Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-01-2025 10:57
Static task
static1
Behavioral task
behavioral1
Sample
king.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
king.exe
Resource
win10v2004-20241007-en
General
-
Target
king.exe
-
Size
834KB
-
MD5
0763cd65f6b5702458494123e97f2749
-
SHA1
655386a271c50570c47d9ce909f10de1719e3cc6
-
SHA256
35af2e0e56a27587170e0f093d625a6123e49af4ea8b939c30ccd9fd8e69a2ed
-
SHA512
b7578ef326ebac1543af02daafcb873b921d3c93c533ee70b73ba30d320db1b84d4a34c0e6403cf98785eae5cea69948feb3282c7ae9d29774cf395957650d02
-
SSDEEP
12288:aAm99652dKVsiJ9Pu8BHTN3KxxcycdnawpVdAorkBK1zmQ7HDEKDmC/E:7oqcKmiJ88ZZsTzOlIWznHY
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 61 IoCs
resource yara_rule behavioral1/memory/316-2-0x00000000030E0000-0x00000000040E0000-memory.dmp modiloader_stage2 behavioral1/memory/316-7-0x00000000030E0000-0x00000000040E0000-memory.dmp modiloader_stage2 behavioral1/memory/316-8-0x00000000030E0000-0x00000000040E0000-memory.dmp modiloader_stage2 behavioral1/memory/316-9-0x00000000030E0000-0x00000000040E0000-memory.dmp modiloader_stage2 behavioral1/memory/316-10-0x00000000030E0000-0x00000000040E0000-memory.dmp modiloader_stage2 behavioral1/memory/316-11-0x00000000030E0000-0x00000000040E0000-memory.dmp modiloader_stage2 behavioral1/memory/316-12-0x00000000030E0000-0x00000000040E0000-memory.dmp modiloader_stage2 behavioral1/memory/316-13-0x00000000030E0000-0x00000000040E0000-memory.dmp modiloader_stage2 behavioral1/memory/316-14-0x00000000030E0000-0x00000000040E0000-memory.dmp modiloader_stage2 behavioral1/memory/316-17-0x00000000030E0000-0x00000000040E0000-memory.dmp modiloader_stage2 behavioral1/memory/316-20-0x00000000030E0000-0x00000000040E0000-memory.dmp modiloader_stage2 behavioral1/memory/316-22-0x00000000030E0000-0x00000000040E0000-memory.dmp modiloader_stage2 behavioral1/memory/316-24-0x00000000030E0000-0x00000000040E0000-memory.dmp modiloader_stage2 behavioral1/memory/316-27-0x00000000030E0000-0x00000000040E0000-memory.dmp modiloader_stage2 behavioral1/memory/316-29-0x00000000030E0000-0x00000000040E0000-memory.dmp modiloader_stage2 behavioral1/memory/316-32-0x00000000030E0000-0x00000000040E0000-memory.dmp modiloader_stage2 behavioral1/memory/316-34-0x00000000030E0000-0x00000000040E0000-memory.dmp modiloader_stage2 behavioral1/memory/316-36-0x00000000030E0000-0x00000000040E0000-memory.dmp modiloader_stage2 behavioral1/memory/316-41-0x00000000030E0000-0x00000000040E0000-memory.dmp modiloader_stage2 behavioral1/memory/316-45-0x00000000030E0000-0x00000000040E0000-memory.dmp modiloader_stage2 behavioral1/memory/316-42-0x00000000030E0000-0x00000000040E0000-memory.dmp modiloader_stage2 behavioral1/memory/316-52-0x00000000030E0000-0x00000000040E0000-memory.dmp modiloader_stage2 behavioral1/memory/316-49-0x00000000030E0000-0x00000000040E0000-memory.dmp modiloader_stage2 behavioral1/memory/316-47-0x00000000030E0000-0x00000000040E0000-memory.dmp modiloader_stage2 behavioral1/memory/316-39-0x00000000030E0000-0x00000000040E0000-memory.dmp modiloader_stage2 behavioral1/memory/316-54-0x00000000030E0000-0x00000000040E0000-memory.dmp modiloader_stage2 behavioral1/memory/316-56-0x00000000030E0000-0x00000000040E0000-memory.dmp modiloader_stage2 behavioral1/memory/316-59-0x00000000030E0000-0x00000000040E0000-memory.dmp modiloader_stage2 behavioral1/memory/316-61-0x00000000030E0000-0x00000000040E0000-memory.dmp modiloader_stage2 behavioral1/memory/316-63-0x00000000030E0000-0x00000000040E0000-memory.dmp