1/memory/2656-53-0x0000000003230000-0x0000000004230000-memory.dmp modiloader_stage2 behavioral1/memory/2656-112-0x0000000003230000-0x0000000004230000-memory.dmp modiloader_stage2 behavioral1/memory/2656-54-0x0000000003230000-0x0000000004230000-memory.dmp modiloader_stage2 behavioral1/memory/2656-83-0x0000000003230000-0x0000000004230000-memory.dmp modiloader_stage2 behavioral1/memory/2656-80-0x0000000003230000-0x0000000004230000-memory.dmp modiloader_stage2 behavioral1/memory/2656-79-0x0000000003230000-0x0000000004230000-memory.dmp modiloader_stage2 behavioral1/memory/2656-77-0x0000000003230000-0x0000000004230000-memory.dmp modiloader_stage2 behavioral1/memory/2656-76-0x0000000003230000-0x0000000004230000-memory.dmp modiloader_stage2 behavioral1/memory/2656-74-0x0000000003230000-0x0000000004230000-memory.dmp modiloader_stage2 behavioral1/memory/2656-73-0x0000000003230000-0x0000000004230000-memory.dmp modiloader_stage2 behavioral1/memory/2656-71-0x0000000003230000-0x0000000004230000-memory.dmp modiloader_stage2 behavioral1/memory/2656-70-0x0000000003230000-0x0000000004230000-memory.dmp modiloader_stage2 behavioral1/memory/2656-67-0x0000000003230000-0x0000000004230000-memory.dmp modiloader_stage2 behavioral1/memory/2656-65-0x0000000003230000-0x0000000004230000-memory.dmp modiloader_stage2 behavioral1/memory/2656-64-0x0000000003230000-0x0000000004230000-memory.dmp modiloader_stage2 behavioral1/memory/2656-61-0x0000000003230000-0x0000000004230000-memory.dmp modiloader_stage2 behavioral1/memory/2656-59-0x0000000003230000-0x0000000004230000-memory.dmp modiloader_stage2 behavioral1/memory/2656-82-0x0000000003230000-0x0000000004230000-memory.dmp modiloader_stage2 behavioral1/memory/2656-68-0x0000000003230000-0x0000000004230000-memory.dmp modiloader_stage2 behavioral1/memory/2656-62-0x0000000003230000-0x0000000004230000-memory.dmp modiloader_stage2 behavioral1/memory/2656-57-0x0000000003230000-0x0000000004230000-memory.dmp modiloader_stage2 behavioral1/memory/2656-55-0x0000000003230000-0x0000000004230000-memory.dmp modiloader_stage2 behavioral1/memory/2656-124-0x0000000003230000-0x0000000004230000-memory.dmp modiloader_stage2 behavioral1/memory/2656-121-0x0000000003230000-0x0000000004230000-memory.dmp modiloader_stage2 behavioral1/memory/2656-118-0x0000000003230000-0x0000000004230000-memory.dmp modiloader_stage2 behavioral1/memory/2656-115-0x0000000003230000-0x0000000004230000-memory.dmp modiloader_stage2 behavioral1/memory/2656-109-0x0000000003230000-0x0000000004230000-memory.dmp modiloader_stage2 behavioral1/memory/2656-107-0x0000000003230000-0x0000000004230000-memory.dmp modiloader_stage2 behavioral1/memory/2656-103-0x0000000003230000-0x0000000004230000-memory.dmp modiloader_stage2 behavioral1/memory/2656-100-0x0000000003230000-0x0000000004230000-memory.dmp modiloader_stage2 behavioral1/memory/2656-97-0x0000000003230000-0x0000000004230000-memory.dmp modiloader_stage2 behavioral1/memory/2656-94-0x0000000003230000-0x0000000004230000-memory.dmp modiloader_stage2 behavioral1/memory/2656-91-0x0000000003230000-0x0000000004230000-memory.dmp