Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-10-2024 13:05
Static task
static1
Behavioral task
behavioral1
Sample
PO PRF-TR-2023-0001.rar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PO PRF-TR-2023-0001.rar
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Krcdanwiedyoqk.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Krcdanwiedyoqk.exe
Resource
win10v2004-20241007-en
General
-
Target
Krcdanwiedyoqk.exe
-
Size
1.1MB
-
MD5
da449c2d60fe9adb096242dd71db10c8
-
SHA1
55276aa1b212c91e997d70deac1595528234fc96
-
SHA256
57a211664560494ee01af527f281a3fcc9727c15c322122d283e5213a11ab3d3
-
SHA512
1c20999f7295b4c38af4c48dfe34b6738522028a984e0df1f9375212700f6297c69c4e154352b90fd0dce30bda07a54d155a76c9475acd35e7962eba6b458b34
-
SSDEEP
24576:rCtVqnbUQ25Qm2XzuiYcx3RqrPBzKRfuHpEqiyu5T5:rkabmuYc3qrWyuv
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 61 IoCs
resource yara_rule behavioral3/memory/2156-3-0x00000000032B0000-0x00000000042B0000-memory.dmp modiloader_stage2 behavioral3/memory/2156-11-0x00000000032B0000-0x00000000042B0000-memory.dmp modiloader_stage2 behavioral3/memory/2156-75-0x00000000032B0000-0x00000000042B0000-memory.dmp modiloader_stage2 behavioral3/memory/2156-44-0x00000000032B0000-0x00000000042B0000-memory.dmp modiloader_stage2 behavioral3/memory/2156-39-0x00000000032B0000-0x00000000042B0000-memory.dmp modiloader_stage2 behavioral3/memory/2156-34-0x00000000032B0000-0x00000000042B0000-memory.dmp modiloader_stage2 behavioral3/memory/2156-27-0x00000000032B0000-0x00000000042B0000-memory.dmp modiloader_stage2 behavioral3/memory/2156-23-0x00000000032B0000-0x00000000042B0000-memory.dmp modiloader_stage2 behavioral3/memory/2156-78-0x00000000032B0000-0x00000000042B0000-memory.dmp modiloader_stage2 behavioral3/memory/2156-72-0x00000000032B0000-0x00000000042B0000-memory.dmp modiloader_stage2 behavioral3/memory/2156-69-0x00000000032B0000-0x00000000042B0000-memory.dmp modiloader_stage2 behavioral3/memory/2156-66-0x00000000032B0000-0x00000000042B0000-memory.dmp modiloader_stage2 behavioral3/memory/2156-63-0x00000000032B0000-0x00000000042B0000-memory.dmp modiloader_stage2 behavioral3/memory/2156-60-0x00000000032B0000-0x00000000042B0000-memory.dmp modiloader_stage2 behavioral3/memory/2156-57-0x00000000032B0000-0x00000000042B0000-memory.dmp modiloader_stage2 behavioral3/memory/2156-54-0x00000000032B0000-0x00000000042B0000-memory.dmp modiloader_stage2 behavioral3/memory/2156-51-0x00000000032B0000-0x00000000042B0000-memory.dmp modiloader_stage2 behavioral3/memory/2156-49-0x00000000032B0000-0x00000000042B0000-memory.dmp modiloader_stage2 behavioral3/memory/2156-46-0x00000000032B0000-0x00000000042B0000-memory.dmp modiloader_stage2 behavioral3/memory/2156-43-0x00000000032B0000-0x00000000042B0000-memory.dmp modiloader_stage2 behavioral3/memory/2156-40-0x00000000032B0000-0x00000000042B0000-memory.dmp modiloader_stage2 behavioral3/memory/2156-36-0x00000000032B0000-0x00000000042B0000-memory.dmp modiloader_stage2 behavioral3/memory/2156-32-0x00000000032B0000-0x00000000042B0000-memory.dmp modiloader_stage2 behavioral3/memory/2156-29-0x00000000032B0000-0x00000000042B0000-memory.dmp modiloader_stage2 behavioral3/memory/2156-25-0x00000000032B0000-0x00000000042B0000-memory.dmp modiloader_stage2 behavioral3/memory/2156-22-0x00000000032B0000-0x00000000042B0000-memory.dmp modiloader_stage2 behavioral3/memory/2156-20-0x00000000032B0000-0x00000000042B0000-memory.dmp modiloader_stage2 behavioral3/memory/2156-17-0x00000000032B0000-0x00000000042B0000-memory.dmp modiloader_stage2 behavioral3/memory/2156-14-0x00000000032B0000-0x00000000042B0000-memory.dmp modiloader_stage2 