Analysis
-
max time kernel
140s -
max time network
35s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 18:48
Static task
static1
Behavioral task
behavioral1
Sample
PaymentDetails.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
PaymentDetails.exe
Resource
win10v2004-20240802-en
General
-
Target
PaymentDetails.exe
-
Size
1.5MB
-
MD5
8829ac95079c711f9f7ecde3f8a47e65
-
SHA1
c0c601ca0d59d4776b0bf22bf1a3cce319011747
-
SHA256
a6097c984268c1d8031f5530890323c4007796d8d3edf386676e9322f0a71173
-
SHA512
390bfc3b8f85a0c0f14fd608deff2c314f3814de1829cbbc3910bdf97a37bef199a94ae8af9a12eb1220d44dc423cae4ef34ffd6f6ecca12ede092401d8234b9
-
SSDEEP
24576:RWGddPN4jN35Ohf8aT7JYR/MNPjWXY1Q7/VJJzsaz:RLLW15OOIYR/wjWXY1QZNz
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 61 IoCs
resource yara_rule behavioral1/memory/2528-2-0x00000000036F0000-0x00000000046F0000-memory.dmp modiloader_stage2 behavioral1/memory/2528-7-0x00000000036F0000-0x00000000046F0000-memory.dmp modiloader_stage2 behavioral1/memory/2528-6-0x00000000036F0000-0x00000000046F0000-memory.dmp modiloader_stage2 behavioral1/memory/2528-8-0x00000000036F0000-0x00000000046F0000-memory.dmp modiloader_stage2 behavioral1/memory/2528-9-0x00000000036F0000-0x00000000046F0000-memory.dmp modiloader_stage2 behavioral1/memory/2528-10-0x00000000036F0000-0x00000000046F0000-memory.dmp modiloader_stage2 behavioral1/memory/2528-11-0x00000000036F0000-0x00000000046F0000-memory.dmp modiloader_stage2 behavioral1/memory/2528-12-0x00000000036F0000-0x00000000046F0000-memory.dmp modiloader_stage2 behavioral1/memory/2528-17-0x00000000036F0000-0x00000000046F0000-memory.dmp modiloader_stage2 behavioral1/memory/2528-14-0x00000000036F0000-0x00000000046F0000-memory.dmp modiloader_stage2 behavioral1/memory/2528-21-0x00000000036F0000-0x00000000046F0000-memory.dmp modiloader_stage2 behavioral1/memory/2528-19-0x00000000036F0000-0x00000000046F0000-memory.dmp modiloader_stage2 behavioral1/memory/2528-23-0x00000000036F0000-0x00000000046F0000-memory.dmp modiloader_stage2 behavioral1/memory/2528-28-0x00000000036F0000-0x00000000046F0000-memory.dmp modiloader_stage2 behavioral1/memory/2528-26-0x00000000036F0000-0x00000000046F0000-memory.dmp modiloader_stage2 behavioral1/memory/2528-30-0x00000000036F0000-0x00000000046F0000-memory.dmp modiloader_stage2 behavioral1/memory/2528-35-0x00000000036F0000-0x00000000046F0000-memory.dmp modiloader_stage2 behavioral1/memory/2528-33-0x00000000036F0000-0x00000000046F0000-memory.dmp modiloader_stage2 behavioral1/memory/2528-37-0x00000000036F0000-0x00000000046F0000-memory.dmp modiloader_stage2 behavioral1/memory/2528-40-0x00000000036F0000-0x00000000046F0000-memory.dmp modiloader_stage2 behavioral1/memory/2528-44-0x00000000036F0000-0x00000000046F0000-memory.dmp modiloader_stage2 behavioral1/memory/2528-42-0x00000000036F0000-0x00000000046F0000-memory.dmp modiloader_stage2 behavioral1/memory/2528-46-0x00000000036F0000-0x00000000046F0000-memory.dmp modiloader_stage2 behavioral1/memory/2528-49-0x00000000036F0000-0x00000000046F0000-memory.dmp modiloader_stage2 behavioral1/memory/2528-51-0x00000000036F0000-0x00000000046F0000-memory.dmp modiloader_stage2 behavioral1/memory/2528-55-0x00000000036F0000-0x00000000046F0000-memory.dmp modiloader_stage2 behavioral1/memory/2528-53-0x00000000036F0000-0x00000000046F0000-memory.dmp modiloader_stage2 behavioral1/memory/2528-48-0x00000000036F0000-0x00000000046F0000-memory.dmp modiloader_stage2 behavioral1/memory/2528-60-0x00000000036F0000-0x00000000046F0000-memory.dmp