Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-12-2024 02:35
Static task
static1
Behavioral task
behavioral1
Sample
5250d7820ffe465180b022c710bb170b02d1aeb8fbb4c530c5e039d4259009ef.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5250d7820ffe465180b022c710bb170b02d1aeb8fbb4c530c5e039d4259009ef.exe
Resource
win10v2004-20241007-en
General
-
Target
5250d7820ffe465180b022c710bb170b02d1aeb8fbb4c530c5e039d4259009ef.exe
-
Size
1.2MB
-
MD5
cbeea46a413d2f3d7166104d79788062
-
SHA1
6bca74ac8ef6b5a5377dbd0cac8ce783dda2b080
-
SHA256
5250d7820ffe465180b022c710bb170b02d1aeb8fbb4c530c5e039d4259009ef
-
SHA512
34d3cbbf686869bf5e0c69239f50ebe93d85feff13298afe14d6de6afae7112d3aa4ef64b14d7fe48768c740c635500d2180e709b57494f264853dafc5642b99
-
SSDEEP
24576:zPMPVEhH8frMNVO1wyWYVtcqqvHP7R3Eb1v7kcER8:zPUyOShq0HFA7zER8
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 61 IoCs
resource yara_rule behavioral1/memory/1812-2-0x00000000031C0000-0x00000000041C0000-memory.dmp modiloader_stage2 behavioral1/memory/1812-8-0x00000000031C0000-0x00000000041C0000-memory.dmp modiloader_stage2 behavioral1/memory/1812-7-0x00000000031C0000-0x00000000041C0000-memory.dmp modiloader_stage2 behavioral1/memory/1812-6-0x00000000031C0000-0x00000000041C0000-memory.dmp modiloader_stage2 behavioral1/memory/1812-78-0x00000000031C0000-0x00000000041C0000-memory.dmp modiloader_stage2 behavioral1/memory/1812-75-0x00000000031C0000-0x00000000041C0000-memory.dmp modiloader_stage2 behavioral1/memory/1812-9-0x00000000031C0000-0x00000000041C0000-memory.dmp modiloader_stage2 behavioral1/memory/1812-55-0x00000000031C0000-0x00000000041C0000-memory.dmp modiloader_stage2 behavioral1/memory/1812-54-0x00000000031C0000-0x00000000041C0000-memory.dmp modiloader_stage2 behavioral1/memory/1812-51-0x00000000031C0000-0x00000000041C0000-memory.dmp modiloader_stage2 behavioral1/memory/1812-48-0x00000000031C0000-0x00000000041C0000-memory.dmp modiloader_stage2 behavioral1/memory/1812-47-0x00000000031C0000-0x00000000041C0000-memory.dmp modiloader_stage2 behavioral1/memory/1812-44-0x00000000031C0000-0x00000000041C0000-memory.dmp modiloader_stage2 behavioral1/memory/1812-41-0x00000000031C0000-0x00000000041C0000-memory.dmp modiloader_stage2 behavioral1/memory/1812-38-0x00000000031C0000-0x00000000041C0000-memory.dmp modiloader_stage2 behavioral1/memory/1812-36-0x00000000031C0000-0x00000000041C0000-memory.dmp modiloader_stage2 behavioral1/memory/1812-35-0x00000000031C0000-0x00000000041C0000-memory.dmp modiloader_stage2 behavioral1/memory/1812-32-0x00000000031C0000-0x00000000041C0000-memory.dmp modiloader_stage2 behavioral1/memory/1812-29-0x00000000031C0000-0x00000000041C0000-memory.dmp modiloader_stage2 behavioral1/memory/1812-28-0x00000000031C0000-0x00000000041C0000-memory.dmp modiloader_stage2 behavioral1/memory/1812-27-0x00000000031C0000-0x00000000041C0000-memory.dmp modiloader_stage2 behavioral1/memory/1812-24-0x00000000031C0000-0x00000000041C0000-memory.dmp modiloader_stage2 behavioral1/memory/1812-22-0x00000000031C0000-0x00000000041C0000-memory.dmp modiloader_stage2 behavioral1/memory/1812-21-0x00000000031C0000-0x00000000041C0000-memory.dmp modiloader_stage2 behavioral1/memory/1812-18-0x00000000031C0000-0x00000000041C0000-memory.dmp modiloader_stage2 behavioral1/memory/1812-15-0x00000000031C0000-0x00000000041C0000-memory.dmp modiloader_stage2 behavioral1/memory/1812-11-0x00000000031C0000-0x00000000041C0000-memory.dmp modiloader_stage2 behavioral1/memory/1812-52-0x00000000031C0000-0x00000000041C0000-memory.dmp modiloader_stage2 behavioral1/memory/1812-49-0x00000000031C0000-0x00000000041C0000-memory.dmp modiloader_stage2 behavioral1/memory/1812-45-0x00000000031C0000-0x00000000041C0000-memory.dmp modiloader_stage2 behavioral1/memory/1812-42-0x00000000031C0000-0x00000000041C0000-memory.dmp modiloader_stage2 