behavioral3/memory/2156-12-0x00000000032B0000-0x00000000042B0000-memory.dmp modiloader_stage2 behavioral3/memory/2156-10-0x00000000032B0000-0x00000000042B0000-memory.dmp modiloader_stage2 behavioral3/memory/2156-9-0x00000000032B0000-0x00000000042B0000-memory.dmp modiloader_stage2 behavioral3/memory/2156-8-0x00000000032B0000-0x00000000042B0000-memory.dmp modiloader_stage2 behavioral3/memory/2156-7-0x00000000032B0000-0x00000000042B0000-memory.dmp modiloader_stage2 behavioral3/memory/2156-6-0x00000000032B0000-0x00000000042B0000-memory.dmp modiloader_stage2 behavioral3/memory/2156-58-0x00000000032B0000-0x00000000042B0000-memory.dmp modiloader_stage2 behavioral3/memory/2156-56-0x00000000032B0000-0x00000000042B0000-memory.dmp modiloader_stage2 behavioral3/memory/2156-55-0x00000000032B0000-0x00000000042B0000-memory.dmp modiloader_stage2 behavioral3/memory/2156-53-0x00000000032B0000-0x00000000042B0000-memory.dmp modiloader_stage2 behavioral3/memory/2156-52-0x00000000032B0000-0x00000000042B0000-memory.dmp modiloader_stage2 behavioral3/memory/2156-50-0x00000000032B0000-0x00000000042B0000-memory.dmp modiloader_stage2 behavioral3/memory/2156-48-0x00000000032B0000-0x00000000042B0000-memory.dmp modiloader_stage2 behavioral3/memory/2156-47-0x00000000032B0000-0x00000000042B0000-memory.dmp modiloader_stage2 behavioral3/memory/2156-45-0x00000000032B0000-0x00000000042B0000-memory.dmp modiloader_stage2 behavioral3/memory/2156-42-0x00000000032B0000-0x00000000042B0000-memory.dmp modiloader_stage2 behavioral3/memory/2156-41-0x00000000032B0000-0x00000000042B0000-memory.dmp modiloader_stage2 behavioral3/memory/2156-38-0x00000000032B0000-0x00000000042B0000-memory.dmp modiloader_stage2 behavioral3/memory/2156-37-0x00000000032B0000-0x00000000042B0000-memory.dmp modiloader_stage2 behavioral3/memory/2156-35-0x00000000032B0000-0x00000000042B0000-memory.dmp modiloader_stage2 behavioral3/memory/2156-33-0x00000000032B0000-0x00000000042B0000-memory.dmp modiloader_stage2 behavioral3/memory/2156-31-0x00000000032B0000-0x00000000042B0000-memory.dmp modiloader_stage2 behavioral3/memory/2156-30-0x00000000032B0000-0x00000000042B0000-memory.dmp modiloader_stage2 behavioral3/memory/2156-28-0x00000000032B0000-0x00000000042B0000-memory.dmp modiloader_stage2 behavioral3/memory/2156-26-0x00000000032B0000-0x00000000042B0000-memory.dmp modiloader_stage2 behavioral3/memory/2156-24-0x00000000032B0000-0x00000000042B0000-memory.dmp modiloader_stage2 behavioral3/memory/2156-21-0x00000000032B0000-0x00000000042B0000-memory.dmp modiloader_stage2 behavioral3/memory/2156-19-0x00000000032B0000-0x00000000042B0000-memory.dmp modiloader_stage2 behavioral3/memory/2156-18-0x00000000032B0000-0x00000000042B0000-memory.dmp modiloader_stage2 behavioral3/memory/2156-16-0x00000000032B0000-0x00000000042B0000-memory.dmp modiloader_stage2 behavioral3/memory/2156-15-0x00000000032B0000-0x00000000042B0000-memory.dmp modiloader_stage2 behavioral3/memory/2156-13-0x00000000032B0000-0x00000000042B0000-memory.dmp modiloader_stage2 -
Program crash 1 IoCs
pid pid_target Process procid_target 3020 2156 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Krcdanwiedyoqk.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2156 wrote to memory of 3020 2156 Krcdanwiedyoqk.exe 31 PID 2156 wrote to memory of 3020 2156 Krcdanwiedyoqk.exe 31 PID 2156 wrote to memory of 3020 2156 Krcdanwiedyoqk.exe 31 PID 2156 wrote to memory of 3020 2156 Krcdanwiedyoqk.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Krcdanwiedyoqk.exe"C:\Users\Admin\AppData\Local\Temp\Krcdanwiedyoqk.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2156 -s 6922⤵
- Program crash
PID:3020
-