Analysis
-
max time kernel
117s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 01:51
Static task
static1
Behavioral task
behavioral1
Sample
054899796d592bb5f70b0a9fa28429024a919270a76603626be24068faae59d9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
054899796d592bb5f70b0a9fa28429024a919270a76603626be24068faae59d9.exe
Resource
win10v2004-20241007-en
General
-
Target
054899796d592bb5f70b0a9fa28429024a919270a76603626be24068faae59d9.exe
-
Size
1.3MB
-
MD5
67dac6ae9ee770115db85cc71979dc41
-
SHA1
a708539ebb312329f56f064a8491e4c6e1bd7ce8
-
SHA256
054899796d592bb5f70b0a9fa28429024a919270a76603626be24068faae59d9
-
SHA512
9ff88c70d4a2f7628a2f853d576b8e7d7ebf3409de13d56895a06eb2fdc827beef45ec982dbc69a9577ed78d27d44f5df2284cdf614ba4debadaf74cd07c204d
-
SSDEEP
24576:in5YMTKJPtU65L4oU78G6Hd8b2s17EeL4fFyV2vkSotd/ADgKczxj5z:wzGSkfQJSgK
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 61 IoCs
Processes:
resource yara_rule behavioral1/memory/2260-2-0x0000000003820000-0x0000000004820000-memory.dmp modiloader_stage2 behavioral1/memory/2260-6-0x0000000003820000-0x0000000004820000-memory.dmp modiloader_stage2 behavioral1/memory/2260-7-0x0000000003820000-0x0000000004820000-memory.dmp modiloader_stage2 behavioral1/memory/2260-9-0x0000000003820000-0x0000000004820000-memory.dmp modiloader_stage2 behavioral1/memory/2260-13-0x0000000003820000-0x0000000004820000-memory.dmp modiloader_stage2 behavioral1/memory/2260-20-0x0000000003820000-0x0000000004820000-memory.dmp modiloader_stage2 behavioral1/memory/2260-32-0x0000000003820000-0x0000000004820000-memory.dmp modiloader_stage2 behavioral1/memory/2260-82-0x0000000003820000-0x0000000004820000-memory.dmp modiloader_stage2 behavioral1/memory/2260-48-0x0000000003820000-0x0000000004820000-memory.dmp modiloader_stage2 behavioral1/memory/2260-46-0x0000000003820000-0x0000000004820000-memory.dmp modiloader_stage2 behavioral1/memory/2260-45-0x0000000003820000-0x0000000004820000-memory.dmp modiloader_stage2 behavioral1/memory/2260-42-0x0000000003820000-0x0000000004820000-memory.dmp modiloader_stage2 behavioral1/memory/2260-40-0x0000000003820000-0x0000000004820000-memory.dmp modiloader_stage2 behavioral1/memory/2260-36-0x0000000003820000-0x0000000004820000-memory.dmp modiloader_stage2 behavioral1/memory/2260-35-0x0000000003820000-0x0000000004820000-memory.dmp modiloader_stage2 behavioral1/memory/2260-34-0x0000000003820000-0x0000000004820000-memory.dmp modiloader_stage2 behavioral1/memory/2260-83-0x0000000003820000-0x0000000004820000-memory.dmp modiloader_stage2 behavioral1/memory/2260-79-0x0000000003820000-0x0000000004820000-memory.dmp modiloader_stage2 behavioral1/memory/2260-77-0x0000000003820000-0x0000000004820000-memory.dmp modiloader_stage2 behavioral1/memory/2260-75-0x0000000003820000-0x0000000004820000-memory.dmp modiloader_stage2 behavioral1/memory/2260-72-0x0000000003820000-0x0000000004820000-memory.dmp modiloader_stage2 behavioral1/memory/2260-70-0x0000000003820000-0x0000000004820000-memory.dmp modiloader_stage2 behavioral1/memory/2260-68-0x0000000003820000-0x0000000004820000-memory.dmp modiloader_stage2 behavioral1/memory/2260-66-0x0000000003820000-0x0000000004820000-memory.dmp modiloader_stage2 behavioral1/memory/2260-64-0x0000000003820000-0x0000000004820000-memory.dmp modiloader_stage2 behavioral1/memory/2260-61-0x0000000003820000-0x0000000004820000-memory.dmp modiloader_stage2 behavioral1/memory/2260-59-0x0000000003820000-0x0000000004820000-memory.dmp modiloader_stage2 behavioral1/memory/2260-57-0x0000000003820000-0x0000000004820000-memory.dmp modiloader_stage2 behavioral1/memory/2260-56-0x0000000003820000-0x0000000004820000-memory.dmp modiloader_stage2 behavioral1/memory/2260-54-0x0000000003820000-0x0000000004820000-memory.dmp modiloader_stage2 behavioral1/memory/2260-52-0x0000000003820000-0x0000000004820000-memory.dmp modiloader_stage2 behavioral1/memory/2260-49-0x0000000003820000-0x0000000004820000-memory.dmp modiloader_stage2 behavioral1/memory/2260-47-0x0000000003820000-0x0000000004820000-memory.dmp