Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-12-2024 04:20
Static task
static1
Behavioral task
behavioral1
Sample
63c77a3f6cfa94cbc6a4c0c1475f02520592e58d6a03e8553e77a85a3f03c32f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
63c77a3f6cfa94cbc6a4c0c1475f02520592e58d6a03e8553e77a85a3f03c32f.exe
Resource
win10v2004-20241007-en
General
-
Target
63c77a3f6cfa94cbc6a4c0c1475f02520592e58d6a03e8553e77a85a3f03c32f.exe
-
Size
1.3MB
-
MD5
ccdcd04a0ffde31366754018598eb02f
-
SHA1
38492826e8febf5bd7da4f9d8a8379ec7044ca9a
-
SHA256
63c77a3f6cfa94cbc6a4c0c1475f02520592e58d6a03e8553e77a85a3f03c32f
-
SHA512
8059cf54a64b45598b39becb3ec02fdf4b5837e4dd84ac82d33334850d61d1b33df70da0a65857c33e9a0fe2dc3d405bdbf6fa7214ab68e471e2e0c0f7e31053
-
SSDEEP
24576:TS1gzTBokW3THfYl7JTOs1r7FX2DOfqDrKfK8r/4mSwhONqR:TtTiq973f
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 61 IoCs
resource yara_rule behavioral1/memory/2504-2-0x0000000003490000-0x0000000004490000-memory.dmp modiloader_stage2 behavioral1/memory/2504-6-0x0000000003490000-0x0000000004490000-memory.dmp modiloader_stage2 behavioral1/memory/2504-9-0x0000000003490000-0x0000000004490000-memory.dmp modiloader_stage2 behavioral1/memory/2504-10-0x0000000003490000-0x0000000004490000-memory.dmp modiloader_stage2 behavioral1/memory/2504-11-0x0000000003490000-0x0000000004490000-memory.dmp modiloader_stage2 behavioral1/memory/2504-12-0x0000000003490000-0x0000000004490000-memory.dmp modiloader_stage2 behavioral1/memory/2504-13-0x0000000003490000-0x0000000004490000-memory.dmp modiloader_stage2 behavioral1/memory/2504-14-0x0000000003490000-0x0000000004490000-memory.dmp modiloader_stage2 behavioral1/memory/2504-16-0x0000000003490000-0x0000000004490000-memory.dmp modiloader_stage2 behavioral1/memory/2504-8-0x0000000003490000-0x0000000004490000-memory.dmp modiloader_stage2 behavioral1/memory/2504-19-0x0000000003490000-0x0000000004490000-memory.dmp modiloader_stage2 behavioral1/memory/2504-7-0x0000000003490000-0x0000000004490000-memory.dmp modiloader_stage2 behavioral1/memory/2504-22-0x0000000003490000-0x0000000004490000-memory.dmp modiloader_stage2 behavioral1/memory/2504-24-0x0000000003490000-0x0000000004490000-memory.dmp modiloader_stage2 behavioral1/memory/2504-27-0x0000000003490000-0x0000000004490000-memory.dmp modiloader_stage2 behavioral1/memory/2504-29-0x0000000003490000-0x0000000004490000-memory.dmp modiloader_stage2 behavioral1/memory/2504-30-0x0000000003490000-0x0000000004490000-memory.dmp modiloader_stage2 behavioral1/memory/2504-33-0x0000000003490000-0x0000000004490000-memory.dmp modiloader_stage2 behavioral1/memory/2504-26-0x0000000003490000-0x0000000004490000-memory.dmp modiloader_stage2 behavioral1/memory/2504-35-0x0000000003490000-0x0000000004490000-memory.dmp modiloader_stage2 behavioral1/memory/2504-34-0x0000000003490000-0x0000000004490000-memory.dmp modiloader_stage2 behavioral1/memory/2504-39-0x0000000003490000-0x0000000004490000-memory.dmp modiloader_stage2 behavioral1/memory/2504-41-0x0000000003490000-0x0000000004490000-memory.dmp modiloader_stage2 behavioral1/memory/2504-43-0x0000000003490000-0x0000000004490000-memory.dmp modiloader_stage2 behavioral1/memory/2504-45-0x0000000003490000-0x0000000004490000-memory.dmp modiloader_stage2 behavioral1/memory/2504-47-0x0000000003490000-0x0000000004490000-memory.dmp modiloader_stage2 behavioral1/memory/2504-48-0x0000000003490000-0x0000000004490000-memory.dmp modiloader_stage2 behavioral1/memory/2504-51-0x0000000003490000-0x0000000004490000-memory.dmp modiloader_stage2 behavioral1/memory/2504-50-0x0000000003490000-0x0000000004490000-memory.dmp modiloader_stage2 behavioral1/memory/2504-53-0x0000000003490000-0x0000000004490000-memory.dmp modiloader_stage2 behavioral1/memory/2504-57-0x0000000003490000-0x0000000004490000-memory.dmp modiloader_stage2 