Analysis
-
max time kernel
151s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
16/06/2022, 09:41
Static task
static1
Behavioral task
behavioral1
Sample
03214426728.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
03214426728.exe
Resource
win10v2004-20220414-en
General
-
Target
03214426728.exe
-
Size
732KB
-
MD5
6597a0fbd9b2ee3bcf4a801fe4b69ae0
-
SHA1
6f5bd5f70bc21389c4d9ba4870bb8d4f97983a06
-
SHA256
57023cbc586b92ef899c3299c174c2689ba5b5e6e970976adde29d9977be9ddb
-
SHA512
377ed8daa7d35792babd744f3065db6cc92f6f4c352fab595b9f01598b43796183d635234cc49dcac88188a1816fdede39bb8c06efd515e1158170f5947ec3b4
Malware Config
Extracted
xloader
2.6
uj3c
copimetro.com
choonchain.com
luxxwireless.com
fashionweekofcincinnati.com
campingshare.net
suncochina.com
kidsfundoor.com
testingnyc.co
lovesoe.com
vehiclesbeenrecord.com
socialpearmarketing.com
maxproductdji.com
getallarticle.online
forummind.com
arenamarenostrum.com
trisuaka.xyz
designgamagazine.com
chateaulehotel.com
huangse5.com
esginvestment.tech
intercontinentalship.com
moneytaoism.com
agardenfortwo.com
trendiddas.com
fjuoomw.xyz
dantvilla.com
shopwithtrooperdavecom.com
lanwenzong.com
xpertsrealty.com
gamelabsmash.com
nomaxdic.com
chillyracing.com
mypleasure-blog.com
projectkyla.com
florurbana.com
oneplacemexico.com
gografic.com
giantht.com
dotombori-base.com
westlifinance.online
maacsecurity.com
lydas.info
instapandas.com
labustiadepaper.net
unglue52.com
onurnet.net
wellkept.info
6111.site
platinumroofingsusa.com
bodyplex.fitness
empireapothecary.com
meigsbuilds.online
garygrover.com
nicholasnikas.com
yd9992.com
protections-clients.info
sueyhzx.com
naturathome.info
superinformatico.net
printsgarden.com
xn--qn1b03fy2b841b.com
preferable.info
ozzyconstructionma.com
10stopp.online
nutricognition.com
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 39 IoCs
resource yara_rule behavioral2/memory/1960-140-0x0000000000660000-0x00000000006B2000-memory.dmp modiloader_stage2 behavioral2/memory/1960-141-0x0000000000660000-0x00000000006B2000-memory.dmp modiloader_stage2 behavioral2/memory/1960-143-0x0000000000660000-0x00000000006B2000-memory.dmp modiloader_stage2 behavioral2/memory/1960-142-0x0000000000660000-0x00000000006B2000-memory.dmp modiloader_stage2 behavioral2/memory/1960-145-0x0000000000660000-0x00000000006B2000-memory.dmp modiloader_stage2 behavioral2/memory/1960-146-0x0000000000660000-0x00000000006B2000-memory.dmp modiloader_stage2 behavioral2/memory/1960-147-0x0000000000660000-0x00000000006B2000-memory.dmp modiloader_stage2 behavioral2/memory/1960-144-0x0000000000660000-0x00000000006B2000-memory.dmp modiloader_stage2 behavioral2/memory/1960-149-0x0000000000660000-0x00000000006B2000-memory.dmp modiloader_stage2 behavioral2/memory/1960-150-0x0000000000660000-0x00000000006B2000-memory.dmp modiloader_stage2 behavioral2/memory/1960-151-0x0000000000660000-0x00000000006B2000-memory.dmp modiloader_stage2 behavioral2/memory/1960-148-0x0000000000660000-0x00000000006B2000-memory.dmp modiloader_stage2 behavioral2/memory/1960-153-0x0000000000660000-0x00000000006B2000-memory.dmp modiloader_stage2 behavioral2/memory/1960-154-0x0000000000660000-0x00000000006B2000-memory.dmp modiloader_stage2 behavioral2/memory/1960-155-0x0000000000660000-0x00000000006B2000-memory.dmp modiloader_stage2 behavioral2/memory/1960-156-0x0000000000660000-0x00000000006B2000-memory.dmp modiloader_stage2 behavioral2/memory/1960-152-0x0000000000660000-0x00000000006B2000-memory.dmp modiloader_stage2 behavioral2/memory/1960-158-0x0000000000660000-0x00000000006B2000-memory.dmp modiloader_stage2 behavioral2/memory/1960-159-0x0000000000660000-0x00000000006B2000-memory.dmp modiloader_stage2 behavioral2/memory/1960-157-0x0000000000660000-0x00000000006B2000-memory.dmp modiloader_stage2 behavioral2/memory/1960-160-0x0000000000660000-0x00000000006B2000-memory.dmp modiloader_stage2 behavioral2/memory/1960-161-0x0000000000660000-0x00000000006B2000-memory.dmp modiloader_stage2 behavioral2/memory/1960-162-0x0000000000660000-0x00000000006B2000-memory.dmp modiloader_stage2 