modiloader_stage2 behavioral1/memory/2260-44-0x0000000003820000-0x0000000004820000-memory.dmp modiloader_stage2 behavioral1/memory/2260-43-0x0000000003820000-0x0000000004820000-memory.dmp modiloader_stage2 behavioral1/memory/2260-41-0x0000000003820000-0x0000000004820000-memory.dmp modiloader_stage2 behavioral1/memory/2260-37-0x0000000003820000-0x0000000004820000-memory.dmp modiloader_stage2 behavioral1/memory/2260-39-0x0000000003820000-0x0000000004820000-memory.dmp modiloader_stage2 behavioral1/memory/2260-38-0x0000000003820000-0x0000000004820000-memory.dmp modiloader_stage2 behavioral1/memory/2260-33-0x0000000003820000-0x0000000004820000-memory.dmp modiloader_stage2 behavioral1/memory/2260-31-0x0000000003820000-0x0000000004820000-memory.dmp modiloader_stage2 behavioral1/memory/2260-30-0x0000000003820000-0x0000000004820000-memory.dmp modiloader_stage2 behavioral1/memory/2260-29-0x0000000003820000-0x0000000004820000-memory.dmp modiloader_stage2 behavioral1/memory/2260-28-0x0000000003820000-0x0000000004820000-memory.dmp modiloader_stage2 behavioral1/memory/2260-27-0x0000000003820000-0x0000000004820000-memory.dmp modiloader_stage2 behavioral1/memory/2260-26-0x0000000003820000-0x0000000004820000-memory.dmp modiloader_stage2 behavioral1/memory/2260-25-0x0000000003820000-0x0000000004820000-memory.dmp modiloader_stage2 behavioral1/memory/2260-24-0x0000000003820000-0x0000000004820000-memory.dmp modiloader_stage2 behavioral1/memory/2260-23-0x0000000003820000-0x0000000004820000-memory.dmp modiloader_stage2 behavioral1/memory/2260-22-0x0000000003820000-0x0000000004820000-memory.dmp modiloader_stage2 behavioral1/memory/2260-21-0x0000000003820000-0x0000000004820000-memory.dmp modiloader_stage2 behavioral1/memory/2260-19-0x0000000003820000-0x0000000004820000-memory.dmp modiloader_stage2 behavioral1/memory/2260-18-0x0000000003820000-0x0000000004820000-memory.dmp modiloader_stage2 behavioral1/memory/2260-17-0x0000000003820000-0x0000000004820000-memory.dmp modiloader_stage2 behavioral1/memory/2260-16-0x0000000003820000-0x0000000004820000-memory.dmp modiloader_stage2 behavioral1/memory/2260-15-0x0000000003820000-0x0000000004820000-memory.dmp modiloader_stage2 behavioral1/memory/2260-14-0x0000000003820000-0x0000000004820000-memory.dmp modiloader_stage2 behavioral1/memory/2260-12-0x0000000003820000-0x0000000004820000-memory.dmp modiloader_stage2 behavioral1/memory/2260-11-0x0000000003820000-0x0000000004820000-memory.dmp modiloader_stage2 behavioral1/memory/2260-10-0x0000000003820000-0x0000000004820000-memory.dmp modiloader_stage2 behavioral1/memory/2260-8-0x0000000003820000-0x0000000004820000-memory.dmp modiloader_stage2 -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1832 2260 WerFault.exe 054899796d592bb5f70b0a9fa28429024a919270a76603626be24068faae59d9.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
054899796d592bb5f70b0a9fa28429024a919270a76603626be24068faae59d9.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 054899796d592bb5f70b0a9fa28429024a919270a76603626be24068faae59d9.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
054899796d592bb5f70b0a9fa28429024a919270a76603626be24068faae59d9.exedescription pid process target process PID 2260 wrote to memory of 1832 2260 054899796d592bb5f70b0a9fa28429024a919270a76603626be24068faae59d9.exe WerFault.exe PID 2260 wrote to memory of 1832 2260 054899796d592bb5f70b0a9fa28429024a919270a76603626be24068faae59d9.exe WerFault.exe PID 2260 wrote to memory of 1832 2260 054899796d592bb5f70b0a9fa28429024a919270a76603626be24068faae59d9.exe WerFault.exe PID 2260 wrote to memory of 1832 2260 054899796d592bb5f70b0a9fa28429024a919270a76603626be24068faae59d9.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\054899796d592bb5f70b0a9fa28429024a919270a76603626be24068faae59d9.exe"C:\Users\Admin\AppData\Local\Temp\054899796d592bb5f70b0a9fa28429024a919270a76603626be24068faae59d9.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2260 -s 7162⤵
- Program crash
PID:1832
-