Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
14-01-2025 07:23
Static task
static1
Behavioral task
behavioral1
Sample
e9802e45a66c963ced0e7c60c899c5cd.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
e9802e45a66c963ced0e7c60c899c5cd.exe
Resource
win10v2004-20241007-en
General
-
Target
e9802e45a66c963ced0e7c60c899c5cd.exe
-
Size
1.1MB
-
MD5
e9802e45a66c963ced0e7c60c899c5cd
-
SHA1
cd4eee552fb5b4326f5e1bc2d2b16779639d5efb
-
SHA256
3cce82eff14a78c73dbc3f64a7abc6476d9b184763a5f6713ce68d6ee8df75f8
-
SHA512
1723dd25dc853d193b4574521b9a0f40e87fa13c2dd74a1d868e8e0d6736ea79c5f0f2896359e555da2da351cbf52b2337956f802e10869eda3c36264143f8b5
-
SSDEEP
24576:Gw6yj+R7ydItm/2uQAGYDKAVcpzWc4ctu:GDBR2KTYDKArc4Ku
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 61 IoCs
resource yara_rule behavioral1/memory/1976-2-0x0000000003260000-0x0000000004260000-memory.dmp modiloader_stage2 behavioral1/memory/1976-17-0x0000000003260000-0x0000000004260000-memory.dmp modiloader_stage2 behavioral1/memory/1976-39-0x0000000003260000-0x0000000004260000-memory.dmp modiloader_stage2 behavioral1/memory/1976-36-0x0000000003260000-0x0000000004260000-memory.dmp modiloader_stage2 behavioral1/memory/1976-16-0x0000000003260000-0x0000000004260000-memory.dmp modiloader_stage2 behavioral1/memory/1976-48-0x0000000003260000-0x0000000004260000-memory.dmp modiloader_stage2 behavioral1/memory/1976-46-0x0000000003260000-0x0000000004260000-memory.dmp modiloader_stage2 behavioral1/memory/1976-45-0x0000000003260000-0x0000000004260000-memory.dmp modiloader_stage2 behavioral1/memory/1976-43-0x0000000003260000-0x0000000004260000-memory.dmp modiloader_stage2 behavioral1/memory/1976-41-0x0000000003260000-0x0000000004260000-memory.dmp modiloader_stage2 behavioral1/memory/1976-40-0x0000000003260000-0x0000000004260000-memory.dmp modiloader_stage2 behavioral1/memory/1976-38-0x0000000003260000-0x0000000004260000-memory.dmp modiloader_stage2 behavioral1/memory/1976-37-0x0000000003260000-0x0000000004260000-memory.dmp modiloader_stage2 behavioral1/memory/1976-35-0x0000000003260000-0x0000000004260000-memory.dmp modiloader_stage2 behavioral1/memory/1976-34-0x0000000003260000-0x0000000004260000-memory.dmp modiloader_stage2 behavioral1/memory/1976-33-0x0000000003260000-0x0000000004260000-memory.dmp modiloader_stage2 behavioral1/memory/1976-31-0x0000000003260000-0x0000000004260000-memory.dmp modiloader_stage2 behavioral1/memory/1976-30-0x0000000003260000-0x0000000004260000-memory.dmp modiloader_stage2 behavioral1/memory/1976-28-0x0000000003260000-0x0000000004260000-memory.dmp modiloader_stage2 behavioral1/memory/1976-26-0x0000000003260000-0x0000000004260000-memory.dmp modiloader_stage2 behavioral1/memory/1976-25-0x0000000003260000-0x0000000004260000-memory.dmp modiloader_stage2 behavioral1/memory/1976-23-0x0000000003260000-0x0000000004260000-memory.dmp modiloader_stage2 behavioral1/memory/1976-22-0x0000000003260000-0x0000000004260000-memory.dmp modiloader_stage2 behavioral1/memory/1976-21-0x0000000003260000-0x0000000004260000-memory.dmp modiloader_stage2 behavioral1/memory/1976-19-0x0000000003260000-0x0000000004260000-memory.dmp modiloader_stage2 behavioral1/memory/1976-18-0x0000000003260000-0x0000000004260000-memory.dmp modiloader_stage2 behavioral1/memory/1976-13-0x0000000003260000-0x0000000004260000-memory.dmp modiloader_stage2 behavioral1/memory/1976-15-0x0000000003260000-0x0000000004260000-memory.dmp modiloader_stage2 behavioral1/memory/1976-85-0x0000000003260000-0x0000000004260000-memory.dmp modiloader_stage2 behavioral1/memory/1976-12-0x0000000003260000-0x0000000004260000-memory.dmp modiloader_stage2 