Analysis
-
max time kernel
117s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
23-10-2024 08:27
Static task
static1
Behavioral task
behavioral1
Sample
Krcdanwiedyoqk.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Krcdanwiedyoqk.exe
Resource
win10v2004-20241007-en
General
-
Target
Krcdanwiedyoqk.exe
-
Size
1.1MB
-
MD5
da449c2d60fe9adb096242dd71db10c8
-
SHA1
55276aa1b212c91e997d70deac1595528234fc96
-
SHA256
57a211664560494ee01af527f281a3fcc9727c15c322122d283e5213a11ab3d3
-
SHA512
1c20999f7295b4c38af4c48dfe34b6738522028a984e0df1f9375212700f6297c69c4e154352b90fd0dce30bda07a54d155a76c9475acd35e7962eba6b458b34
-
SSDEEP
24576:rCtVqnbUQ25Qm2XzuiYcx3RqrPBzKRfuHpEqiyu5T5:rkabmuYc3qrWyuv
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 61 IoCs
resource yara_rule behavioral1/memory/1700-2-0x0000000003290000-0x0000000004290000-memory.dmp modiloader_stage2 behavioral1/memory/1700-8-0x0000000003290000-0x0000000004290000-memory.dmp modiloader_stage2 behavioral1/memory/1700-17-0x0000000003290000-0x0000000004290000-memory.dmp modiloader_stage2 behavioral1/memory/1700-16-0x0000000003290000-0x0000000004290000-memory.dmp modiloader_stage2 behavioral1/memory/1700-15-0x0000000003290000-0x0000000004290000-memory.dmp modiloader_stage2 behavioral1/memory/1700-19-0x0000000003290000-0x0000000004290000-memory.dmp modiloader_stage2 behavioral1/memory/1700-14-0x0000000003290000-0x0000000004290000-memory.dmp modiloader_stage2 behavioral1/memory/1700-13-0x0000000003290000-0x0000000004290000-memory.dmp modiloader_stage2 behavioral1/memory/1700-22-0x0000000003290000-0x0000000004290000-memory.dmp modiloader_stage2 behavioral1/memory/1700-12-0x0000000003290000-0x0000000004290000-memory.dmp modiloader_stage2 behavioral1/memory/1700-11-0x0000000003290000-0x0000000004290000-memory.dmp modiloader_stage2 behavioral1/memory/1700-24-0x0000000003290000-0x0000000004290000-memory.dmp modiloader_stage2 behavioral1/memory/1700-10-0x0000000003290000-0x0000000004290000-memory.dmp modiloader_stage2 behavioral1/memory/1700-28-0x0000000003290000-0x0000000004290000-memory.dmp modiloader_stage2 behavioral1/memory/1700-7-0x0000000003290000-0x0000000004290000-memory.dmp modiloader_stage2 behavioral1/memory/1700-6-0x0000000003290000-0x0000000004290000-memory.dmp modiloader_stage2 behavioral1/memory/1700-30-0x0000000003290000-0x0000000004290000-memory.dmp modiloader_stage2 behavioral1/memory/1700-34-0x0000000003290000-0x0000000004290000-memory.dmp modiloader_stage2 behavioral1/memory/1700-38-0x0000000003290000-0x0000000004290000-memory.dmp modiloader_stage2 behavioral1/memory/1700-41-0x0000000003290000-0x0000000004290000-memory.dmp modiloader_stage2 behavioral1/memory/1700-45-0x0000000003290000-0x0000000004290000-memory.dmp modiloader_stage2 behavioral1/memory/1700-48-0x0000000003290000-0x0000000004290000-memory.dmp modiloader_stage2 behavioral1/memory/1700-52-0x0000000003290000-0x0000000004290000-memory.dmp modiloader_stage2 behavioral1/memory/1700-54-0x0000000003290000-0x0000000004290000-memory.dmp modiloader_stage2 behavioral1/memory/1700-58-0x0000000003290000-0x0000000004290000-memory.dmp modiloader_stage2 behavioral1/memory/1700-60-0x0000000003290000-0x0000000004290000-memory.dmp modiloader_stage2 behavioral1/memory/1700-62-0x0000000003290000-0x0000000004290000-memory.dmp modiloader_stage2 behavioral1/memory/1700-65-0x0000000003290000-0x0000000004290000-memory.dmp modiloader_stage2 behavioral1/memory/1700-9-0x0000000003290000-0x0000000004290000-memory.dmp modiloader_stage2 behavioral1/memory/1700-50-0x0000000003290000-0x0000000004290000-memory.dmp