behavioral1/memory/2504-56-0x0000000003490000-0x0000000004490000-memory.dmp modiloader_stage2 behavioral1/memory/2504-37-0x0000000003490000-0x0000000004490000-memory.dmp modiloader_stage2 behavioral1/memory/2504-59-0x0000000003490000-0x0000000004490000-memory.dmp modiloader_stage2 behavioral1/memory/2504-62-0x0000000003490000-0x0000000004490000-memory.dmp modiloader_stage2 behavioral1/memory/2504-66-0x0000000003490000-0x0000000004490000-memory.dmp modiloader_stage2 behavioral1/memory/2504-64-0x0000000003490000-0x0000000004490000-memory.dmp modiloader_stage2 behavioral1/memory/2504-68-0x0000000003490000-0x0000000004490000-memory.dmp modiloader_stage2 behavioral1/memory/2504-71-0x0000000003490000-0x0000000004490000-memory.dmp modiloader_stage2 behavioral1/memory/2504-73-0x0000000003490000-0x0000000004490000-memory.dmp modiloader_stage2 behavioral1/memory/2504-75-0x0000000003490000-0x0000000004490000-memory.dmp modiloader_stage2 behavioral1/memory/2504-77-0x0000000003490000-0x0000000004490000-memory.dmp modiloader_stage2 behavioral1/memory/2504-79-0x0000000003490000-0x0000000004490000-memory.dmp modiloader_stage2 behavioral1/memory/2504-81-0x0000000003490000-0x0000000004490000-memory.dmp modiloader_stage2 behavioral1/memory/2504-15-0x0000000003490000-0x0000000004490000-memory.dmp modiloader_stage2 behavioral1/memory/2504-84-0x0000000003490000-0x0000000004490000-memory.dmp modiloader_stage2 behavioral1/memory/2504-17-0x0000000003490000-0x0000000004490000-memory.dmp modiloader_stage2 behavioral1/memory/2504-18-0x0000000003490000-0x0000000004490000-memory.dmp modiloader_stage2 behavioral1/memory/2504-46-0x0000000003490000-0x0000000004490000-memory.dmp modiloader_stage2 behavioral1/memory/2504-44-0x0000000003490000-0x0000000004490000-memory.dmp modiloader_stage2 behavioral1/memory/2504-42-0x0000000003490000-0x0000000004490000-memory.dmp modiloader_stage2 behavioral1/memory/2504-40-0x0000000003490000-0x0000000004490000-memory.dmp modiloader_stage2 behavioral1/memory/2504-38-0x0000000003490000-0x0000000004490000-memory.dmp modiloader_stage2 behavioral1/memory/2504-36-0x0000000003490000-0x0000000004490000-memory.dmp modiloader_stage2 behavioral1/memory/2504-32-0x0000000003490000-0x0000000004490000-memory.dmp modiloader_stage2 behavioral1/memory/2504-31-0x0000000003490000-0x0000000004490000-memory.dmp modiloader_stage2 behavioral1/memory/2504-28-0x0000000003490000-0x0000000004490000-memory.dmp modiloader_stage2 behavioral1/memory/2504-25-0x0000000003490000-0x0000000004490000-memory.dmp modiloader_stage2 behavioral1/memory/2504-23-0x0000000003490000-0x0000000004490000-memory.dmp modiloader_stage2 behavioral1/memory/2504-21-0x0000000003490000-0x0000000004490000-memory.dmp modiloader_stage2 behavioral1/memory/2504-20-0x0000000003490000-0x0000000004490000-memory.dmp modiloader_stage2 -
Program crash 1 IoCs
pid pid_target Process procid_target 1680 2504 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 63c77a3f6cfa94cbc6a4c0c1475f02520592e58d6a03e8553e77a85a3f03c32f.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2504 wrote to memory of 1680 2504 63c77a3f6cfa94cbc6a4c0c1475f02520592e58d6a03e8553e77a85a3f03c32f.exe 30 PID 2504 wrote to memory of 1680 2504 63c77a3f6cfa94cbc6a4c0c1475f02520592e58d6a03e8553e77a85a3f03c32f.exe 30 PID 2504 wrote to memory of 1680 2504 63c77a3f6cfa94cbc6a4c0c1475f02520592e58d6a03e8553e77a85a3f03c32f.exe 30 PID 2504 wrote to memory of 1680 2504 63c77a3f6cfa94cbc6a4c0c1475f02520592e58d6a03e8553e77a85a3f03c32f.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\63c77a3f6cfa94cbc6a4c0c1475f02520592e58d6a03e8553e77a85a3f03c32f.exe"C:\Users\Admin\AppData\Local\Temp\63c77a3f6cfa94cbc6a4c0c1475f02520592e58d6a03e8553e77a85a3f03c32f.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2504 -s 6962⤵
- Program crash
PID:1680
-