behavioral1/memory/1976-10-0x0000000003260000-0x0000000004260000-memory.dmp modiloader_stage2 behavioral1/memory/1976-83-0x0000000003260000-0x0000000004260000-memory.dmp modiloader_stage2 behavioral1/memory/1976-81-0x0000000003260000-0x0000000004260000-memory.dmp modiloader_stage2 behavioral1/memory/1976-78-0x0000000003260000-0x0000000004260000-memory.dmp modiloader_stage2 behavioral1/memory/1976-76-0x0000000003260000-0x0000000004260000-memory.dmp modiloader_stage2 behavioral1/memory/1976-74-0x0000000003260000-0x0000000004260000-memory.dmp modiloader_stage2 behavioral1/memory/1976-71-0x0000000003260000-0x0000000004260000-memory.dmp modiloader_stage2 behavioral1/memory/1976-69-0x0000000003260000-0x0000000004260000-memory.dmp modiloader_stage2 behavioral1/memory/1976-67-0x0000000003260000-0x0000000004260000-memory.dmp modiloader_stage2 behavioral1/memory/1976-64-0x0000000003260000-0x0000000004260000-memory.dmp modiloader_stage2 behavioral1/memory/1976-62-0x0000000003260000-0x0000000004260000-memory.dmp modiloader_stage2 behavioral1/memory/1976-61-0x0000000003260000-0x0000000004260000-memory.dmp modiloader_stage2 behavioral1/memory/1976-58-0x0000000003260000-0x0000000004260000-memory.dmp modiloader_stage2 behavioral1/memory/1976-56-0x0000000003260000-0x0000000004260000-memory.dmp modiloader_stage2 behavioral1/memory/1976-54-0x0000000003260000-0x0000000004260000-memory.dmp modiloader_stage2 behavioral1/memory/1976-51-0x0000000003260000-0x0000000004260000-memory.dmp modiloader_stage2 behavioral1/memory/1976-49-0x0000000003260000-0x0000000004260000-memory.dmp modiloader_stage2 behavioral1/memory/1976-47-0x0000000003260000-0x0000000004260000-memory.dmp modiloader_stage2 behavioral1/memory/1976-44-0x0000000003260000-0x0000000004260000-memory.dmp modiloader_stage2 behavioral1/memory/1976-42-0x0000000003260000-0x0000000004260000-memory.dmp modiloader_stage2 behavioral1/memory/1976-32-0x0000000003260000-0x0000000004260000-memory.dmp modiloader_stage2 behavioral1/memory/1976-29-0x0000000003260000-0x0000000004260000-memory.dmp modiloader_stage2 behavioral1/memory/1976-27-0x0000000003260000-0x0000000004260000-memory.dmp modiloader_stage2 behavioral1/memory/1976-24-0x0000000003260000-0x0000000004260000-memory.dmp modiloader_stage2 behavioral1/memory/1976-20-0x0000000003260000-0x0000000004260000-memory.dmp modiloader_stage2 behavioral1/memory/1976-14-0x0000000003260000-0x0000000004260000-memory.dmp modiloader_stage2 behavioral1/memory/1976-11-0x0000000003260000-0x0000000004260000-memory.dmp modiloader_stage2 behavioral1/memory/1976-9-0x0000000003260000-0x0000000004260000-memory.dmp modiloader_stage2 behavioral1/memory/1976-8-0x0000000003260000-0x0000000004260000-memory.dmp modiloader_stage2 behavioral1/memory/1976-7-0x0000000003260000-0x0000000004260000-memory.dmp modiloader_stage2 behavioral1/memory/1976-6-0x0000000003260000-0x0000000004260000-memory.dmp modiloader_stage2 -
Program crash 1 IoCs
pid pid_target Process procid_target 2684 1976 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e9802e45a66c963ced0e7c60c899c5cd.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1976 wrote to memory of 2684 1976 e9802e45a66c963ced0e7c60c899c5cd.exe 31 PID 1976 wrote to memory of 2684 1976 e9802e45a66c963ced0e7c60c899c5cd.exe 31 PID 1976 wrote to memory of 2684 1976 e9802e45a66c963ced0e7c60c899c5cd.exe 31 PID 1976 wrote to memory of 2684 1976 e9802e45a66c963ced0e7c60c899c5cd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\e9802e45a66c963ced0e7c60c899c5cd.exe"C:\Users\Admin\AppData\Local\Temp\e9802e45a66c963ced0e7c60c899c5cd.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1976 -s 6962⤵
- Program crash
PID:2684
-