behavioral1/memory/1812-39-0x00000000031C0000-0x00000000041C0000-memory.dmp modiloader_stage2 behavioral1/memory/1812-34-0x00000000031C0000-0x00000000041C0000-memory.dmp modiloader_stage2 behavioral1/memory/1812-31-0x00000000031C0000-0x00000000041C0000-memory.dmp modiloader_stage2 behavioral1/memory/1812-25-0x00000000031C0000-0x00000000041C0000-memory.dmp modiloader_stage2 behavioral1/memory/1812-19-0x00000000031C0000-0x00000000041C0000-memory.dmp modiloader_stage2 behavioral1/memory/1812-16-0x00000000031C0000-0x00000000041C0000-memory.dmp modiloader_stage2 behavioral1/memory/1812-13-0x00000000031C0000-0x00000000041C0000-memory.dmp modiloader_stage2 behavioral1/memory/1812-84-0x00000000031C0000-0x00000000041C0000-memory.dmp modiloader_stage2 behavioral1/memory/1812-81-0x00000000031C0000-0x00000000041C0000-memory.dmp modiloader_stage2 behavioral1/memory/1812-72-0x00000000031C0000-0x00000000041C0000-memory.dmp modiloader_stage2 behavioral1/memory/1812-69-0x00000000031C0000-0x00000000041C0000-memory.dmp modiloader_stage2 behavioral1/memory/1812-67-0x00000000031C0000-0x00000000041C0000-memory.dmp modiloader_stage2 behavioral1/memory/1812-63-0x00000000031C0000-0x00000000041C0000-memory.dmp modiloader_stage2 behavioral1/memory/1812-59-0x00000000031C0000-0x00000000041C0000-memory.dmp modiloader_stage2 behavioral1/memory/1812-56-0x00000000031C0000-0x00000000041C0000-memory.dmp modiloader_stage2 behavioral1/memory/1812-53-0x00000000031C0000-0x00000000041C0000-memory.dmp modiloader_stage2 behavioral1/memory/1812-50-0x00000000031C0000-0x00000000041C0000-memory.dmp modiloader_stage2 behavioral1/memory/1812-46-0x00000000031C0000-0x00000000041C0000-memory.dmp modiloader_stage2 behavioral1/memory/1812-43-0x00000000031C0000-0x00000000041C0000-memory.dmp modiloader_stage2 behavioral1/memory/1812-40-0x00000000031C0000-0x00000000041C0000-memory.dmp modiloader_stage2 behavioral1/memory/1812-37-0x00000000031C0000-0x00000000041C0000-memory.dmp modiloader_stage2 behavioral1/memory/1812-33-0x00000000031C0000-0x00000000041C0000-memory.dmp modiloader_stage2 behavioral1/memory/1812-30-0x00000000031C0000-0x00000000041C0000-memory.dmp modiloader_stage2 behavioral1/memory/1812-26-0x00000000031C0000-0x00000000041C0000-memory.dmp modiloader_stage2 behavioral1/memory/1812-23-0x00000000031C0000-0x00000000041C0000-memory.dmp modiloader_stage2 behavioral1/memory/1812-20-0x00000000031C0000-0x00000000041C0000-memory.dmp modiloader_stage2 behavioral1/memory/1812-17-0x00000000031C0000-0x00000000041C0000-memory.dmp modiloader_stage2 behavioral1/memory/1812-14-0x00000000031C0000-0x00000000041C0000-memory.dmp modiloader_stage2 behavioral1/memory/1812-12-0x00000000031C0000-0x00000000041C0000-memory.dmp modiloader_stage2 behavioral1/memory/1812-10-0x00000000031C0000-0x00000000041C0000-memory.dmp modiloader_stage2 -
Program crash 1 IoCs
pid pid_target Process procid_target 2584 1812 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5250d7820ffe465180b022c710bb170b02d1aeb8fbb4c530c5e039d4259009ef.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1812 wrote to memory of 2584 1812 5250d7820ffe465180b022c710bb170b02d1aeb8fbb4c530c5e039d4259009ef.exe 31 PID 1812 wrote to memory of 2584 1812 5250d7820ffe465180b022c710bb170b02d1aeb8fbb4c530c5e039d4259009ef.exe 31 PID 1812 wrote to memory of 2584 1812 5250d7820ffe465180b022c710bb170b02d1aeb8fbb4c530c5e039d4259009ef.exe 31 PID 1812 wrote to memory of 2584 1812 5250d7820ffe465180b022c710bb170b02d1aeb8fbb4c530c5e039d4259009ef.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\5250d7820ffe465180b022c710bb170b02d1aeb8fbb4c530c5e039d4259009ef.exe"C:\Users\Admin\AppData\Local\Temp\5250d7820ffe465180b022c710bb170b02d1aeb8fbb4c530c5e039d4259009ef.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1812 -s 7082⤵
- Program crash
PID:2584
-