modiloader_stage2 behavioral1/memory/2528-57-0x00000000036F0000-0x00000000046F0000-memory.dmp modiloader_stage2 behavioral1/memory/2528-62-0x00000000036F0000-0x00000000046F0000-memory.dmp modiloader_stage2 behavioral1/memory/2528-65-0x00000000036F0000-0x00000000046F0000-memory.dmp modiloader_stage2 behavioral1/memory/2528-67-0x00000000036F0000-0x00000000046F0000-memory.dmp modiloader_stage2 behavioral1/memory/2528-70-0x00000000036F0000-0x00000000046F0000-memory.dmp modiloader_stage2 behavioral1/memory/2528-72-0x00000000036F0000-0x00000000046F0000-memory.dmp modiloader_stage2 behavioral1/memory/2528-74-0x00000000036F0000-0x00000000046F0000-memory.dmp modiloader_stage2 behavioral1/memory/2528-76-0x00000000036F0000-0x00000000046F0000-memory.dmp modiloader_stage2 behavioral1/memory/2528-13-0x00000000036F0000-0x00000000046F0000-memory.dmp modiloader_stage2 behavioral1/memory/2528-15-0x00000000036F0000-0x00000000046F0000-memory.dmp modiloader_stage2 behavioral1/memory/2528-16-0x00000000036F0000-0x00000000046F0000-memory.dmp modiloader_stage2 behavioral1/memory/2528-20-0x00000000036F0000-0x00000000046F0000-memory.dmp modiloader_stage2 behavioral1/memory/2528-56-0x00000000036F0000-0x00000000046F0000-memory.dmp modiloader_stage2 behavioral1/memory/2528-54-0x00000000036F0000-0x00000000046F0000-memory.dmp modiloader_stage2 behavioral1/memory/2528-52-0x00000000036F0000-0x00000000046F0000-memory.dmp modiloader_stage2 behavioral1/memory/2528-50-0x00000000036F0000-0x00000000046F0000-memory.dmp modiloader_stage2 behavioral1/memory/2528-47-0x00000000036F0000-0x00000000046F0000-memory.dmp modiloader_stage2 behavioral1/memory/2528-45-0x00000000036F0000-0x00000000046F0000-memory.dmp modiloader_stage2 behavioral1/memory/2528-43-0x00000000036F0000-0x00000000046F0000-memory.dmp modiloader_stage2 behavioral1/memory/2528-41-0x00000000036F0000-0x00000000046F0000-memory.dmp modiloader_stage2 behavioral1/memory/2528-39-0x00000000036F0000-0x00000000046F0000-memory.dmp modiloader_stage2 behavioral1/memory/2528-38-0x00000000036F0000-0x00000000046F0000-memory.dmp modiloader_stage2 behavioral1/memory/2528-36-0x00000000036F0000-0x00000000046F0000-memory.dmp modiloader_stage2 behavioral1/memory/2528-34-0x00000000036F0000-0x00000000046F0000-memory.dmp modiloader_stage2 behavioral1/memory/2528-32-0x00000000036F0000-0x00000000046F0000-memory.dmp modiloader_stage2 behavioral1/memory/2528-31-0x00000000036F0000-0x00000000046F0000-memory.dmp modiloader_stage2 behavioral1/memory/2528-29-0x00000000036F0000-0x00000000046F0000-memory.dmp modiloader_stage2 behavioral1/memory/2528-27-0x00000000036F0000-0x00000000046F0000-memory.dmp modiloader_stage2 behavioral1/memory/2528-25-0x00000000036F0000-0x00000000046F0000-memory.dmp modiloader_stage2 behavioral1/memory/2528-24-0x00000000036F0000-0x00000000046F0000-memory.dmp modiloader_stage2 behavioral1/memory/2528-22-0x00000000036F0000-0x00000000046F0000-memory.dmp modiloader_stage2 behavioral1/memory/2528-18-0x00000000036F0000-0x00000000046F0000-memory.dmp modiloader_stage2 -
Program crash 1 IoCs
