Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2022 16:34
Static task
static1
Behavioral task
behavioral1
Sample
85ba889a32a7f05f10259b60b5b99489392865c025978171d93c9074a7cdb84f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
85ba889a32a7f05f10259b60b5b99489392865c025978171d93c9074a7cdb84f.exe
Resource
win10v2004-20220901-en
General
-
Target
85ba889a32a7f05f10259b60b5b99489392865c025978171d93c9074a7cdb84f.exe
-
Size
936KB
-
MD5
4e88286476d26cead4caafb1231ec062
-
SHA1
e7051669e96f7c80b8affc1554d0fa6e9fad5117
-
SHA256
85ba889a32a7f05f10259b60b5b99489392865c025978171d93c9074a7cdb84f
-
SHA512
06de3ec1d5d4f018b8ce9af031c2c37f89e09bd6c49b3a33f774a7bcb00ef3160906b4a8fcc3a93d1b5324bb05c2c4e57ebe6776524125c57585f790452b9e23
-
SSDEEP
24576:J6K2h1iVrItFQWGKN+NXN40JIyLrFHDvk:J6K286n+NXmWb1j
Malware Config
Extracted
formbook
g2vp
vz0+DrD922K7
V5ZNAytMxUPisN5i
Vybph6lLcYZKp1DCPg==
9G7+3oNwb8g=
rLSpOybMkJg7zg==
Waxl6QhHkJg7zg==
+VcesNB/gWPH7f6OTx5TCsmQIQ==
qY1JBTFp78tVa0NoY1fRgA==
mJBPbgYFyiyi
Kn4x3wYykJg7zg==
HV4LyfYgnoBkBmjQjDE/6Jc=
5fztl7/4km4ft/A49wgjlw==
WhORUSjYSG8/0w==
q2odpxEmGy8jOSM=
mpiaKMwZKWwQKhpFAme9mu7WNg==
SlBF07lCZ3AiZF2iIZUnCQnqtvnqXBA=
qigcpxO2PpxU7ClaJovhvToKClAYexg=
4nBYD4adzkTisN5i
WKleKtX1IotJ3QxT2vUkq4o=
yE5P+SVt40XisN5i
Iz066oeWg82r99cq9NsZ6tS6OA==
OngfwDp2sTql9ZfvYJE=
BFALkXmGG/pigFucctgntpYe/Xw=
Rxjai4CYSTujp1DCPg==
9LMlxWT1fyRKu+5jKIW9RrpRT6Ak
mq6lQzrd5sYuVmdUJoY=
txC/XAYMXapg/j5r5DVH7Z0=
it6MI4odq3UuQGnpwtUYJ41q
qRQY3wlCkJg7zg==
RefQaNb+DngFVMdO7Q9PGoRo
zVBC54k4xlh61DOcj1LS
4yjrgaJPhZBJp1DCPg==
D8iSOd15H7JieONo
u3MnxW243WhOnrwZLkTR
kaGXNCa5y8w9h91O4zI8tduITlxR/hYHrw==
G+qfLbw0kJg7zg==
xurdiICpGi6I2TajNg==
IU+glMwLvtv3OiY=
ABIY3wqfwvMdZj4=
+1Qi3YQqpwCnsiarboDY+3Bg
GlodyvKi3kDp9SiVSL/HQ2I0G7OMr3Aspw==
zZpYEz7b1q1h6TymPbY46q+VHV4dyij6
okAx1Iba3j4mdJ+gHyNh7JU=
lhwZy20WpvMdZj4=
xyffbd4OLEGjqepk81FeCsmQIQ==
m2Ea2tFsmKwPHwJGHLG3TPTYXHQ=
h1EFqdaNuhwDUGdUJoY=
BvX8kgKUKvfisN5i
ewQa3gIKm33tQojlmDVH7Z0=
NIQgu12aZsMgOhQZLkTR
A8SBD36rtQStv6zimjVH7Z0=
9W5h+WoHh+hBRxtS9wgjlw==
0NDNX0NIWsI=
iy8Vx3XKz/MdZj4=
32l1JFB/LjwwzP5b8URXCsmQIQ==
pTlF7wogxs+7Y8w/9wgjlw==
+rx2Uuj922K7
s4s08x5cyaqTzgWMNiGvesdRT6Ak
4dvTk8gStaxehF+VEmHjCsmQIQ==
2OHNXkNIWsI=
gE79p0hjV6l/2X7sq07X
r3Ed7xe44kIr0zOH68sYJ41q
goj89VmMlb8fSSgZLkTR
xRjJg6q9TyqU4jnKqvstuJYe/Xw=
americnamusical.com
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 61 IoCs