behavioral2/memory/1960-164-0x0000000000660000-0x00000000006B2000-memory.dmp modiloader_stage2 behavioral2/memory/1960-165-0x0000000000660000-0x00000000006B2000-memory.dmp modiloader_stage2 behavioral2/memory/1960-163-0x0000000000660000-0x00000000006B2000-memory.dmp modiloader_stage2 behavioral2/memory/1960-169-0x0000000000660000-0x00000000006B2000-memory.dmp modiloader_stage2 behavioral2/memory/1960-170-0x0000000000660000-0x00000000006B2000-memory.dmp modiloader_stage2 behavioral2/memory/1960-171-0x0000000000660000-0x00000000006B2000-memory.dmp modiloader_stage2 behavioral2/memory/1960-172-0x0000000000660000-0x00000000006B2000-memory.dmp modiloader_stage2 behavioral2/memory/1960-173-0x0000000000660000-0x00000000006B2000-memory.dmp modiloader_stage2 behavioral2/memory/1960-180-0x0000000000660000-0x00000000006B2000-memory.dmp modiloader_stage2 behavioral2/memory/1960-181-0x0000000000660000-0x00000000006B2000-memory.dmp modiloader_stage2 behavioral2/memory/1960-182-0x0000000000660000-0x00000000006B2000-memory.dmp modiloader_stage2 behavioral2/memory/1960-183-0x0000000000660000-0x00000000006B2000-memory.dmp modiloader_stage2 behavioral2/memory/1960-185-0x0000000000660000-0x00000000006B2000-memory.dmp modiloader_stage2 behavioral2/memory/1960-186-0x0000000000660000-0x00000000006B2000-memory.dmp modiloader_stage2 behavioral2/memory/1960-187-0x0000000000660000-0x00000000006B2000-memory.dmp modiloader_stage2 behavioral2/memory/1960-184-0x0000000000660000-0x00000000006B2000-memory.dmp modiloader_stage2 -
Xloader Payload 6 IoCs
resource yara_rule behavioral2/memory/1960-167-0x0000000010410000-0x000000001043B000-memory.dmp xloader behavioral2/memory/400-168-0x0000000000000000-mapping.dmp xloader behavioral2/memory/400-192-0x0000000010410000-0x000000001043B000-memory.dmp xloader behavioral2/memory/400-196-0x0000000010410000-0x000000001043B000-memory.dmp xloader behavioral2/memory/2576-200-0x0000000000E30000-0x0000000000E5B000-memory.dmp xloader behavioral2/memory/2576-201-0x0000000000E30000-0x0000000000E5B000-memory.dmp xloader -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Ykhseldguv = "C:\\Users\\Public\\Libraries\\vugdleshkY.url" 03214426728.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 400 set thread context of 892 400 DpiScaling.exe 54 PID 400 set thread context of 892 400 DpiScaling.exe 54 PID 2576 set thread context of 892 2576 help.exe 54 -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 400 DpiScaling.exe 400 DpiScaling.exe 400 DpiScaling.exe 400 DpiScaling.exe 400 DpiScaling.exe 400 DpiScaling.exe 2576 help.exe 2576 help.exe 2576 help.exe 2576 help.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 400 DpiScaling.exe 400 DpiScaling.exe 400 DpiScaling.exe 400 DpiScaling.exe 2576 help.exe 2576 help.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 400 DpiScaling.exe Token: SeDebugPrivilege 2576 help.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1960 wrote to memory of 400 1960 03214426728.exe 80 PID 1960 wrote to memory of 400 1960 03214426728.exe 80 PID 1960 wrote to memory of 400 1960 03214426728.exe 80 PID 1960 wrote to memory of 400 1960 03214426728.exe 80 PID 1960 wrote to memory of 400 1960 03214426728.exe 80 PID 1960 wrote to memory of 400 1960 03214426728.exe 80 PID 892 wrote to memory of 2576 892 Explorer.EXE 87 PID 892 wrote to memory of 2576 892 Explorer.EXE 87 PID 892 wrote to memory of 2576 892 Explorer.EXE 87 PID 2576 wrote to memory of 1336 2576 help.exe 89 PID 2576 wrote to memory of 1336 2576 help.exe 89 PID 2576 wrote to memory of 1336 2576 help.exe 89
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Users\Admin\AppData\Local\Temp\03214426728.exe"C:\Users\Admin\AppData\Local\Temp\03214426728.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\DpiScaling.exeC:\Windows\System32\DpiScaling.exe3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:400
-
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:4436
-
-
C:\Windows\SysWOW64\help.exe"C:\Windows\SysWOW64\help.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\DpiScaling.exe"3⤵PID:1336
-
-