Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
10-12-2024 06:16
Static task
static1
Behavioral task
behavioral1
Sample
PURCHASEREQUIREDDETAILS000487958790903403.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
PURCHASEREQUIREDDETAILS000487958790903403.exe
Resource
win10v2004-20241007-en
General
-
Target
PURCHASEREQUIREDDETAILS000487958790903403.exe
-
Size
1.2MB
-
MD5
cbeea46a413d2f3d7166104d79788062
-
SHA1
6bca74ac8ef6b5a5377dbd0cac8ce783dda2b080
-
SHA256
5250d7820ffe465180b022c710bb170b02d1aeb8fbb4c530c5e039d4259009ef
-
SHA512
34d3cbbf686869bf5e0c69239f50ebe93d85feff13298afe14d6de6afae7112d3aa4ef64b14d7fe48768c740c635500d2180e709b57494f264853dafc5642b99
-
SSDEEP
24576:zPMPVEhH8frMNVO1wyWYVtcqqvHP7R3Eb1v7kcER8:zPUyOShq0HFA7zER8
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 61 IoCs
resource yara_rule behavioral1/memory/2528-2-0x0000000003250000-0x0000000004250000-memory.dmp modiloader_stage2 behavioral1/memory/2528-10-0x0000000003250000-0x0000000004250000-memory.dmp modiloader_stage2 behavioral1/memory/2528-9-0x0000000003250000-0x0000000004250000-memory.dmp modiloader_stage2 behavioral1/memory/2528-8-0x0000000003250000-0x0000000004250000-memory.dmp modiloader_stage2 behavioral1/memory/2528-6-0x0000000003250000-0x0000000004250000-memory.dmp modiloader_stage2 behavioral1/memory/2528-11-0x0000000003250000-0x0000000004250000-memory.dmp modiloader_stage2 behavioral1/memory/2528-13-0x0000000003250000-0x0000000004250000-memory.dmp modiloader_stage2 behavioral1/memory/2528-15-0x0000000003250000-0x0000000004250000-memory.dmp modiloader_stage2 behavioral1/memory/2528-18-0x0000000003250000-0x0000000004250000-memory.dmp modiloader_stage2 behavioral1/memory/2528-20-0x0000000003250000-0x0000000004250000-memory.dmp modiloader_stage2 behavioral1/memory/2528-22-0x0000000003250000-0x0000000004250000-memory.dmp modiloader_stage2 behavioral1/memory/2528-24-0x0000000003250000-0x0000000004250000-memory.dmp modiloader_stage2 behavioral1/memory/2528-27-0x0000000003250000-0x0000000004250000-memory.dmp modiloader_stage2 behavioral1/memory/2528-30-0x0000000003250000-0x0000000004250000-memory.dmp modiloader_stage2 behavioral1/memory/2528-33-0x0000000003250000-0x0000000004250000-memory.dmp modiloader_stage2 behavioral1/memory/2528-36-0x0000000003250000-0x0000000004250000-memory.dmp modiloader_stage2 behavioral1/memory/2528-38-0x0000000003250000-0x0000000004250000-memory.dmp modiloader_stage2 behavioral1/memory/2528-40-0x0000000003250000-0x0000000004250000-memory.dmp modiloader_stage2 behavioral1/memory/2528-43-0x0000000003250000-0x0000000004250000-memory.dmp modiloader_stage2 behavioral1/memory/2528-45-0x0000000003250000-0x0000000004250000-memory.dmp modiloader_stage2 behavioral1/memory/2528-47-0x0000000003250000-0x0000000004250000-memory.dmp modiloader_stage2 behavioral1/memory/2528-49-0x0000000003250000-0x0000000004250000-memory.dmp modiloader_stage2 behavioral1/memory/2528-52-0x0000000003250000-0x0000000004250000-memory.dmp modiloader_stage2 behavioral1/memory/2528-54-0x0000000003250000-0x0000000004250000-memory.dmp modiloader_stage2 behavioral1/memory/2528-56-0x0000000003250000-0x0000000004250000-memory.dmp modiloader_stage2 behavioral1/memory/2528-59-0x0000000003250000-0x0000000004250000-memory.dmp modiloader_stage2 behavioral1/memory/2528-62-0x0000000003250000-0x0000000004250000-memory.dmp modiloader_stage2 behavioral1/memory/2528-64-0x0000000003250000-0x0000000004250000-memory.dmp modiloader_stage2 behavioral1/memory/2528-12-0x0000000003250000-0x0000000004250000-memory.dmp modiloader_stage2 behavioral1/memory/2528-25-0x0000000003250000-0x0000000004250000-memory.dmp modiloader_stage2 behavioral1/memory/2528-65-0x0000000003250000-0x0000000004250000-memory.dmp