resource yara_rule behavioral2/memory/1380-133-0x00000000042E0000-0x0000000004336000-memory.dmp modiloader_stage2 behavioral2/memory/1380-135-0x00000000042E0000-0x0000000004336000-memory.dmp modiloader_stage2 behavioral2/memory/1380-136-0x00000000042E0000-0x0000000004336000-memory.dmp modiloader_stage2 behavioral2/memory/1380-137-0x00000000042E0000-0x0000000004336000-memory.dmp modiloader_stage2 behavioral2/memory/1380-138-0x00000000042E0000-0x0000000004336000-memory.dmp modiloader_stage2 behavioral2/memory/1380-140-0x00000000042E0000-0x0000000004336000-memory.dmp modiloader_stage2 behavioral2/memory/1380-139-0x00000000042E0000-0x0000000004336000-memory.dmp modiloader_stage2 behavioral2/memory/1380-141-0x00000000042E0000-0x0000000004336000-memory.dmp modiloader_stage2 behavioral2/memory/1380-142-0x00000000042E0000-0x0000000004336000-memory.dmp modiloader_stage2 behavioral2/memory/1380-143-0x00000000042E0000-0x0000000004336000-memory.dmp modiloader_stage2 behavioral2/memory/1380-144-0x00000000042E0000-0x0000000004336000-memory.dmp modiloader_stage2 behavioral2/memory/1380-145-0x00000000042E0000-0x0000000004336000-memory.dmp modiloader_stage2 behavioral2/memory/1380-146-0x00000000042E0000-0x0000000004336000-memory.dmp modiloader_stage2 behavioral2/memory/1380-147-0x00000000042E0000-0x0000000004336000-memory.dmp modiloader_stage2 behavioral2/memory/1380-148-0x00000000042E0000-0x0000000004336000-memory.dmp modiloader_stage2 behavioral2/memory/1380-149-0x00000000042E0000-0x0000000004336000-memory.dmp modiloader_stage2 behavioral2/memory/1380-150-0x00000000042E0000-0x0000000004336000-memory.dmp modiloader_stage2 behavioral2/memory/1380-151-0x00000000042E0000-0x0000000004336000-memory.dmp modiloader_stage2 behavioral2/memory/1380-152-0x00000000042E0000-0x0000000004336000-memory.dmp modiloader_stage2 behavioral2/memory/1380-153-0x00000000042E0000-0x0000000004336000-memory.dmp modiloader_stage2 behavioral2/memory/1380-154-0x00000000042E0000-0x0000000004336000-memory.dmp modiloader_stage2 behavioral2/memory/1380-155-0x00000000042E0000-0x0000000004336000-memory.dmp modiloader_stage2 behavioral2/memory/1380-156-0x00000000042E0000-0x0000000004336000-memory.dmp modiloader_stage2 behavioral2/memory/1380-157-0x00000000042E0000-0x0000000004336000-memory.dmp modiloader_stage2 behavioral2/memory/1380-158-0x00000000042E0000-0x0000000004336000-memory.dmp modiloader_stage2 behavioral2/memory/1380-159-0x00000000042E0000-0x0000000004336000-memory.dmp modiloader_stage2 behavioral2/memory/1380-160-0x00000000042E0000-0x0000000004336000-memory.dmp modiloader_stage2 behavioral2/memory/1380-161-0x00000000042E0000-0x0000000004336000-memory.dmp modiloader_stage2 behavioral2/memory/1380-162-0x00000000042E0000-0x0000000004336000-memory.dmp modiloader_stage2 behavioral2/memory/1380-164-0x00000000042E0000-0x0000000004336000-memory.dmp modiloader_stage2 behavioral2/memory/1380-165-0x00000000042E0000-0x0000000004336000-memory.dmp modiloader_stage2 behavioral2/memory/1380-166-0x00000000042E0000-0x0000000004336000-memory.dmp modiloader_stage2 behavioral2/memory/1380-167-0x00000000042E0000-0x0000000004336000-memory.dmp