Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/01/2025, 03:23
Static task
static1
Behavioral task
behavioral1
Sample
4e38df6415cd9a8857c5ff4185da103fa8585e8a589ff2286eaf7317e3d10755.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4e38df6415cd9a8857c5ff4185da103fa8585e8a589ff2286eaf7317e3d10755.exe
Resource
win10v2004-20241007-en
General
-
Target
4e38df6415cd9a8857c5ff4185da103fa8585e8a589ff2286eaf7317e3d10755.exe
-
Size
834KB
-
MD5
aea0bcdbddbeabfde26f53671890d1b7
-
SHA1
5a3cb9126f222bab082eae67e961d45a5e0529e4
-
SHA256
4e38df6415cd9a8857c5ff4185da103fa8585e8a589ff2286eaf7317e3d10755
-
SHA512
5701919429ca56e0a885dcf3c7a05c5c60974738371c55e844e78a841d13080cc93278ccf96372ed4ec616247d09587cffe005a4607a7949c7dce123701dfdcf
-
SSDEEP
12288:aAm99652dKVsiJ9Pu8BHTN3KxxcycdnawpVdAorkBK1zmQ7HDEKDmC/E:7oqcKmiJ88ZZsTzOlIWznHY
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 62 IoCs
resource yara_rule behavioral1/memory/1860-2-0x00000000030B0000-0x00000000040B0000-memory.dmp modiloader_stage2 behavioral1/memory/1860-9-0x00000000030B0000-0x00000000040B0000-memory.dmp modiloader_stage2 behavioral1/memory/1860-40-0x00000000030B0000-0x00000000040B0000-memory.dmp modiloader_stage2 behavioral1/memory/1860-42-0x00000000030B0000-0x00000000040B0000-memory.dmp modiloader_stage2 behavioral1/memory/1860-48-0x00000000030B0000-0x00000000040B0000-memory.dmp modiloader_stage2 behavioral1/memory/1860-46-0x00000000030B0000-0x00000000040B0000-memory.dmp modiloader_stage2 behavioral1/memory/1860-44-0x00000000030B0000-0x00000000040B0000-memory.dmp modiloader_stage2 behavioral1/memory/1860-38-0x00000000030B0000-0x00000000040B0000-memory.dmp modiloader_stage2 behavioral1/memory/1860-36-0x00000000030B0000-0x00000000040B0000-memory.dmp modiloader_stage2 behavioral1/memory/1860-35-0x00000000030B0000-0x00000000040B0000-memory.dmp modiloader_stage2 behavioral1/memory/1860-33-0x00000000030B0000-0x00000000040B0000-memory.dmp modiloader_stage2 behavioral1/memory/1860-31-0x00000000030B0000-0x00000000040B0000-memory.dmp modiloader_stage2 behavioral1/memory/1860-28-0x00000000030B0000-0x00000000040B0000-memory.dmp modiloader_stage2 behavioral1/memory/1860-26-0x00000000030B0000-0x00000000040B0000-memory.dmp modiloader_stage2 behavioral1/memory/1860-23-0x00000000030B0000-0x00000000040B0000-memory.dmp modiloader_stage2 behavioral1/memory/1860-21-0x00000000030B0000-0x00000000040B0000-memory.dmp modiloader_stage2 behavioral1/memory/1860-18-0x00000000030B0000-0x00000000040B0000-memory.dmp modiloader_stage2 behavioral1/memory/1860-17-0x00000000030B0000-0x00000000040B0000-memory.dmp modiloader_stage2 behavioral1/memory/1860-16-0x00000000030B0000-0x00000000040B0000-memory.dmp modiloader_stage2 behavioral1/memory/1860-15-0x00000000030B0000-0x00000000040B0000-memory.dmp modiloader_stage2 behavioral1/memory/1860-14-0x00000000030B0000-0x00000000040B0000-memory.dmp modiloader_stage2 behavioral1/memory/1860-82-0x00000000030B0000-0x00000000040B0000-memory.dmp modiloader_stage2 behavioral1/memory/1860-80-0x00000000030B0000-0x00000000040B0000-memory.dmp modiloader_stage2 behavioral1/memory/1860-78-0x00000000030B0000-0x00000000040B0000-memory.dmp modiloader_stage2 behavioral1/memory/1860-75-0x00000000030B0000-0x00000000040B0000-memory.dmp modiloader_stage2 behavioral1/memory/1860-74-0x00000000030B0000-0x00000000040B0000-memory.dmp modiloader_stage2 behavioral1/memory/1860-72-0x00000000030B0000-0x00000000040B0000-memory.dmp modiloader_stage2 behavioral1/memory/1860-69-0x00000000030B0000-0x00000000040B0000-memory.dmp modiloader_stage2 behavioral1/memory/1860-67-0x00000000030B0000-0x00000000040B0000-memory.dmp modiloader_stage2 behavioral1/memory/1860-65-0x00000000030B0000-0x00000000040B0000-memory.dmp modiloader_stage2 behavioral1/memory/1860-64-0x00000000030B0000-0x00000000040B0000-memory.dmp modiloader_stage2 