modiloader_stage2 behavioral1/memory/2528-63-0x0000000003250000-0x0000000004250000-memory.dmp modiloader_stage2 behavioral1/memory/2528-61-0x0000000003250000-0x0000000004250000-memory.dmp modiloader_stage2 behavioral1/memory/2528-60-0x0000000003250000-0x0000000004250000-memory.dmp modiloader_stage2 behavioral1/memory/2528-58-0x0000000003250000-0x0000000004250000-memory.dmp modiloader_stage2 behavioral1/memory/2528-57-0x0000000003250000-0x0000000004250000-memory.dmp modiloader_stage2 behavioral1/memory/2528-55-0x0000000003250000-0x0000000004250000-memory.dmp modiloader_stage2 behavioral1/memory/2528-53-0x0000000003250000-0x0000000004250000-memory.dmp modiloader_stage2 behavioral1/memory/2528-51-0x0000000003250000-0x0000000004250000-memory.dmp modiloader_stage2 behavioral1/memory/2528-50-0x0000000003250000-0x0000000004250000-memory.dmp modiloader_stage2 behavioral1/memory/2528-48-0x0000000003250000-0x0000000004250000-memory.dmp modiloader_stage2 behavioral1/memory/2528-46-0x0000000003250000-0x0000000004250000-memory.dmp modiloader_stage2 behavioral1/memory/2528-44-0x0000000003250000-0x0000000004250000-memory.dmp modiloader_stage2 behavioral1/memory/2528-42-0x0000000003250000-0x0000000004250000-memory.dmp modiloader_stage2 behavioral1/memory/2528-41-0x0000000003250000-0x0000000004250000-memory.dmp modiloader_stage2 behavioral1/memory/2528-39-0x0000000003250000-0x0000000004250000-memory.dmp modiloader_stage2 behavioral1/memory/2528-37-0x0000000003250000-0x0000000004250000-memory.dmp modiloader_stage2 behavioral1/memory/2528-35-0x0000000003250000-0x0000000004250000-memory.dmp modiloader_stage2 behavioral1/memory/2528-34-0x0000000003250000-0x0000000004250000-memory.dmp modiloader_stage2 behavioral1/memory/2528-32-0x0000000003250000-0x0000000004250000-memory.dmp modiloader_stage2 behavioral1/memory/2528-31-0x0000000003250000-0x0000000004250000-memory.dmp modiloader_stage2 behavioral1/memory/2528-29-0x0000000003250000-0x0000000004250000-memory.dmp modiloader_stage2 behavioral1/memory/2528-28-0x0000000003250000-0x0000000004250000-memory.dmp modiloader_stage2 behavioral1/memory/2528-26-0x0000000003250000-0x0000000004250000-memory.dmp modiloader_stage2 behavioral1/memory/2528-23-0x0000000003250000-0x0000000004250000-memory.dmp modiloader_stage2 behavioral1/memory/2528-21-0x0000000003250000-0x0000000004250000-memory.dmp modiloader_stage2 behavioral1/memory/2528-19-0x0000000003250000-0x0000000004250000-memory.dmp modiloader_stage2 behavioral1/memory/2528-17-0x0000000003250000-0x0000000004250000-memory.dmp modiloader_stage2 behavioral1/memory/2528-16-0x0000000003250000-0x0000000004250000-memory.dmp modiloader_stage2 behavioral1/memory/2528-14-0x0000000003250000-0x0000000004250000-memory.dmp modiloader_stage2 behavioral1/memory/2528-7-0x0000000003250000-0x0000000004250000-memory.dmp modiloader_stage2 -
Program crash 1 IoCs
pid pid_target Process procid_target 804 2528 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PURCHASEREQUIREDDETAILS000487958790903403.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2528 wrote to memory of 804 2528 PURCHASEREQUIREDDETAILS000487958790903403.exe 31 PID 2528 wrote to memory of 804 2528 PURCHASEREQUIREDDETAILS000487958790903403.exe 31 PID 2528 wrote to memory of 804 2528 PURCHASEREQUIREDDETAILS000487958790903403.exe 31 PID 2528 wrote to memory of 804 2528 PURCHASEREQUIREDDETAILS000487958790903403.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\PURCHASEREQUIREDDETAILS000487958790903403.exe"C:\Users\Admin\AppData\Local\Temp\PURCHASEREQUIREDDETAILS000487958790903403.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2528 -s 7082⤵
- Program crash
PID:804
-