Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
29-06-2024 01:27
Static task
static1
Behavioral task
behavioral1
Sample
17a2d20472e063786e78758a6334003e.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
17a2d20472e063786e78758a6334003e.exe
Resource
win10v2004-20240611-en
General
-
Target
17a2d20472e063786e78758a6334003e.exe
-
Size
675KB
-
MD5
17a2d20472e063786e78758a6334003e
-
SHA1
26bbe3616bb6aaf493ce23e9a456e21a654bb221
-
SHA256
6aa4387e64709dac5e1056fe88d053fcf2721758e0cc061ed1f2c5036d489d3a
-
SHA512
291f732a741521ffa4d0c71a4e9f83c875055aae5fe4d0cb6a30a9dec3ce99311c38ad7a2e0ef9e84fab42d2bf139fa5814bd0e704103bceadd482a6accb36da
-
SSDEEP
12288:yc/dweTqQKgLr6Qw7cMPyD+R7awulbXIxF3Z4mxxiDqVTVOC5:yc/dw1Q/v6F7vPyDq7LupXOQmX5VTz5
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2220-21-0x0000000000400000-0x000000000056D000-memory.dmp modiloader_stage2 -
Drops file in Program Files directory 1 IoCs
Processes:
17a2d20472e063786e78758a6334003e.exedescription ioc process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\FieleWay.txt 17a2d20472e063786e78758a6334003e.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
17a2d20472e063786e78758a6334003e.exedescription pid process target process PID 2220 wrote to memory of 2404 2220 17a2d20472e063786e78758a6334003e.exe IEXPLORE.EXE PID 2220 wrote to memory of 2404 2220 17a2d20472e063786e78758a6334003e.exe IEXPLORE.EXE PID 2220 wrote to memory of 2404 2220 17a2d20472e063786e78758a6334003e.exe IEXPLORE.EXE PID 2220 wrote to memory of 2404 2220 17a2d20472e063786e78758a6334003e.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\17a2d20472e063786e78758a6334003e.exe"C:\Users\Admin\AppData\Local\Temp\17a2d20472e063786e78758a6334003e.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2220-0-0x0000000000400000-0x000000000056D000-memory.dmpFilesize
1.4MB
-
memory/2220-1-0x00000000002C0000-0x0000000000314000-memory.dmpFilesize
336KB
-
memory/2220-12-0x0000000003290000-0x0000000003291000-memory.dmpFilesize
4KB
-
memory/2220-11-0x0000000003290000-0x0000000003291000-memory.dmpFilesize
4KB
-
memory/2220-10-0x0000000001ED0000-0x0000000001ED1000-memory.dmpFilesize
4KB
-
memory/2220-9-0x0000000001F40000-0x0000000001F41000-memory.dmpFilesize
4KB
-
memory/2220-8-0x0000000001F10000-0x0000000001F11000-memory.dmpFilesize
4KB
-
memory/2220-7-0x0000000001F20000-0x0000000001F21000-memory.dmpFilesize
4KB
-
memory/2220-6-0x0000000000720000-0x0000000000721000-memory.dmpFilesize
4KB
-
memory/2220-5-0x0000000001EC0000-0x0000000001EC1000-memory.dmpFilesize
4KB
-
memory/2220-4-0x0000000001F30000-0x0000000001F31000-memory.dmpFilesize
4KB
-
memory/2220-3-0x0000000001EE0000-0x0000000001EE1000-memory.dmpFilesize
4KB
-
memory/2220-2-0x0000000001F00000-0x0000000001F01000-memory.dmpFilesize
4KB
-
memory/2220-14-0x0000000003280000-0x000000000332A000-memory.dmpFilesize
680KB
-
memory/2220-15-0x0000000003280000-0x000000000332A000-memory.dmpFilesize
680KB
-
memory/2220-16-0x0000000003280000-0x000000000332A000-memory.dmpFilesize
680KB
-
memory/2220-18-0x0000000003280000-0x000000000332A000-memory.dmpFilesize
680KB
-
memory/2220-17-0x0000000003280000-0x000000000332A000-memory.dmpFilesize
680KB
-
memory/2220-13-0x0000000003280000-0x000000000332A000-memory.dmpFilesize
680KB
-
memory/2220-19-0x0000000000710000-0x0000000000711000-memory.dmpFilesize
4KB
-
memory/2220-22-0x00000000002C0000-0x0000000000314000-memory.dmpFilesize
336KB
-
memory/2220-21-0x0000000000400000-0x000000000056D000-memory.dmpFilesize
1.4MB