Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22-09-2024 14:52
Static task
static1
Behavioral task
behavioral1
Sample
d2d166937422f379e6dd15041d83af21.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d2d166937422f379e6dd15041d83af21.exe
Resource
win10v2004-20240802-en
General
-
Target
d2d166937422f379e6dd15041d83af21.exe
-
Size
1.6MB
-
MD5
d2d166937422f379e6dd15041d83af21
-
SHA1
84e0e1e9371b52e6682303fc11b02b69a3df782d
-
SHA256
c59da5938f667c04ca2ba3639b6cb3d5813fc189d4b2f412613b4bfa36ae0664
-
SHA512
3eb977c92a6a541bafd8f5c70d6263c21be019e6124efecb5bd237cbdd24d02eb150f08c9c1bbd3e54a54ef817041a293b03d63d15ec54f18eaa10f888adf8cf
-
SSDEEP
24576:mZGjH3HfO7fC0Nj3+8OioUMxW24Q7Q9p+Lz:mUrwP+8OiSWaOp+Lz
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral1/memory/2356-3-0x0000000003630000-0x0000000004630000-memory.dmp modiloader_stage2 -
Program crash 1 IoCs
pid pid_target Process procid_target 2380 2356 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d2d166937422f379e6dd15041d83af21.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2356 wrote to memory of 2380 2356 d2d166937422f379e6dd15041d83af21.exe 30 PID 2356 wrote to memory of 2380 2356 d2d166937422f379e6dd15041d83af21.exe 30 PID 2356 wrote to memory of 2380 2356 d2d166937422f379e6dd15041d83af21.exe 30 PID 2356 wrote to memory of 2380 2356 d2d166937422f379e6dd15041d83af21.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2d166937422f379e6dd15041d83af21.exe"C:\Users\Admin\AppData\Local\Temp\d2d166937422f379e6dd15041d83af21.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2356 -s 7482⤵
- Program crash
PID:2380
-