modiloader_stage2 behavioral1/memory/1700-64-0x0000000003290000-0x0000000004290000-memory.dmp modiloader_stage2 behavioral1/memory/1700-63-0x0000000003290000-0x0000000004290000-memory.dmp modiloader_stage2 behavioral1/memory/1700-61-0x0000000003290000-0x0000000004290000-memory.dmp modiloader_stage2 behavioral1/memory/1700-59-0x0000000003290000-0x0000000004290000-memory.dmp modiloader_stage2 behavioral1/memory/1700-57-0x0000000003290000-0x0000000004290000-memory.dmp modiloader_stage2 behavioral1/memory/1700-56-0x0000000003290000-0x0000000004290000-memory.dmp modiloader_stage2 behavioral1/memory/1700-55-0x0000000003290000-0x0000000004290000-memory.dmp modiloader_stage2 behavioral1/memory/1700-53-0x0000000003290000-0x0000000004290000-memory.dmp modiloader_stage2 behavioral1/memory/1700-51-0x0000000003290000-0x0000000004290000-memory.dmp modiloader_stage2 behavioral1/memory/1700-49-0x0000000003290000-0x0000000004290000-memory.dmp modiloader_stage2 behavioral1/memory/1700-47-0x0000000003290000-0x0000000004290000-memory.dmp modiloader_stage2 behavioral1/memory/1700-46-0x0000000003290000-0x0000000004290000-memory.dmp modiloader_stage2 behavioral1/memory/1700-44-0x0000000003290000-0x0000000004290000-memory.dmp modiloader_stage2 behavioral1/memory/1700-43-0x0000000003290000-0x0000000004290000-memory.dmp modiloader_stage2 behavioral1/memory/1700-42-0x0000000003290000-0x0000000004290000-memory.dmp modiloader_stage2 behavioral1/memory/1700-40-0x0000000003290000-0x0000000004290000-memory.dmp modiloader_stage2 behavioral1/memory/1700-39-0x0000000003290000-0x0000000004290000-memory.dmp modiloader_stage2 behavioral1/memory/1700-37-0x0000000003290000-0x0000000004290000-memory.dmp modiloader_stage2 behavioral1/memory/1700-36-0x0000000003290000-0x0000000004290000-memory.dmp modiloader_stage2 behavioral1/memory/1700-35-0x0000000003290000-0x0000000004290000-memory.dmp modiloader_stage2 behavioral1/memory/1700-33-0x0000000003290000-0x0000000004290000-memory.dmp modiloader_stage2 behavioral1/memory/1700-32-0x0000000003290000-0x0000000004290000-memory.dmp modiloader_stage2 behavioral1/memory/1700-31-0x0000000003290000-0x0000000004290000-memory.dmp modiloader_stage2 behavioral1/memory/1700-29-0x0000000003290000-0x0000000004290000-memory.dmp modiloader_stage2 behavioral1/memory/1700-27-0x0000000003290000-0x0000000004290000-memory.dmp modiloader_stage2 behavioral1/memory/1700-26-0x0000000003290000-0x0000000004290000-memory.dmp modiloader_stage2 behavioral1/memory/1700-25-0x0000000003290000-0x0000000004290000-memory.dmp modiloader_stage2 behavioral1/memory/1700-23-0x0000000003290000-0x0000000004290000-memory.dmp modiloader_stage2 behavioral1/memory/1700-21-0x0000000003290000-0x0000000004290000-memory.dmp modiloader_stage2 behavioral1/memory/1700-20-0x0000000003290000-0x0000000004290000-memory.dmp modiloader_stage2 behavioral1/memory/1700-18-0x0000000003290000-0x0000000004290000-memory.dmp modiloader_stage2 -
Program crash 1 IoCs
pid pid_target Process procid_target 740 1700 WerFault.exe 27 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Krcdanwiedyoqk.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1700 wrote to memory of 740 1700 Krcdanwiedyoqk.exe 28 PID 1700 wrote to memory of 740 1700 Krcdanwiedyoqk.exe 28 PID 1700 wrote to memory of 740 1700 Krcdanwiedyoqk.exe 28 PID 1700 wrote to memory of 740 1700 Krcdanwiedyoqk.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\Krcdanwiedyoqk.exe"C:\Users\Admin\AppData\Local\Temp\Krcdanwiedyoqk.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1700 -s 6962⤵
- Program crash
PID:740
-