Analysis
-
max time kernel
152s -
max time network
150s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
11-01-2022 16:21
Static task
static1
Behavioral task
behavioral1
Sample
f8fc925d89baa140c9cb436f158ec91209789e9f8e82a0b7252f05587ce8e06f.bin.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
f8fc925d89baa140c9cb436f158ec91209789e9f8e82a0b7252f05587ce8e06f.bin.dll
Resource
win10-en-20211208
General
-
Target
f8fc925d89baa140c9cb436f158ec91209789e9f8e82a0b7252f05587ce8e06f.bin.dll
-
Size
269KB
-
MD5
2a4b62f495027dfb6f7549ca7ed7f47b
-
SHA1
47f6c5aea3b9724f143125f97bf9e8b72faf1a38
-
SHA256
f8fc925d89baa140c9cb436f158ec91209789e9f8e82a0b7252f05587ce8e06f
-
SHA512
cc56c0448a138eca87a7fdce1cef67932ff868ea31ead0e342d3f265f92f4b9f91023d3fc01f7123149be469ccbaa2f2fdef950f9336557956ef10b4f36e4f9f
Malware Config
Extracted
xloader
2.5
n8rn
jlvip1066.com
gconsultingfirm.com
foundergomwef.xyz
bredaslo.com
ethereumpets.com
buddymerrillmusic.com
archdeylemmergay.com
particulares-es.icu
gb2022-club.com
babypasal.com
mlikew.com
mskindi.com
securewalletvalidate.com
billstrasse24.com
ritebet388.com
nuhive.net
nekomediphile.com
jaynelsonphotog.com
writerpilotpublishing.store
taquerialoteria.com
feetlover.online
buychryslers.com
duyol.com
theeppunday.com
slayfearlessly.com
padelthiene.com
falcongroupmanagement.com
security-paiemet.com
disfagiaresidencias.com
ragworkhouse.com
smplkindness.com
dartsearchengine.com
rapibest.com
lab-design.online
soflovrlnd.com
pandawan.club
purifybrush.com
grantopwincup.website
zenholisticstores.com
nomarcapital.com
thoughtultracruel.quest
excellentdefence.com
phillystore.net
egregore.club
waysgaming.com
boliden-ab.com
faxedfumnook.com
ecobook.club
ff4c75x4e.xyz
connect01.com
monascake.xyz
balaga-vacances.com
prill.quest
princessbuilt.com
islandresiliency.com
dimcreadev.tech
bspcanadaconnects.com
hotgurlmarket.com
spendbrasiltimebest.com
newelectricways.com
counterpokemon.com
beyerenterprisestreeservice.com
phorganicfoods.com
hermespros.com
mgav26.xyz
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral2/memory/3408-119-0x00000000040C0000-0x0000000004108000-memory.dmp modiloader_stage2 -
Xloader Payload 2 IoCs
resource yara_rule behavioral2/memory/4092-133-0x0000000072480000-0x00000000724AA000-memory.dmp xloader behavioral2/memory/4376-138-0x00000000027A0000-0x00000000027C9000-memory.dmp xloader -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Windows\CurrentVersion\Run\Wbjhzk = "C:\\Users\\Public\\Libraries\\\\kzhjbW.url" rundll32.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4092 set thread context of 396 4092 DpiScaling.exe 9 PID 4376 set thread context of 396 4376 mstsc.exe 9 -
Modifies registry key 1 TTPs 3 IoCs
pid Process 4312 reg.exe 4260 reg.exe 784 reg.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 4092 DpiScaling.exe 4092 DpiScaling.exe 4092 DpiScaling.exe 4092 DpiScaling.exe 4376 mstsc.exe 4376 mstsc.exe 4376 mstsc.exe 4376 mstsc.exe 4376 mstsc.exe 4376 mstsc.exe 4376 mstsc.exe 4376 mstsc.exe 4376 mstsc.exe 4376 mstsc.exe 4376 mstsc.exe 4376 mstsc.exe 4376 mstsc.exe 4376 mstsc.exe 4376 mstsc.exe 4376 mstsc.exe 4376 mstsc.exe 4376 mstsc.exe 4376 mstsc.exe 4376 mstsc.exe 4376 mstsc.exe 4376 mstsc.exe 4376 mstsc.exe 4376 mstsc.exe 4376 mstsc.exe 4376 mstsc.exe 4376 mstsc.exe 4376 mstsc.exe 4376 mstsc.exe 4376 mstsc.exe 4376 mstsc.exe 4376 mstsc.exe 4376 mstsc.exe 4376 mstsc.exe 4376 mstsc.exe 4376 mstsc.exe 4376 mstsc.exe 4376 mstsc.exe 4376 mstsc.exe 4376 mstsc.exe 4376 mstsc.exe 4376 mstsc.exe 4376 mstsc.exe 4376 mstsc.exe 4376 mstsc.exe 4376 mstsc.exe 4376 mstsc.exe 4376 mstsc.exe 4376 mstsc.exe 4376 mstsc.exe 4376 mstsc.exe 4376 mstsc.exe 4376 mstsc.exe 4376 mstsc.exe 4376 mstsc.exe 4376 mstsc.exe 4376 mstsc.exe 4376 mstsc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 396 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 4092 DpiScaling.exe 4092 DpiScaling.exe 4092 DpiScaling.exe 4376 mstsc.exe 4376 mstsc.