Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-09-2024 21:01
Static task
static1
Behavioral task
behavioral1
Sample
d5288c53e43e9813e107729c7546c950N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d5288c53e43e9813e107729c7546c950N.exe
Resource
win10v2004-20240802-en
General
-
Target
d5288c53e43e9813e107729c7546c950N.exe
-
Size
687KB
-
MD5
d5288c53e43e9813e107729c7546c950
-
SHA1
74fa8aee5e7a089a601794bf802598d8ec924527
-
SHA256
0d7fb980f5f6c6b4ed043f08bca3aeebfc69137c7098dd79c38ed0415265b5c8
-
SHA512
9bee93f94b350682240493dcd05375dad27e94c5a6871ae3168a51d3de0146d81a65f32834fe98d909f79fea585c8eae70e19bad136a7bdc048f4933587c14d6
-
SSDEEP
12288:YM6Gk65CKDAadgranPswqHDUV3rKCcRJcxtClF3Z4mxx6o3ABt4QCdeOwjz4:LRTDAadoanPNUUE3JcilQmX6Qut4QCdR
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral1/memory/2176-65-0x0000000000400000-0x000000000052B000-memory.dmp modiloader_stage2 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\paramstr.txt d5288c53e43e9813e107729c7546c950N.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2612 2176 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d5288c53e43e9813e107729c7546c950N.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2176 wrote to memory of 2856 2176 d5288c53e43e9813e107729c7546c950N.exe 30 PID 2176 wrote to memory of 2856 2176 d5288c53e43e9813e107729c7546c950N.exe 30 PID 2176 wrote to memory of 2856 2176 d5288c53e43e9813e107729c7546c950N.exe 30 PID 2176 wrote to memory of 2856 2176 d5288c53e43e9813e107729c7546c950N.exe 30 PID 2176 wrote to memory of 2612 2176 d5288c53e43e9813e107729c7546c950N.exe 31 PID 2176 wrote to memory of 2612 2176 d5288c53e43e9813e107729c7546c950N.exe 31 PID 2176 wrote to memory of 2612 2176 d5288c53e43e9813e107729c7546c950N.exe 31 PID 2176 wrote to memory of 2612 2176 d5288c53e43e9813e107729c7546c950N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5288c53e43e9813e107729c7546c950N.exe"C:\Users\Admin\AppData\Local\Temp\d5288c53e43e9813e107729c7546c950N.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"2⤵PID:2856
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2176 -s 3122⤵
- Program crash
PID:2612
-