modiloader_stage2 behavioral1/memory/316-65-0x00000000030E0000-0x00000000040E0000-memory.dmp modiloader_stage2 behavioral1/memory/316-67-0x00000000030E0000-0x00000000040E0000-memory.dmp modiloader_stage2 behavioral1/memory/316-70-0x00000000030E0000-0x00000000040E0000-memory.dmp modiloader_stage2 behavioral1/memory/316-72-0x00000000030E0000-0x00000000040E0000-memory.dmp modiloader_stage2 behavioral1/memory/316-77-0x00000000030E0000-0x00000000040E0000-memory.dmp modiloader_stage2 behavioral1/memory/316-74-0x00000000030E0000-0x00000000040E0000-memory.dmp modiloader_stage2 behavioral1/memory/316-79-0x00000000030E0000-0x00000000040E0000-memory.dmp modiloader_stage2 behavioral1/memory/316-81-0x00000000030E0000-0x00000000040E0000-memory.dmp modiloader_stage2 behavioral1/memory/316-84-0x00000000030E0000-0x00000000040E0000-memory.dmp modiloader_stage2 behavioral1/memory/316-44-0x00000000030E0000-0x00000000040E0000-memory.dmp modiloader_stage2 behavioral1/memory/316-50-0x00000000030E0000-0x00000000040E0000-memory.dmp modiloader_stage2 behavioral1/memory/316-48-0x00000000030E0000-0x00000000040E0000-memory.dmp modiloader_stage2 behavioral1/memory/316-46-0x00000000030E0000-0x00000000040E0000-memory.dmp modiloader_stage2 behavioral1/memory/316-43-0x00000000030E0000-0x00000000040E0000-memory.dmp modiloader_stage2 behavioral1/memory/316-40-0x00000000030E0000-0x00000000040E0000-memory.dmp modiloader_stage2 behavioral1/memory/316-38-0x00000000030E0000-0x00000000040E0000-memory.dmp modiloader_stage2 behavioral1/memory/316-37-0x00000000030E0000-0x00000000040E0000-memory.dmp modiloader_stage2 behavioral1/memory/316-35-0x00000000030E0000-0x00000000040E0000-memory.dmp modiloader_stage2 behavioral1/memory/316-33-0x00000000030E0000-0x00000000040E0000-memory.dmp modiloader_stage2 behavioral1/memory/316-31-0x00000000030E0000-0x00000000040E0000-memory.dmp modiloader_stage2 behavioral1/memory/316-30-0x00000000030E0000-0x00000000040E0000-memory.dmp modiloader_stage2 behavioral1/memory/316-28-0x00000000030E0000-0x00000000040E0000-memory.dmp modiloader_stage2 behavioral1/memory/316-26-0x00000000030E0000-0x00000000040E0000-memory.dmp modiloader_stage2 behavioral1/memory/316-25-0x00000000030E0000-0x00000000040E0000-memory.dmp modiloader_stage2 behavioral1/memory/316-23-0x00000000030E0000-0x00000000040E0000-memory.dmp modiloader_stage2 behavioral1/memory/316-21-0x00000000030E0000-0x00000000040E0000-memory.dmp modiloader_stage2 behavioral1/memory/316-19-0x00000000030E0000-0x00000000040E0000-memory.dmp modiloader_stage2 behavioral1/memory/316-18-0x00000000030E0000-0x00000000040E0000-memory.dmp modiloader_stage2 behavioral1/memory/316-16-0x00000000030E0000-0x00000000040E0000-memory.dmp modiloader_stage2 behavioral1/memory/316-15-0x00000000030E0000-0x00000000040E0000-memory.dmp modiloader_stage2 behavioral1/memory/316-86-0x00000000030E0000-0x00000000040E0000-memory.dmp modiloader_stage2 -
Program crash 1 IoCs
pid pid_target Process procid_target 984 316 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language king.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 316 wrote to memory of 984 316 king.exe 30 PID 316 wrote to memory of 984 316 king.exe 30 PID 316 wrote to memory of 984 316 king.exe 30 PID 316 wrote to memory of 984 316 king.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\king.exe"C:\Users\Admin\AppData\Local\Temp\king.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 316 -s 7322⤵
- Program crash
PID:984
-