modiloader_stage2 behavioral2/memory/1380-168-0x00000000042E0000-0x0000000004336000-memory.dmp modiloader_stage2 behavioral2/memory/1380-169-0x00000000042E0000-0x0000000004336000-memory.dmp modiloader_stage2 behavioral2/memory/1380-170-0x00000000042E0000-0x0000000004336000-memory.dmp modiloader_stage2 behavioral2/memory/1380-171-0x00000000042E0000-0x0000000004336000-memory.dmp modiloader_stage2 behavioral2/memory/1380-172-0x00000000042E0000-0x0000000004336000-memory.dmp modiloader_stage2 behavioral2/memory/1380-173-0x00000000042E0000-0x0000000004336000-memory.dmp modiloader_stage2 behavioral2/memory/1380-174-0x00000000042E0000-0x0000000004336000-memory.dmp modiloader_stage2 behavioral2/memory/1380-175-0x00000000042E0000-0x0000000004336000-memory.dmp modiloader_stage2 behavioral2/memory/1380-177-0x00000000042E0000-0x0000000004336000-memory.dmp modiloader_stage2 behavioral2/memory/1380-178-0x00000000042E0000-0x0000000004336000-memory.dmp modiloader_stage2 behavioral2/memory/1380-179-0x00000000042E0000-0x0000000004336000-memory.dmp modiloader_stage2 behavioral2/memory/1380-180-0x00000000042E0000-0x0000000004336000-memory.dmp modiloader_stage2 behavioral2/memory/1380-181-0x00000000042E0000-0x0000000004336000-memory.dmp modiloader_stage2 behavioral2/memory/1380-182-0x00000000042E0000-0x0000000004336000-memory.dmp modiloader_stage2 behavioral2/memory/1380-183-0x00000000042E0000-0x0000000004336000-memory.dmp modiloader_stage2 behavioral2/memory/1380-184-0x00000000042E0000-0x0000000004336000-memory.dmp modiloader_stage2 behavioral2/memory/1380-185-0x00000000042E0000-0x0000000004336000-memory.dmp modiloader_stage2 behavioral2/memory/1380-186-0x00000000042E0000-0x0000000004336000-memory.dmp modiloader_stage2 behavioral2/memory/1380-187-0x00000000042E0000-0x0000000004336000-memory.dmp modiloader_stage2 behavioral2/memory/1380-188-0x00000000042E0000-0x0000000004336000-memory.dmp modiloader_stage2 behavioral2/memory/1380-189-0x00000000042E0000-0x0000000004336000-memory.dmp modiloader_stage2 behavioral2/memory/1380-190-0x00000000042E0000-0x0000000004336000-memory.dmp modiloader_stage2 behavioral2/memory/1380-191-0x00000000042E0000-0x0000000004336000-memory.dmp modiloader_stage2 behavioral2/memory/1380-192-0x00000000042E0000-0x0000000004336000-memory.dmp modiloader_stage2 behavioral2/memory/1380-193-0x00000000042E0000-0x0000000004336000-memory.dmp modiloader_stage2 behavioral2/memory/1380-195-0x00000000042E0000-0x0000000004336000-memory.dmp modiloader_stage2 behavioral2/memory/1380-196-0x00000000042E0000-0x0000000004336000-memory.dmp modiloader_stage2 behavioral2/memory/1380-197-0x00000000042E0000-0x0000000004336000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 85ba889a32a7f05f10259b60b5b99489392865c025978171d93c9074a7cdb84f.