Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-01-2025 03:01
Static task
static1
Behavioral task
behavioral1
Sample
939c125accb6e2f939bc239c45d3ead938a0c0bcd63d77fbde11ed96ed1a1c76.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
939c125accb6e2f939bc239c45d3ead938a0c0bcd63d77fbde11ed96ed1a1c76.exe
Resource
win10v2004-20241007-en
General
-
Target
939c125accb6e2f939bc239c45d3ead938a0c0bcd63d77fbde11ed96ed1a1c76.exe
-
Size
1.1MB
-
MD5
7e6af615a074f41ea63ef69a047e8f6d
-
SHA1
a466ec15884ee1ab19dd0bed7327ffcf1db4a6f2
-
SHA256
939c125accb6e2f939bc239c45d3ead938a0c0bcd63d77fbde11ed96ed1a1c76
-
SHA512
0a0fb978deddfdae81ef9a44c0f424520fc43e89a52478540decc381490f3ece450b70799e7f995cb05e5ab4c47758db3e401fb52d11673598778489542e21b2
-
SSDEEP
24576:Gw6yj+R7ydItm/2uQAGYDKAVcpzWc4ctu:GDBR2KTYDKArc4Ku
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 61 IoCs
resource yara_rule behavioral1/memory/3016-2-0x0000000003370000-0x0000000004370000-memory.dmp modiloader_stage2 behavioral1/memory/3016-9-0x0000000003370000-0x0000000004370000-memory.dmp modiloader_stage2 behavioral1/memory/3016-84-0x0000000003370000-0x0000000004370000-memory.dmp modiloader_stage2 behavioral1/memory/3016-10-0x0000000003370000-0x0000000004370000-memory.dmp modiloader_stage2 behavioral1/memory/3016-58-0x0000000003370000-0x0000000004370000-memory.dmp modiloader_stage2 behavioral1/memory/3016-56-0x0000000003370000-0x0000000004370000-memory.dmp modiloader_stage2 behavioral1/memory/3016-55-0x0000000003370000-0x0000000004370000-memory.dmp modiloader_stage2 behavioral1/memory/3016-53-0x0000000003370000-0x0000000004370000-memory.dmp modiloader_stage2 behavioral1/memory/3016-52-0x0000000003370000-0x0000000004370000-memory.dmp modiloader_stage2 behavioral1/memory/3016-51-0x0000000003370000-0x0000000004370000-memory.dmp modiloader_stage2 behavioral1/memory/3016-50-0x0000000003370000-0x0000000004370000-memory.dmp modiloader_stage2 behavioral1/memory/3016-49-0x0000000003370000-0x0000000004370000-memory.dmp modiloader_stage2 behavioral1/memory/3016-47-0x0000000003370000-0x0000000004370000-memory.dmp modiloader_stage2 behavioral1/memory/3016-46-0x0000000003370000-0x0000000004370000-memory.dmp modiloader_stage2 behavioral1/memory/3016-45-0x0000000003370000-0x0000000004370000-memory.dmp modiloader_stage2 behavioral1/memory/3016-42-0x0000000003370000-0x0000000004370000-memory.dmp modiloader_stage2 behavioral1/memory/3016-41-0x0000000003370000-0x0000000004370000-memory.dmp modiloader_stage2 behavioral1/memory/3016-40-0x0000000003370000-0x0000000004370000-memory.dmp modiloader_stage2 behavioral1/memory/3016-37-0x0000000003370000-0x0000000004370000-memory.dmp modiloader_stage2 behavioral1/memory/3016-36-0x0000000003370000-0x0000000004370000-memory.dmp modiloader_stage2 behavioral1/memory/3016-35-0x0000000003370000-0x0000000004370000-memory.dmp modiloader_stage2 behavioral1/memory/3016-33-0x0000000003370000-0x0000000004370000-memory.dmp modiloader_stage2 behavioral1/memory/3016-32-0x0000000003370000-0x0000000004370000-memory.dmp modiloader_stage2 behavioral1/memory/3016-31-0x0000000003370000-0x0000000004370000-memory.dmp modiloader_stage2 behavioral1/memory/3016-29-0x0000000003370000-0x0000000004370000-memory.dmp modiloader_stage2 behavioral1/memory/3016-28-0x0000000003370000-0x0000000004370000-memory.dmp modiloader_stage2 behavioral1/memory/3016-27-0x0000000003370000-0x0000000004370000-memory.dmp modiloader_stage2 behavioral1/memory/3016-24-0x0000000003370000-0x0000000004370000-memory.dmp modiloader_stage2 behavioral1/memory/3016-23-0x0000000003370000-0x0000000004370000-memory.dmp modiloader_stage2 behavioral1/memory/3016-22-0x0000000003370000-0x0000000004370000-memory.dmp modiloader_stage2 behavioral1/memory/3016-21-0x0000000003370000-0x0000000004370000-memory.dmp modiloader_stage2 