Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
20-08-2024 08:34
Behavioral task
behavioral1
Sample
Bank Details Changed..exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Bank Details Changed..exe
Resource
win10v2004-20240802-en
General
-
Target
Bank Details Changed..exe
-
Size
1.2MB
-
MD5
6b2475dca41dcefb5c1e09e5976ddad0
-
SHA1
23270c9d5ba2905df6c72a4d476a71d2d2868ef3
-
SHA256
94e4f0b4cbafbf6739f873f126465745f59df8251bf79adf3cbd03a04c65e9c4
-
SHA512
f634dec40f9c5a3042710eed9abdf690aaa86dd052a03e7136f54f93349cd7e5c4e6652c867e96005606a897632ec604084158319373c6fbee80f7ac35e41c9d
-
SSDEEP
24576:fBlDgE7EmXWAqSvg439vGSVNe1/hqIiHh/d7:f7DlC+GSjiBiB1
Malware Config
Extracted
modiloader
https://drive.google.com/u/0/uc?id=1-uob4bD7HwuWQ23eLDd4Tp7qik_wVSHt&export=download
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader First Stage 3 IoCs
resource yara_rule behavioral1/memory/2584-1-0x0000000010410000-0x000000001047E000-memory.dmp modiloader_stage1 behavioral1/memory/2076-4208-0x0000000010410000-0x000000001047E000-memory.dmp modiloader_stage1 behavioral1/memory/2076-4210-0x0000000010410000-0x000000001047E000-memory.dmp modiloader_stage1 -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 2 drive.google.com 3 drive.google.com -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bank Details Changed..exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bank Details Changed..exe -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 5 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 3 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2584 wrote to memory of 2076 2584 Bank Details Changed..exe 30 PID 2584 wrote to memory of 2076 2584 Bank Details Changed..exe 30 PID 2584 wrote to memory of 2076 2584 Bank Details Changed..exe 30 PID 2584 wrote to memory of 2076 2584 Bank Details Changed..exe 30 PID 2584 wrote to memory of 2076 2584 Bank Details Changed..exe 30 PID 2584 wrote to memory of 2076 2584 Bank Details Changed..exe 30 PID 2584 wrote to memory of 2076 2584 Bank Details Changed..exe 30 PID 2584 wrote to memory of 2076 2584 Bank Details Changed..exe 30 PID 2584 wrote to memory of 2076 2584 Bank Details Changed..exe 30 PID 2584 wrote to memory of 2076 2584 Bank Details Changed..exe 30 PID 2584 wrote to memory of 2076 2584 Bank Details Changed..exe 30 PID 2584 wrote to memory of 2076 2584 Bank Details Changed..exe 30 PID 2584 wrote to memory of 2076 2584 Bank Details Changed..exe 30 PID 2584 wrote to memory of 2076 2584 Bank Details Changed..exe 30 PID 2584 wrote to memory of 2076 2584 Bank Details Changed..exe 30 PID 2584 wrote to memory of 2076 2584 Bank Details Changed..exe 30 PID 2584 wrote to memory of 2076 2584 Bank Details Changed..exe 30 PID 2584 wrote to memory of 2076 2584 Bank Details Changed..exe 30 PID 2584 wrote to memory of 2076 2584 Bank Details Changed..exe 30 PID 2584 wrote to memory of 2076 2584 Bank Details Changed..exe 30 PID 2584 wrote to memory of 2076 2584 Bank Details Changed..exe 30 PID 2584 wrote to memory of 2076 2584 Bank Details Changed..exe 30 PID 2584 wrote to memory of 2076 2584 Bank Details Changed..exe 30 PID 2584 wrote to memory of 2076 2584 Bank Details Changed..exe 30 PID 2584 wrote to memory of 2076 2584 Bank Details Changed..exe 30 PID 2584 wrote to memory of 2076 2584 Bank Details Changed..exe 30 PID 2584 wrote to memory of 2076 2584 Bank Details Changed..exe 30 PID 2584 wrote to memory of 2076 2584 Bank Details Changed..exe 30 PID 2584 wrote to memory of 2076 2584 Bank Details Changed..exe 30 PID 2584 wrote to memory of 2076 2584 Bank Details Changed..exe 30 PID 2584 wrote to memory of 2076 2584 Bank Details Changed..exe 30 PID 2584 wrote to memory of 2076 2584 Bank Details Changed..exe 30 PID 2584 wrote to memory of 2076 2584 Bank Details Changed..exe 30 PID 2584 wrote to memory of 2076 2584 Bank Details Changed..exe 30 PID 2584 wrote to memory of 2076 2584 Bank Details Changed..exe 30 PID 2584 wrote to memory of 2076 2584 Bank Details Changed..exe 30 PID 2584 wrote to memory of 2076 2584 Bank Details Changed..exe 30 PID 2584 wrote to memory of 2076 2584 Bank Details Changed..exe 30 PID 2584 wrote to memory of 2076 2584 Bank Details Changed..exe 30 PID 2584 wrote to memory of 2076 2584 Bank Details Changed..exe 30 PID 2584 wrote to memory of 2076 2584 Bank Details Changed..exe 30 PID 2584 wrote to memory of 2076 2584 Bank Details Changed..exe 30 PID 2584 wrote to memory of 2076 2584 Bank Details Changed..exe 30 PID 2584 wrote to memory of 2076 2584 Bank Details Changed..exe 30 PID 2584 wrote to memory of 2076 2584 Bank Details Changed..exe 30 PID 2584 wrote to memory of 2076 2584 Bank Details Changed..exe 30 PID 2584 wrote to memory of 2076 2584 Bank Details Changed..exe 30 PID 2584 wrote to memory of 2076 2584 Bank Details Changed..exe 30 PID 2584 wrote to memory of 2076 2584 Bank Details Changed..exe 30 PID 2584 wrote to memory of 2076 2584 Bank Details Changed..exe 30 PID 2584 wrote to memory of 2076 2584 Bank Details Changed..exe 30 PID 2584 wrote to memory of 2076 2584 Bank Details Changed..exe 30 PID 2584 wrote to memory of 2076 2584 Bank Details Changed..exe 30 PID 2584 wrote to memory of 2076 2584 Bank Details Changed..exe 30 PID 2584 wrote to memory of 2076 2584 Bank Details Changed..exe 30 PID 2584 wrote to memory of 2076 2584 Bank Details Changed..exe 30 PID 2584 wrote to memory of 2076 2584 Bank Details Changed..exe 30 PID 2584 wrote to memory of 2076 2584 Bank Details Changed..exe 30 PID 2584 wrote to memory of 2076 2584 Bank Details Changed..exe 30 PID 2584 wrote to memory of 2076 2584 Bank Details Changed..exe 30 PID 2584 wrote to memory of 2076 2584 Bank Details Changed..exe 30 PID 2584 wrote to memory of 2076 2584 Bank Details Changed..exe 30 PID 2584 wrote to memory of 2076 2584 Bank Details Changed..exe 30 PID 2584 wrote to memory of 2076 2584 Bank Details Changed..exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Bank Details Changed..exe"C:\Users\Admin\AppData\Local\Temp\Bank Details Changed..exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\Bank Details Changed..exe"C:\Users\Admin\AppData\Local\Temp\Bank Details Changed..exe"2⤵
- System Location Discovery: System Language Discovery
PID:2076
-