modiloader_stage2 behavioral1/memory/2656-88-0x0000000003230000-0x0000000004230000-memory.dmp modiloader_stage2 behavioral1/memory/2656-85-0x0000000003230000-0x0000000004230000-memory.dmp modiloader_stage2 behavioral1/memory/2656-81-0x0000000003230000-0x0000000004230000-memory.dmp modiloader_stage2 behavioral1/memory/2656-78-0x0000000003230000-0x0000000004230000-memory.dmp modiloader_stage2 behavioral1/memory/2656-75-0x0000000003230000-0x0000000004230000-memory.dmp modiloader_stage2 behavioral1/memory/2656-72-0x0000000003230000-0x0000000004230000-memory.dmp modiloader_stage2 behavioral1/memory/2656-69-0x0000000003230000-0x0000000004230000-memory.dmp modiloader_stage2 behavioral1/memory/2656-66-0x0000000003230000-0x0000000004230000-memory.dmp modiloader_stage2 behavioral1/memory/2656-63-0x0000000003230000-0x0000000004230000-memory.dmp modiloader_stage2 behavioral1/memory/2656-60-0x0000000003230000-0x0000000004230000-memory.dmp modiloader_stage2 behavioral1/memory/2656-58-0x0000000003230000-0x0000000004230000-memory.dmp modiloader_stage2 behavioral1/memory/2656-56-0x0000000003230000-0x0000000004230000-memory.dmp modiloader_stage2 behavioral1/memory/2656-52-0x0000000003230000-0x0000000004230000-memory.dmp modiloader_stage2 -
Executes dropped EXE 8 IoCs
Processes:
alpha.exealpha.exekn.exealpha.exekn.exeAudio.pifalpha.exealpha.exepid process 2204 alpha.exe 2624 alpha.exe 2804 kn.exe 2548 alpha.exe 2532 kn.exe 2656 Audio.pif 2516 alpha.exe 2320 alpha.exe -
Loads dropped DLL 9 IoCs
Processes:
cmd.exealpha.exealpha.exeWerFault.exepid process 2600 cmd.exe 2600 cmd.exe 2624 alpha.exe 2600 cmd.exe 2548 alpha.exe 2600 cmd.exe 2600 cmd.exe 2932 WerFault.exe 2932 WerFault.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2932 2656 WerFault.exe Audio.pif -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
Processes:
Audio.pifpid process 2656 Audio.pif -
Suspicious use of WriteProcessMemory 35 IoCs
Processes:
cmd.exealpha.exealpha.exealpha.exeAudio.pifdescription pid process target process PID 2600 wrote to memory of 2020 2600 cmd.exe extrac32.exe PID 2600 wrote to memory of 2020 2600 cmd.exe extrac32.exe PID 2600 wrote to memory of 2020 2600 cmd.exe extrac32.exe PID 2600 wrote to memory of 2204 2600 cmd.exe alpha.exe PID 2600 wrote to memory of 2204 2600 cmd.exe alpha.exe PID 2600 wrote to memory of 2204 2600 cmd.exe alpha.exe PID 2204 wrote to memory of 2572 2204 alpha.exe extrac32.exe PID 2204 wrote to memory of 2572 2204 alpha.exe extrac32.exe PID 2204 wrote to memory of 2572 2204 alpha.exe extrac32.exe PID 2600 wrote to memory of 2624 2600 cmd.exe alpha.exe PID 2600 wrote to memory of 2624 2600 cmd.exe alpha.exe PID 2600 wrote to memory of 2624 2600 cmd.exe alpha.exe PID 2624 wrote to memory of 2804 2624 alpha.exe kn.exe PID 2624 wrote to memory of 2804 2624 alpha.exe kn.exe PID 2624 wrote to memory of 2804 2624 alpha.exe kn.exe PID 2600 wrote to memory of 2548 2600 cmd.exe alpha.exe PID 2600 wrote to memory of 2548 2600 cmd.exe alpha.exe PID 2600 wrote to memory of 2548 2600 cmd.exe alpha.exe