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 4092 DpiScaling.exe Token: SeDebugPrivilege 4376 mstsc.exe Token: SeShutdownPrivilege 396 Explorer.EXE Token: SeCreatePagefilePrivilege 396 Explorer.EXE Token: SeShutdownPrivilege 396 Explorer.EXE Token: SeCreatePagefilePrivilege 396 Explorer.EXE -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 3436 wrote to memory of 3408 3436 rundll32.exe 69 PID 3436 wrote to memory of 3408 3436 rundll32.exe 69 PID 3436 wrote to memory of 3408 3436 rundll32.exe 69 PID 3408 wrote to memory of 4092 3408 rundll32.exe 70 PID 3408 wrote to memory of 4092 3408 rundll32.exe 70 PID 3408 wrote to memory of 4092 3408 rundll32.exe 70 PID 3408 wrote to memory of 4092 3408 rundll32.exe 70 PID 3408 wrote to memory of 4092 3408 rundll32.exe 70 PID 3408 wrote to memory of 4092 3408 rundll32.exe 70 PID 3408 wrote to memory of 3148 3408 rundll32.exe 71 PID 3408 wrote to memory of 3148 3408 rundll32.exe 71 PID 3408 wrote to memory of 3148 3408 rundll32.exe 71 PID 3148 wrote to memory of 4040 3148 cmd.exe 73 PID 3148 wrote to memory of 4040 3148 cmd.exe 73 PID 3148 wrote to memory of 4040 3148 cmd.exe 73 PID 4040 wrote to memory of 4312 4040 cmd.exe 75 PID 4040 wrote to memory of 4312 4040 cmd.exe 75 PID 4040 wrote to memory of 4312 4040 cmd.exe 75 PID 4040 wrote to memory of 4260 4040 cmd.exe 76 PID 4040 wrote to memory of 4260 4040 cmd.exe 76 PID 4040 wrote to memory of 4260 4040 cmd.exe 76 PID 4040 wrote to memory of 4232 4040 cmd.exe 77 PID 4040 wrote to memory of 4232 4040 cmd.exe 77 PID 4040 wrote to memory of 4232 4040 cmd.exe 77 PID 396 wrote to memory of 4376 396 Explorer.EXE 78 PID 396 wrote to memory of 4376 396 Explorer.EXE 78 PID 396 wrote to memory of 4376 396 Explorer.EXE 78 PID 3408 wrote to memory of 4352 3408 rundll32.exe 79 PID 3408 wrote to memory of 4352 3408 rundll32.exe 79 PID 3408 wrote to memory of 4352 3408 rundll32.exe 79 PID 4352 wrote to memory of 784 4352 cmd.exe 81 PID 4352 wrote to memory of 784 4352 cmd.exe 81 PID 4352 wrote to memory of 784 4352 cmd.exe 81
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f8fc925d89baa140c9cb436f158ec91209789e9f8e82a0b7252f05587ce8e06f.bin.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f8fc925d89baa140c9cb436f158ec91209789e9f8e82a0b7252f05587ce8e06f.bin.dll,#13⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Windows\SysWOW64\DpiScaling.exeC:\Windows\System32\DpiScaling.exe4⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4092
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Public\Trast.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\Users\Public\UKO.bat5⤵
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Windows\SysWOW64\reg.exereg delete hkcu\Environment /v windir /f6⤵
- Modifies registry key
PID:4312
-
-
C:\Windows\SysWOW64\reg.exereg add hkcu\Environment /v windir /d "cmd /c start /min C:\Users\Public\KDECO.bat reg delete hkcu\Environment /v windir /f && REM "6⤵
- Modifies registry key
PID:4260
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Run /TN \Microsoft\Windows\DiskCleanup\SilentCleanup /I6⤵PID:4232
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Public\nest.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Windows\SysWOW64\reg.exereg delete hkcu\Environment /v windir /f5⤵
- Modifies registry key
PID:784
-
-
-
-
-
C:\Windows\SysWOW64\mstsc.exe"C:\Windows\SysWOW64\mstsc.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4376
-