behavioral1/memory/3016-18-0x0000000003370000-0x0000000004370000-memory.dmp modiloader_stage2 behavioral1/memory/3016-17-0x0000000003370000-0x0000000004370000-memory.dmp modiloader_stage2 behavioral1/memory/3016-15-0x0000000003370000-0x0000000004370000-memory.dmp modiloader_stage2 behavioral1/memory/3016-13-0x0000000003370000-0x0000000004370000-memory.dmp modiloader_stage2 behavioral1/memory/3016-11-0x0000000003370000-0x0000000004370000-memory.dmp modiloader_stage2 behavioral1/memory/3016-44-0x0000000003370000-0x0000000004370000-memory.dmp modiloader_stage2 behavioral1/memory/3016-39-0x0000000003370000-0x0000000004370000-memory.dmp modiloader_stage2 behavioral1/memory/3016-30-0x0000000003370000-0x0000000004370000-memory.dmp modiloader_stage2 behavioral1/memory/3016-25-0x0000000003370000-0x0000000004370000-memory.dmp modiloader_stage2 behavioral1/memory/3016-20-0x0000000003370000-0x0000000004370000-memory.dmp modiloader_stage2 behavioral1/memory/3016-16-0x0000000003370000-0x0000000004370000-memory.dmp modiloader_stage2 behavioral1/memory/3016-81-0x0000000003370000-0x0000000004370000-memory.dmp modiloader_stage2 behavioral1/memory/3016-77-0x0000000003370000-0x0000000004370000-memory.dmp modiloader_stage2 behavioral1/memory/3016-74-0x0000000003370000-0x0000000004370000-memory.dmp modiloader_stage2 behavioral1/memory/3016-70-0x0000000003370000-0x0000000004370000-memory.dmp modiloader_stage2 behavioral1/memory/3016-66-0x0000000003370000-0x0000000004370000-memory.dmp modiloader_stage2 behavioral1/memory/3016-60-0x0000000003370000-0x0000000004370000-memory.dmp modiloader_stage2 behavioral1/memory/3016-57-0x0000000003370000-0x0000000004370000-memory.dmp modiloader_stage2 behavioral1/memory/3016-54-0x0000000003370000-0x0000000004370000-memory.dmp modiloader_stage2 behavioral1/memory/3016-48-0x0000000003370000-0x0000000004370000-memory.dmp modiloader_stage2 behavioral1/memory/3016-43-0x0000000003370000-0x0000000004370000-memory.dmp modiloader_stage2 behavioral1/memory/3016-38-0x0000000003370000-0x0000000004370000-memory.dmp modiloader_stage2 behavioral1/memory/3016-34-0x0000000003370000-0x0000000004370000-memory.dmp modiloader_stage2 behavioral1/memory/3016-26-0x0000000003370000-0x0000000004370000-memory.dmp modiloader_stage2 behavioral1/memory/3016-19-0x0000000003370000-0x0000000004370000-memory.dmp modiloader_stage2 behavioral1/memory/3016-14-0x0000000003370000-0x0000000004370000-memory.dmp modiloader_stage2 behavioral1/memory/3016-12-0x0000000003370000-0x0000000004370000-memory.dmp modiloader_stage2 behavioral1/memory/3016-8-0x0000000003370000-0x0000000004370000-memory.dmp modiloader_stage2 behavioral1/memory/3016-7-0x0000000003370000-0x0000000004370000-memory.dmp modiloader_stage2 behavioral1/memory/3016-6-0x0000000003370000-0x0000000004370000-memory.dmp modiloader_stage2 -
Program crash 1 IoCs
pid pid_target Process procid_target 2580 3016 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 939c125accb6e2f939bc239c45d3ead938a0c0bcd63d77fbde11ed96ed1a1c76.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3016 wrote to memory of 2580 3016 939c125accb6e2f939bc239c45d3ead938a0c0bcd63d77fbde11ed96ed1a1c76.exe 31 PID 3016 wrote to memory of 2580 3016 939c125accb6e2f939bc239c45d3ead938a0c0bcd63d77fbde11ed96ed1a1c76.exe 31 PID 3016 wrote to memory of 2580 3016 939c125accb6e2f939bc239c45d3ead938a0c0bcd63d77fbde11ed96ed1a1c76.exe 31 PID 3016 wrote to memory of 2580 3016 939c125accb6e2f939bc239c45d3ead938a0c0bcd63d77fbde11ed96ed1a1c76.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\939c125accb6e2f939bc239c45d3ead938a0c0bcd63d77fbde11ed96ed1a1c76.exe"C:\Users\Admin\AppData\Local\Temp\939c125accb6e2f939bc239c45d3ead938a0c0bcd63d77fbde11ed96ed1a1c76.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3016 -s 7202⤵
- Program crash
PID:2580
-