Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-11-2024 13:29
Static task
static1
Behavioral task
behavioral1
Sample
23b47a050614d71d7081f8e0313c972e9e6b1df6c9eec10f59b6ee06d0506ec9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
23b47a050614d71d7081f8e0313c972e9e6b1df6c9eec10f59b6ee06d0506ec9.exe
Resource
win10v2004-20241007-en
General
-
Target
23b47a050614d71d7081f8e0313c972e9e6b1df6c9eec10f59b6ee06d0506ec9.exe
-
Size
1.0MB
-
MD5
bdc3b662d1136f20f51f55a0f6a2fb9d
-
SHA1
ef8baad4f0f3f96e2d04f3c6cea1471bcd651008
-
SHA256
23b47a050614d71d7081f8e0313c972e9e6b1df6c9eec10f59b6ee06d0506ec9
-
SHA512
29036ced934c7668b072c811285761a2b4cdd562b2d269e50be767e8be27589117e84bf0f34b0323912a3dea4545dab9b9e5a6046c8beb36d15ef65056a88ad8
-
SSDEEP
24576:/GBqWzMJ3rInJFhR1T6a3R6ZFlR+gKT44VoIOL7zk:/CHnca8YL6L
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 61 IoCs
Processes:
resource yara_rule behavioral1/memory/1672-3-0x00000000033D0000-0x00000000043D0000-memory.dmp modiloader_stage2 behavioral1/memory/1672-6-0x00000000033D0000-0x00000000043D0000-memory.dmp modiloader_stage2 behavioral1/memory/1672-13-0x00000000033D0000-0x00000000043D0000-memory.dmp modiloader_stage2 behavioral1/memory/1672-12-0x00000000033D0000-0x00000000043D0000-memory.dmp modiloader_stage2 behavioral1/memory/1672-11-0x00000000033D0000-0x00000000043D0000-memory.dmp modiloader_stage2 behavioral1/memory/1672-10-0x00000000033D0000-0x00000000043D0000-memory.dmp modiloader_stage2 behavioral1/memory/1672-8-0x00000000033D0000-0x00000000043D0000-memory.dmp modiloader_stage2 behavioral1/memory/1672-7-0x00000000033D0000-0x00000000043D0000-memory.dmp modiloader_stage2 behavioral1/memory/1672-14-0x00000000033D0000-0x00000000043D0000-memory.dmp modiloader_stage2 behavioral1/memory/1672-16-0x00000000033D0000-0x00000000043D0000-memory.dmp modiloader_stage2 behavioral1/memory/1672-18-0x00000000033D0000-0x00000000043D0000-memory.dmp modiloader_stage2 behavioral1/memory/1672-19-0x00000000033D0000-0x00000000043D0000-memory.dmp modiloader_stage2 behavioral1/memory/1672-20-0x00000000033D0000-0x00000000043D0000-memory.dmp modiloader_stage2 behavioral1/memory/1672-21-0x00000000033D0000-0x00000000043D0000-memory.dmp modiloader_stage2 behavioral1/memory/1672-9-0x00000000033D0000-0x00000000043D0000-memory.dmp modiloader_stage2 behavioral1/memory/1672-24-0x00000000033D0000-0x00000000043D0000-memory.dmp modiloader_stage2 behavioral1/memory/1672-26-0x00000000033D0000-0x00000000043D0000-memory.dmp modiloader_stage2 behavioral1/memory/1672-29-0x00000000033D0000-0x00000000043D0000-memory.dmp modiloader_stage2 behavioral1/memory/1672-15-0x00000000033D0000-0x00000000043D0000-memory.dmp modiloader_stage2 behavioral1/memory/1672-32-0x00000000033D0000-0x00000000043D0000-memory.dmp modiloader_stage2 behavioral1/memory/1672-36-0x00000000033D0000-0x00000000043D0000-memory.dmp modiloader_stage2 behavioral1/memory/1672-34-0x00000000033D0000-0x00000000043D0000-memory.dmp modiloader_stage2 behavioral1/memory/1672-40-0x00000000033D0000-0x00000000043D0000-memory.dmp modiloader_stage2 behavioral1/memory/1672-38-0x00000000033D0000-0x00000000043D0000-memory.dmp modiloader_stage2 behavioral1/memory/1672-42-0x00000000033D0000-0x00000000043D0000-memory.dmp modiloader_stage2 behavioral1/memory/1672-47-0x00000000033D0000-0x00000000043D0000-memory.dmp modiloader_stage2 behavioral1/memory/1672-48-0x00000000033D0000-0x00000000043D0000-memory.dmp modiloader_stage2 behavioral1/memory/1672-44-0x00000000033D0000-0x00000000043D0000-memory.dmp modiloader_stage2 behavioral1/memory/1672-45-0x00000000033D0000-0x00000000043D0000-memory.dmp modiloader_stage2 behavioral1/memory/1672-17-0x00000000033D0000-0x00000000043D0000-memory.dmp modiloader_stage2 behavioral1/memory/1672-49-0x00000000033D0000-0x00000000043D0000-memory.dmp modiloader_stage2 behavioral1/memory/1672-31-0x00000000033D0000-0x00000000043D0000-memory.dmp modiloader_stage2 