pid pid_target Process procid_target 2100 2528 WerFault.exe 28 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PaymentDetails.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process PID 2528 wrote to memory of 0 2528 PaymentDetails.exe PID 2528 wrote to memory of 0 2528 PaymentDetails.exe PID 2528 wrote to memory of 0 2528 PaymentDetails.exe PID 2528 wrote to memory of 0 2528 PaymentDetails.exe PID 2528 wrote to memory of 0 2528 PaymentDetails.exe PID 2528 wrote to memory of 0 2528 PaymentDetails.exe PID 2528 wrote to memory of 0 2528 PaymentDetails.exe PID 2528 wrote to memory of 0 2528 PaymentDetails.exe PID 2528 wrote to memory of 0 2528 PaymentDetails.exe PID 2528 wrote to memory of 0 2528 PaymentDetails.exe PID 2528 wrote to memory of 0 2528 PaymentDetails.exe PID 2528 wrote to memory of 0 2528 PaymentDetails.exe PID 2528 wrote to memory of 0 2528 PaymentDetails.exe PID 2528 wrote to memory of 0 2528 PaymentDetails.exe PID 2528 wrote to memory of 0 2528 PaymentDetails.exe PID 2528 wrote to memory of 0 2528 PaymentDetails.exe PID 2528 wrote to memory of 0 2528 PaymentDetails.exe PID 2528 wrote to memory of 0 2528 PaymentDetails.exe PID 2528 wrote to memory of 0 2528 PaymentDetails.exe PID 2528 wrote to memory of 0 2528 PaymentDetails.exe PID 2528 wrote to memory of 0 2528 PaymentDetails.exe PID 2528 wrote to memory of 0 2528 PaymentDetails.exe PID 2528 wrote to memory of 0 2528 PaymentDetails.exe PID 2528 wrote to memory of 0 2528 PaymentDetails.exe PID 2528 wrote to memory of 0 2528 PaymentDetails.exe PID 2528 wrote to memory of 0 2528 PaymentDetails.exe PID 2528 wrote to memory of 0 2528 PaymentDetails.exe PID 2528 wrote to memory of 0 2528 PaymentDetails.exe PID 2528 wrote to memory of 0 2528 PaymentDetails.exe PID 2528 wrote to memory of 0 2528 PaymentDetails.exe PID 2528 wrote to memory of 0 2528 PaymentDetails.exe PID 2528 wrote to memory of 0 2528 PaymentDetails.exe PID 2528 wrote to memory of 0 2528 PaymentDetails.exe PID 2528 wrote to memory of 0 2528 PaymentDetails.exe PID 2528 wrote to memory of 0 2528 PaymentDetails.exe PID 2528 wrote to memory of 0 2528 PaymentDetails.exe PID 2528 wrote to memory of 0 2528 PaymentDetails.exe PID 2528 wrote to memory of 0 2528 PaymentDetails.exe PID 2528 wrote to memory of 0 2528 PaymentDetails.exe PID 2528 wrote to memory of 0 2528 PaymentDetails.exe PID 2528 wrote to memory of 0 2528 PaymentDetails.exe PID 2528 wrote to memory of 0 2528 PaymentDetails.exe PID 2528 wrote to memory of 0 2528 PaymentDetails.exe PID 2528 wrote to memory of 0 2528 PaymentDetails.exe PID 2528 wrote to memory of 0 2528 PaymentDetails.exe PID 2528 wrote to memory of 0 2528 PaymentDetails.exe PID 2528 wrote to memory of 0 2528 PaymentDetails.exe PID 2528 wrote to memory of 0 2528 PaymentDetails.exe PID 2528 wrote to memory of 0 2528 PaymentDetails.exe PID 2528 wrote to memory of 0 2528 PaymentDetails.exe PID 2528 wrote to memory of 0 2528 PaymentDetails.exe PID 2528 wrote to memory of 0 2528 PaymentDetails.exe PID 2528 wrote to memory of 0 2528 PaymentDetails.exe PID 2528 wrote to memory of 0 2528 PaymentDetails.exe PID 2528 wrote to memory of 0 2528 PaymentDetails.exe PID 2528 wrote to memory of 0 2528 PaymentDetails.exe PID 2528 wrote to memory of 0 2528 PaymentDetails.exe PID 2528 wrote to memory of 0 2528 PaymentDetails.exe PID 2528 wrote to memory of 0 2528 PaymentDetails.exe PID 2528 wrote to memory of 0 2528 PaymentDetails.exe PID 2528 wrote to memory of 0 2528 PaymentDetails.exe PID 2528 wrote to memory of 0 2528 PaymentDetails.exe PID 2528 wrote to memory of 0 2528 PaymentDetails.exe PID 2528 wrote to memory of 0 2528 PaymentDetails.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PaymentDetails.exe"C:\Users\Admin\AppData\Local\Temp\PaymentDetails.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2528 -s 7522⤵
- Program crash
PID:2100
-