behavioral1/memory/1860-61-0x00000000030B0000-0x00000000040B0000-memory.dmp modiloader_stage2 behavioral1/memory/1860-59-0x00000000030B0000-0x00000000040B0000-memory.dmp modiloader_stage2 behavioral1/memory/1860-57-0x00000000030B0000-0x00000000040B0000-memory.dmp modiloader_stage2 behavioral1/memory/1860-55-0x00000000030B0000-0x00000000040B0000-memory.dmp modiloader_stage2 behavioral1/memory/1860-53-0x00000000030B0000-0x00000000040B0000-memory.dmp modiloader_stage2 behavioral1/memory/1860-51-0x00000000030B0000-0x00000000040B0000-memory.dmp modiloader_stage2 behavioral1/memory/1860-49-0x00000000030B0000-0x00000000040B0000-memory.dmp modiloader_stage2 behavioral1/memory/1860-47-0x00000000030B0000-0x00000000040B0000-memory.dmp modiloader_stage2 behavioral1/memory/1860-45-0x00000000030B0000-0x00000000040B0000-memory.dmp modiloader_stage2 behavioral1/memory/1860-43-0x00000000030B0000-0x00000000040B0000-memory.dmp modiloader_stage2 behavioral1/memory/1860-41-0x00000000030B0000-0x00000000040B0000-memory.dmp modiloader_stage2 behavioral1/memory/1860-39-0x00000000030B0000-0x00000000040B0000-memory.dmp modiloader_stage2 behavioral1/memory/1860-37-0x00000000030B0000-0x00000000040B0000-memory.dmp modiloader_stage2 behavioral1/memory/1860-8-0x00000000030B0000-0x00000000040B0000-memory.dmp modiloader_stage2 behavioral1/memory/1860-34-0x00000000030B0000-0x00000000040B0000-memory.dmp modiloader_stage2 behavioral1/memory/1860-30-0x00000000030B0000-0x00000000040B0000-memory.dmp modiloader_stage2 behavioral1/memory/1860-32-0x00000000030B0000-0x00000000040B0000-memory.dmp modiloader_stage2 behavioral1/memory/1860-29-0x00000000030B0000-0x00000000040B0000-memory.dmp modiloader_stage2 behavioral1/memory/1860-27-0x00000000030B0000-0x00000000040B0000-memory.dmp modiloader_stage2 behavioral1/memory/1860-25-0x00000000030B0000-0x00000000040B0000-memory.dmp modiloader_stage2 behavioral1/memory/1860-7-0x00000000030B0000-0x00000000040B0000-memory.dmp modiloader_stage2 behavioral1/memory/1860-24-0x00000000030B0000-0x00000000040B0000-memory.dmp modiloader_stage2 behavioral1/memory/1860-22-0x00000000030B0000-0x00000000040B0000-memory.dmp modiloader_stage2 behavioral1/memory/1860-19-0x00000000030B0000-0x00000000040B0000-memory.dmp modiloader_stage2 behavioral1/memory/1860-20-0x00000000030B0000-0x00000000040B0000-memory.dmp modiloader_stage2 behavioral1/memory/1860-5-0x00000000030B0000-0x00000000040B0000-memory.dmp modiloader_stage2 behavioral1/memory/1860-6-0x00000000030B0000-0x00000000040B0000-memory.dmp modiloader_stage2 behavioral1/memory/1860-13-0x00000000030B0000-0x00000000040B0000-memory.dmp modiloader_stage2 behavioral1/memory/1860-12-0x00000000030B0000-0x00000000040B0000-memory.dmp modiloader_stage2 behavioral1/memory/1860-11-0x00000000030B0000-0x00000000040B0000-memory.dmp modiloader_stage2 behavioral1/memory/1860-10-0x00000000030B0000-0x00000000040B0000-memory.dmp modiloader_stage2 -
Program crash 1 IoCs
pid pid_target Process procid_target 2180 1860 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4e38df6415cd9a8857c5ff4185da103fa8585e8a589ff2286eaf7317e3d10755.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1860 wrote to memory of 2180 1860 4e38df6415cd9a8857c5ff4185da103fa8585e8a589ff2286eaf7317e3d10755.exe 31 PID 1860 wrote to memory of 2180 1860 4e38df6415cd9a8857c5ff4185da103fa8585e8a589ff2286eaf7317e3d10755.exe 31 PID 1860 wrote to memory of 2180 1860 4e38df6415cd9a8857c5ff4185da103fa8585e8a589ff2286eaf7317e3d10755.exe 31 PID 1860 wrote to memory of 2180 1860 4e38df6415cd9a8857c5ff4185da103fa8585e8a589ff2286eaf7317e3d10755.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e38df6415cd9a8857c5ff4185da103fa8585e8a589ff2286eaf7317e3d10755.exe"C:\Users\Admin\AppData\Local\Temp\4e38df6415cd9a8857c5ff4185da103fa8585e8a589ff2286eaf7317e3d10755.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1860 -s 7362⤵
- Program crash
PID:2180
-