PID 2548 wrote to memory of 2532 2548 alpha.exe kn.exe PID 2548 wrote to memory of 2532 2548 alpha.exe kn.exe PID 2548 wrote to memory of 2532 2548 alpha.exe kn.exe PID 2600 wrote to memory of 2656 2600 cmd.exe Audio.pif PID 2600 wrote to memory of 2656 2600 cmd.exe Audio.pif PID 2600 wrote to memory of 2656 2600 cmd.exe Audio.pif PID 2600 wrote to memory of 2656 2600 cmd.exe Audio.pif PID 2600 wrote to memory of 2516 2600 cmd.exe alpha.exe PID 2600 wrote to memory of 2516 2600 cmd.exe alpha.exe PID 2600 wrote to memory of 2516 2600 cmd.exe alpha.exe PID 2600 wrote to memory of 2320 2600 cmd.exe alpha.exe PID 2600 wrote to memory of 2320 2600 cmd.exe alpha.exe PID 2600 wrote to memory of 2320 2600 cmd.exe alpha.exe PID 2656 wrote to memory of 2932 2656 Audio.pif WerFault.exe PID 2656 wrote to memory of 2932 2656 Audio.pif WerFault.exe PID 2656 wrote to memory of 2932 2656 Audio.pif WerFault.exe PID 2656 wrote to memory of 2932 2656 Audio.pif WerFault.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Swift_Banco_Lacaixa_03985098y709704830000986965069929.cmd"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\System32\extrac32.exeC:\\Windows\\System32\\extrac32 /C /Y C:\\Windows\\System32\\cmd.exe "C:\\Users\\Public\\alpha.exe"2⤵PID:2020
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c extrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\system32\extrac32.exeextrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe3⤵PID:2572
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c C:\\Users\\Public\\kn -decodehex -F "C:\Users\Admin\AppData\Local\Temp\Swift_Banco_Lacaixa_03985098y709704830000986965069929.cmd" "C:\\Users\\Public\\Audio.mp4" 92⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Users\Public\kn.exeC:\\Users\\Public\\kn -decodehex -F "C:\Users\Admin\AppData\Local\Temp\Swift_Banco_Lacaixa_03985098y709704830000986965069929.cmd" "C:\\Users\\Public\\Audio.mp4" 93⤵
- Executes dropped EXE
PID:2804 -
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c C:\\Users\\Public\\kn -decodehex -F "C:\\Users\\Public\\Audio.mp4" "C:\\Users\\Public\\Libraries\\Audio.pif" 122⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Public\kn.exeC:\\Users\\Public\\kn -decodehex -F "C:\\Users\\Public\\Audio.mp4" "C:\\Users\\Public\\Libraries\\Audio.pif" 123⤵
- Executes dropped EXE
PID:2532 -
C:\Users\Public\Libraries\Audio.pifC:\Users\Public\Libraries\Audio.pif2⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2656 -s 7163⤵
- Loads dropped DLL
- Program crash
PID:2932 -
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c del /q "C:\Users\Public\kn.exe" / A / F / Q / S2⤵
- Executes dropped EXE
PID:2516 -
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c del /q "C:\Users\Public\Audio.mp4" / A / F / Q / S2⤵
- Executes dropped EXE
PID:2320
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Public\Audio.mp4Filesize
2.1MB
MD5477f72d9265e3a6f81faaaec24f4d112
SHA1d1992b3ed3549a4d321cff45a6f0df8ecbf2f884
SHA25666ddfb6def00a1e199f450c68519adcf92355e6fbc6b6612d98f25010405997c