behavioral1/memory/1672-53-0x00000000033D0000-0x00000000043D0000-memory.dmp modiloader_stage2 behavioral1/memory/1672-55-0x00000000033D0000-0x00000000043D0000-memory.dmp modiloader_stage2 behavioral1/memory/1672-57-0x00000000033D0000-0x00000000043D0000-memory.dmp modiloader_stage2 behavioral1/memory/1672-59-0x00000000033D0000-0x00000000043D0000-memory.dmp modiloader_stage2 behavioral1/memory/1672-61-0x00000000033D0000-0x00000000043D0000-memory.dmp modiloader_stage2 behavioral1/memory/1672-64-0x00000000033D0000-0x00000000043D0000-memory.dmp modiloader_stage2 behavioral1/memory/1672-66-0x00000000033D0000-0x00000000043D0000-memory.dmp modiloader_stage2 behavioral1/memory/1672-70-0x00000000033D0000-0x00000000043D0000-memory.dmp modiloader_stage2 behavioral1/memory/1672-67-0x00000000033D0000-0x00000000043D0000-memory.dmp modiloader_stage2 behavioral1/memory/1672-72-0x00000000033D0000-0x00000000043D0000-memory.dmp modiloader_stage2 behavioral1/memory/1672-76-0x00000000033D0000-0x00000000043D0000-memory.dmp modiloader_stage2 behavioral1/memory/1672-73-0x00000000033D0000-0x00000000043D0000-memory.dmp modiloader_stage2 behavioral1/memory/1672-78-0x00000000033D0000-0x00000000043D0000-memory.dmp modiloader_stage2 behavioral1/memory/1672-80-0x00000000033D0000-0x00000000043D0000-memory.dmp modiloader_stage2 behavioral1/memory/1672-82-0x00000000033D0000-0x00000000043D0000-memory.dmp modiloader_stage2 behavioral1/memory/1672-84-0x00000000033D0000-0x00000000043D0000-memory.dmp modiloader_stage2 behavioral1/memory/1672-30-0x00000000033D0000-0x00000000043D0000-memory.dmp modiloader_stage2 behavioral1/memory/1672-46-0x00000000033D0000-0x00000000043D0000-memory.dmp modiloader_stage2 behavioral1/memory/1672-43-0x00000000033D0000-0x00000000043D0000-memory.dmp modiloader_stage2 behavioral1/memory/1672-41-0x00000000033D0000-0x00000000043D0000-memory.dmp modiloader_stage2 behavioral1/memory/1672-39-0x00000000033D0000-0x00000000043D0000-memory.dmp modiloader_stage2 behavioral1/memory/1672-37-0x00000000033D0000-0x00000000043D0000-memory.dmp modiloader_stage2 behavioral1/memory/1672-35-0x00000000033D0000-0x00000000043D0000-memory.dmp modiloader_stage2 behavioral1/memory/1672-33-0x00000000033D0000-0x00000000043D0000-memory.dmp modiloader_stage2 behavioral1/memory/1672-28-0x00000000033D0000-0x00000000043D0000-memory.dmp modiloader_stage2 behavioral1/memory/1672-27-0x00000000033D0000-0x00000000043D0000-memory.dmp modiloader_stage2 behavioral1/memory/1672-25-0x00000000033D0000-0x00000000043D0000-memory.dmp modiloader_stage2 behavioral1/memory/1672-23-0x00000000033D0000-0x00000000043D0000-memory.dmp modiloader_stage2 behavioral1/memory/1672-22-0x00000000033D0000-0x00000000043D0000-memory.dmp modiloader_stage2 -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 944 1672 WerFault.exe 27 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
23b47a050614d71d7081f8e0313c972e9e6b1df6c9eec10f59b6ee06d0506ec9.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 23b47a050614d71d7081f8e0313c972e9e6b1df6c9eec10f59b6ee06d0506ec9.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
23b47a050614d71d7081f8e0313c972e9e6b1df6c9eec10f59b6ee06d0506ec9.exedescription pid Process procid_target PID 1672 wrote to memory of 944 1672 23b47a050614d71d7081f8e0313c972e9e6b1df6c9eec10f59b6ee06d0506ec9.exe 28 PID 1672 wrote to memory of 944 1672 23b47a050614d71d7081f8e0313c972e9e6b1df6c9eec10f59b6ee06d0506ec9.exe 28 PID 1672 wrote to memory of 944 1672 23b47a050614d71d7081f8e0313c972e9e6b1df6c9eec10f59b6ee06d0506ec9.exe 28 PID 1672 wrote to memory of 944 1672 23b47a050614d71d7081f8e0313c972e9e6b1df6c9eec10f59b6ee06d0506ec9.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\23b47a050614d71d7081f8e0313c972e9e6b1df6c9eec10f59b6ee06d0506ec9.exe"C:\Users\Admin\AppData\Local\Temp\23b47a050614d71d7081f8e0313c972e9e6b1df6c9eec10f59b6ee06d0506ec9.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1672 -s 7162⤵
- Program crash
PID:944
-