Analysis
-
max time kernel
73s -
max time network
27s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
26/11/2024, 07:11
Static task
static1
Behavioral task
behavioral1
Sample
0161d30defee14b9bdac49068c63a344320c11330acdfc10952c025637684adb.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
0161d30defee14b9bdac49068c63a344320c11330acdfc10952c025637684adb.exe
Resource
win10v2004-20241007-en
General
-
Target
0161d30defee14b9bdac49068c63a344320c11330acdfc10952c025637684adb.exe
-
Size
1.2MB
-
MD5
53f0663219e6091cecd600c59389711f
-
SHA1
f1986a61c2cb0107444fbd3e8075a25e21fb26ca
-
SHA256
0161d30defee14b9bdac49068c63a344320c11330acdfc10952c025637684adb
-
SHA512
9d466680cc90f57ada29495e32592084ec6daf37cdc53f2776a720d66f0284b09c619a25c9ede8e73e91b8c20d2a7ab5dfee0504ba7454389ce842afd27962a1
-
SSDEEP
24576:KdKnJlmwhG7vohKM4br2gza6HR2zlPQxL/F99UljJes8lSnQ:KCl70YOLSes8lSQ
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 61 IoCs
resource yara_rule behavioral1/memory/1740-2-0x00000000032A0000-0x00000000042A0000-memory.dmp modiloader_stage2 behavioral1/memory/1740-6-0x00000000032A0000-0x00000000042A0000-memory.dmp modiloader_stage2 behavioral1/memory/1740-8-0x00000000032A0000-0x00000000042A0000-memory.dmp modiloader_stage2 behavioral1/memory/1740-39-0x00000000032A0000-0x00000000042A0000-memory.dmp modiloader_stage2 behavioral1/memory/1740-41-0x00000000032A0000-0x00000000042A0000-memory.dmp modiloader_stage2 behavioral1/memory/1740-19-0x00000000032A0000-0x00000000042A0000-memory.dmp modiloader_stage2 behavioral1/memory/1740-11-0x00000000032A0000-0x00000000042A0000-memory.dmp modiloader_stage2 behavioral1/memory/1740-47-0x00000000032A0000-0x00000000042A0000-memory.dmp modiloader_stage2 behavioral1/memory/1740-49-0x00000000032A0000-0x00000000042A0000-memory.dmp modiloader_stage2 behavioral1/memory/1740-12-0x00000000032A0000-0x00000000042A0000-memory.dmp modiloader_stage2 behavioral1/memory/1740-52-0x00000000032A0000-0x00000000042A0000-memory.dmp modiloader_stage2 behavioral1/memory/1740-55-0x00000000032A0000-0x00000000042A0000-memory.dmp modiloader_stage2 behavioral1/memory/1740-23-0x00000000032A0000-0x00000000042A0000-memory.dmp modiloader_stage2 behavioral1/memory/1740-60-0x00000000032A0000-0x00000000042A0000-memory.dmp modiloader_stage2 behavioral1/memory/1740-7-0x00000000032A0000-0x00000000042A0000-memory.dmp modiloader_stage2 behavioral1/memory/1740-64-0x00000000032A0000-0x00000000042A0000-memory.dmp modiloader_stage2 behavioral1/memory/1740-24-0x00000000032A0000-0x00000000042A0000-memory.dmp modiloader_stage2 behavioral1/memory/1740-14-0x00000000032A0000-0x00000000042A0000-memory.dmp modiloader_stage2 behavioral1/memory/1740-68-0x00000000032A0000-0x00000000042A0000-memory.dmp modiloader_stage2 behavioral1/memory/1740-26-0x00000000032A0000-0x00000000042A0000-memory.dmp modiloader_stage2 behavioral1/memory/1740-27-0x00000000032A0000-0x00000000042A0000-memory.dmp modiloader_stage2 behavioral1/memory/1740-75-0x00000000032A0000-0x00000000042A0000-memory.dmp modiloader_stage2 behavioral1/memory/1740-9-0x00000000032A0000-0x00000000042A0000-memory.dmp modiloader_stage2 behavioral1/memory/1740-28-0x00000000032A0000-0x00000000042A0000-memory.dmp modiloader_stage2 behavioral1/memory/1740-80-0x00000000032A0000-0x00000000042A0000-memory.dmp modiloader_stage2 behavioral1/memory/1740-83-0x00000000032A0000-0x00000000042A0000-memory.dmp modiloader_stage2 behavioral1/memory/1740-85-0x00000000032A0000-0x00000000042A0000-memory.dmp modiloader_stage2 behavioral1/memory/1740-17-0x00000000032A0000-0x00000000042A0000-memory.dmp modiloader_stage2 behavioral1/memory/1740-59-0x00000000032A0000-0x00000000042A0000-memory.dmp modiloader_stage2 behavioral1/memory/1740-57-0x00000000032A0000-0x00000000042A0000-memory.dmp modiloader_stage2 behavioral1/memory/1740-69-0x00000000032A0000-0x00000000042A0000-memory.dmp