SHA512e347c01acc692360f2c9c1b36c084e9a536a4db0214c1d7f027deffa9f383e9b7a92cfaf91cfb5e9ec38fd9f5782a1fe31003dfc85f148d9bd543f1a588589da
-
C:\Users\Public\Libraries\Audio.pifFilesize
1.0MB
MD5b2162fcd0616625d0b11bcc1df6e0f73
SHA1fe5cf0fd63d931acef1362119f6309411342ee2b
SHA256fd4e263c7d87abc98d9c38fe5e95638a3ca8c504b6fd6d34359e0e9141928f59
SHA512fc2e021c01c57e7d84c41110ac38ca7cee1fec7b26ff5c1f53fac75351ca6f0add0ca8a8f42a0ab2f15dfe6b6cf2790f826e10c14f00fae1e6a829daba86aa21
-
\Users\Public\alpha.exeFilesize
337KB
MD55746bd7e255dd6a8afa06f7c42c1ba41
SHA10f3c4ff28f354aede202d54e9d1c5529a3bf87d8
SHA256db06c3534964e3fc79d2763144ba53742d7fa250ca336f4a0fe724b75aaff386
SHA5123a968356d7b94cc014f78ca37a3c03f354c3970c9e027ed4ccb8e59f0f9f2a32bfa22e7d6b127d44631d715ea41bf8ace91f0b4d69d1714d55552b064ffeb69e
-
\Users\Public\kn.exeFilesize
1.1MB
MD5ec1fd3050dbc40ec7e87ab99c7ca0b03
SHA1ae7fdfc29f4ef31e38ebf381e61b503038b5cb35
SHA2561e19c5a26215b62de1babd5633853344420c1e673bb83e8a89213085e17e16e3
SHA5124e47331f2fdce77b01d86cf8e21cd7d6df13536f09b70c53e5a6b82f66512faa10e38645884c696b47a27ea6bddc6c1fdb905ee78684dca98cbda5f39fbafcc2
-
memory/2656-34-0x0000000003230000-0x0000000004230000-memory.dmpFilesize
16.0MB
-
memory/2656-37-0x0000000003230000-0x0000000004230000-memory.dmpFilesize
16.0MB
-
memory/2656-36-0x0000000003230000-0x0000000004230000-memory.dmpFilesize
16.0MB
-
memory/2656-38-0x0000000003230000-0x0000000004230000-memory.dmpFilesize
16.0MB
-
memory/2656-35-0x0000000003230000-0x0000000004230000-memory.dmpFilesize
16.0MB
-
memory/2656-39-0x0000000000400000-0x0000000000511000-memory.dmpFilesize
1.1MB
-
memory/2656-42-0x0000000003230000-0x0000000004230000-memory.dmpFilesize
16.0MB
-
memory/2656-40-0x0000000003230000-0x0000000004230000-memory.dmpFilesize
16.0MB
-
memory/2656-44-0x0000000003230000-0x0000000004230000-memory.dmpFilesize
16.0MB
-
memory/2656-43-0x0000000003230000-0x0000000004230000-memory.dmpFilesize
16.0MB
-
memory/2656-41-0x0000000003230000-0x0000000004230000-memory.dmpFilesize
16.0MB
-
memory/2656-50-0x0000000003230000-0x0000000004230000-memory.dmpFilesize
16.0MB
-
memory/2656-47-0x0000000003230000-0x0000000004230000-memory.dmpFilesize
16.0MB
-
memory/2656-49-0x0000000003230000-0x0000000004230000-memory.dmpFilesize
16.0MB
-
memory/2656-48-0x0000000003230000-0x0000000004230000-memory.dmpFilesize
16.0MB
-
memory/2656-51-0x0000000003230000-0x0000000004230000-memory.dmpFilesize
16.0MB
-
memory/2656-53-0x0000000003230000-0x0000000004230000-memory.dmpFilesize
16.0MB
-
memory/2656-112-0x0000000003230000-0x0000000004230000-memory.dmpFilesize
16.0MB
-
memory/2656-54-0x0000000003230000-0x0000000004230000-memory.dmpFilesize
16.0MB
-
memory/2656-83-0x0000000003230000-0x0000000004230000-memory.dmpFilesize
16.0MB
-
memory/2656-80-0x0000000003230000-0x0000000004230000-memory.dmpFilesize
16.0MB
-
memory/2656-79-0x0000000003230000-0x0000000004230000-memory.dmpFilesize
16.0MB
-
memory/2656-77-0x0000000003230000-0x0000000004230000-memory.dmpFilesize
16.0MB
-
memory/2656-76-0x0000000003230000-0x0000000004230000-memory.dmpFilesize
16.0MB
-