modiloader_stage2 behavioral1/memory/1740-25-0x00000000032A0000-0x00000000042A0000-memory.dmp modiloader_stage2 behavioral1/memory/1740-66-0x00000000032A0000-0x00000000042A0000-memory.dmp modiloader_stage2 behavioral1/memory/1740-70-0x00000000032A0000-0x00000000042A0000-memory.dmp modiloader_stage2 behavioral1/memory/1740-15-0x00000000032A0000-0x00000000042A0000-memory.dmp modiloader_stage2 behavioral1/memory/1740-65-0x00000000032A0000-0x00000000042A0000-memory.dmp modiloader_stage2 behavioral1/memory/1740-13-0x00000000032A0000-0x00000000042A0000-memory.dmp modiloader_stage2 behavioral1/memory/1740-74-0x00000000032A0000-0x00000000042A0000-memory.dmp modiloader_stage2 behavioral1/memory/1740-62-0x00000000032A0000-0x00000000042A0000-memory.dmp modiloader_stage2 behavioral1/memory/1740-78-0x00000000032A0000-0x00000000042A0000-memory.dmp modiloader_stage2 behavioral1/memory/1740-84-0x00000000032A0000-0x00000000042A0000-memory.dmp modiloader_stage2 behavioral1/memory/1740-16-0x00000000032A0000-0x00000000042A0000-memory.dmp modiloader_stage2 behavioral1/memory/1740-81-0x00000000032A0000-0x00000000042A0000-memory.dmp modiloader_stage2 behavioral1/memory/1740-22-0x00000000032A0000-0x00000000042A0000-memory.dmp modiloader_stage2 behavioral1/memory/1740-18-0x00000000032A0000-0x00000000042A0000-memory.dmp modiloader_stage2 behavioral1/memory/1740-54-0x00000000032A0000-0x00000000042A0000-memory.dmp modiloader_stage2 behavioral1/memory/1740-53-0x00000000032A0000-0x00000000042A0000-memory.dmp modiloader_stage2 behavioral1/memory/1740-21-0x00000000032A0000-0x00000000042A0000-memory.dmp modiloader_stage2 behavioral1/memory/1740-50-0x00000000032A0000-0x00000000042A0000-memory.dmp modiloader_stage2 behavioral1/memory/1740-48-0x00000000032A0000-0x00000000042A0000-memory.dmp modiloader_stage2 behavioral1/memory/1740-46-0x00000000032A0000-0x00000000042A0000-memory.dmp modiloader_stage2 behavioral1/memory/1740-45-0x00000000032A0000-0x00000000042A0000-memory.dmp modiloader_stage2 behavioral1/memory/1740-43-0x00000000032A0000-0x00000000042A0000-memory.dmp modiloader_stage2 behavioral1/memory/1740-20-0x00000000032A0000-0x00000000042A0000-memory.dmp modiloader_stage2 behavioral1/memory/1740-40-0x00000000032A0000-0x00000000042A0000-memory.dmp modiloader_stage2 behavioral1/memory/1740-38-0x00000000032A0000-0x00000000042A0000-memory.dmp modiloader_stage2 behavioral1/memory/1740-63-0x00000000032A0000-0x00000000042A0000-memory.dmp modiloader_stage2 behavioral1/memory/1740-29-0x00000000032A0000-0x00000000042A0000-memory.dmp modiloader_stage2 behavioral1/memory/1740-36-0x00000000032A0000-0x00000000042A0000-memory.dmp modiloader_stage2 behavioral1/memory/1740-34-0x00000000032A0000-0x00000000042A0000-memory.dmp modiloader_stage2 behavioral1/memory/1740-10-0x00000000032A0000-0x00000000042A0000-memory.dmp modiloader_stage2 -
Program crash 1 IoCs
pid pid_target Process procid_target 1084 1740 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0161d30defee14b9bdac49068c63a344320c11330acdfc10952c025637684adb.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1740 wrote to memory of 1084 1740 0161d30defee14b9bdac49068c63a344320c11330acdfc10952c025637684adb.exe 30 PID 1740 wrote to memory of 1084 1740 0161d30defee14b9bdac49068c63a344320c11330acdfc10952c025637684adb.exe 30 PID 1740 wrote to memory of 1084 1740 0161d30defee14b9bdac49068c63a344320c11330acdfc10952c025637684adb.exe 30 PID 1740 wrote to memory of 1084 1740 0161d30defee14b9bdac49068c63a344320c11330acdfc10952c025637684adb.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\0161d30defee14b9bdac49068c63a344320c11330acdfc10952c025637684adb.exe"C:\Users\Admin\AppData\Local\Temp\0161d30defee14b9bdac49068c63a344320c11330acdfc10952c025637684adb.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1740 -s 7082⤵
- Program crash
PID:1084
-