memory/2656-74-0x0000000003230000-0x0000000004230000-memory.dmpFilesize
16.0MB
-
memory/2656-73-0x0000000003230000-0x0000000004230000-memory.dmpFilesize
16.0MB
-
memory/2656-71-0x0000000003230000-0x0000000004230000-memory.dmpFilesize
16.0MB
-
memory/2656-70-0x0000000003230000-0x0000000004230000-memory.dmpFilesize
16.0MB
-
memory/2656-67-0x0000000003230000-0x0000000004230000-memory.dmpFilesize
16.0MB
-
memory/2656-65-0x0000000003230000-0x0000000004230000-memory.dmpFilesize
16.0MB
-
memory/2656-64-0x0000000003230000-0x0000000004230000-memory.dmpFilesize
16.0MB
-
memory/2656-61-0x0000000003230000-0x0000000004230000-memory.dmpFilesize
16.0MB
-
memory/2656-59-0x0000000003230000-0x0000000004230000-memory.dmpFilesize
16.0MB
-
memory/2656-82-0x0000000003230000-0x0000000004230000-memory.dmpFilesize
16.0MB
-
memory/2656-68-0x0000000003230000-0x0000000004230000-memory.dmpFilesize
16.0MB
-
memory/2656-62-0x0000000003230000-0x0000000004230000-memory.dmpFilesize
16.0MB
-
memory/2656-57-0x0000000003230000-0x0000000004230000-memory.dmpFilesize
16.0MB
-
memory/2656-55-0x0000000003230000-0x0000000004230000-memory.dmpFilesize
16.0MB
-
memory/2656-124-0x0000000003230000-0x0000000004230000-memory.dmpFilesize
16.0MB
-
memory/2656-121-0x0000000003230000-0x0000000004230000-memory.dmpFilesize
16.0MB
-
memory/2656-118-0x0000000003230000-0x0000000004230000-memory.dmpFilesize
16.0MB
-
memory/2656-115-0x0000000003230000-0x0000000004230000-memory.dmpFilesize
16.0MB
-
memory/2656-109-0x0000000003230000-0x0000000004230000-memory.dmpFilesize
16.0MB
-
memory/2656-107-0x0000000003230000-0x0000000004230000-memory.dmpFilesize
16.0MB
-
memory/2656-103-0x0000000003230000-0x0000000004230000-memory.dmpFilesize
16.0MB
-
memory/2656-100-0x0000000003230000-0x0000000004230000-memory.dmpFilesize
16.0MB
-
memory/2656-97-0x0000000003230000-0x0000000004230000-memory.dmpFilesize
16.0MB
-
memory/2656-94-0x0000000003230000-0x0000000004230000-memory.dmpFilesize
16.0MB
-
memory/2656-91-0x0000000003230000-0x0000000004230000-memory.dmpFilesize
16.0MB
-
memory/2656-88-0x0000000003230000-0x0000000004230000-memory.dmpFilesize
16.0MB
-
memory/2656-85-0x0000000003230000-0x0000000004230000-memory.dmpFilesize
16.0MB
-
memory/2656-81-0x0000000003230000-0x0000000004230000-memory.dmpFilesize
16.0MB
-
memory/2656-78-0x0000000003230000-0x0000000004230000-memory.dmpFilesize
16.0MB
-
memory/2656-75-0x0000000003230000-0x0000000004230000-memory.dmpFilesize
16.0MB
-
memory/2656-72-0x0000000003230000-0x0000000004230000-memory.dmpFilesize
16.0MB
-
memory/2656-69-0x0000000003230000-0x0000000004230000-memory.dmpFilesize
16.0MB
-
memory/2656-66-0x0000000003230000-0x0000000004230000-memory.dmpFilesize
16.0MB
-
memory/2656-63-0x0000000003230000-0x0000000004230000-memory.dmpFilesize
16.0MB
-
memory/2656-60-0x0000000003230000-0x0000000004230000-memory.dmpFilesize
16.0MB
-
memory/2656-58-0x0000000003230000-0x0000000004230000-memory.dmpFilesize
16.0MB
-
memory/2656-56-0x0000000003230000-0x0000000004230000-memory.dmpFilesize
16.0MB
-
memory/2656-52-0x0000000003230000-0x0000000004230000-memory.dmpFilesize
16.0MB