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Docsyspcl = "C:\\Users\\Public\\Libraries\\lcpsyscoD.url" 85ba889a32a7f05f10259b60b5b99489392865c025978171d93c9074a7cdb84f.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2228 set thread context of 3004 2228 iexpress.exe 12 PID 2364 set thread context of 3004 2364 wlanext.exe 12 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \Registry\User\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 wlanext.exe -
Suspicious behavior: EnumeratesProcesses 58 IoCs
pid Process 1380 85ba889a32a7f05f10259b60b5b99489392865c025978171d93c9074a7cdb84f.exe 1380 85ba889a32a7f05f10259b60b5b99489392865c025978171d93c9074a7cdb84f.exe 2228 iexpress.exe 2228 iexpress.exe 2228 iexpress.exe 2228 iexpress.exe 2228 iexpress.exe 2228 iexpress.exe 2228 iexpress.exe 2228 iexpress.exe 2364 wlanext.exe 2364 wlanext.exe 2364 wlanext.exe 2364 wlanext.exe 2364 wlanext.exe 2364 wlanext.exe 2364 wlanext.exe 2364 wlanext.exe 2364 wlanext.exe 2364 wlanext.exe 2364 wlanext.exe 2364 wlanext.exe 2364 wlanext.exe 2364 wlanext.exe 2364 wlanext.exe 2364 wlanext.exe 2364 wlanext.exe 2364 wlanext.exe 2364 wlanext.exe 2364 wlanext.exe 2364 wlanext.exe 2364 wlanext.exe 2364 wlanext.exe 2364 wlanext.exe 2364 wlanext.exe 2364 wlanext.exe 2364 wlanext.exe 2364 wlanext.exe 2364 wlanext.exe 2364 wlanext.exe 2364 wlanext.exe 2364 wlanext.exe 2364 wlanext.exe 2364 wlanext.exe 2364 wlanext.exe 2364 wlanext.exe 2364 wlanext.exe 2364 wlanext.exe 2364 wlanext.exe 2364 wlanext.exe 2364 wlanext.exe 2364 wlanext.exe 2364 wlanext.exe 2364 wlanext.exe 2364 wlanext.exe 2364 wlanext.exe 2364 wlanext.exe 2364 wlanext.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3004 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 2228 iexpress.exe 2228 iexpress.exe 2228 iexpress.exe 2364 wlanext.exe 2364 wlanext.exe 2364 wlanext.exe 2364 wlanext.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 2228 iexpress.exe Token: SeShutdownPrivilege 3004 Explorer.EXE Token: SeCreatePagefilePrivilege 3004 Explorer.EXE Token: SeShutdownPrivilege 3004 Explorer.EXE Token: SeCreatePagefilePrivilege 3004 Explorer.EXE Token: SeShutdownPrivilege 3004 Explorer.EXE Token: SeCreatePagefilePrivilege 3004 Explorer.EXE Token: SeDebugPrivilege 2364 wlanext.exe Token: SeShutdownPrivilege 3004 Explorer.EXE Token: SeCreatePagefilePrivilege 3004 Explorer.EXE Token: SeShutdownPrivilege 3004 Explorer.EXE Token: SeCreatePagefilePrivilege 3004 Explorer.EXE Token: SeShutdownPrivilege 3004 Explorer.EXE Token: SeCreatePagefilePrivilege 3004 Explorer.EXE Token: SeShutdownPrivilege 3004 Explorer.EXE Token: SeCreatePagefilePrivilege 3004 Explorer.EXE Token: SeShutdownPrivilege 3004 Explorer.EXE Token: SeCreatePagefilePrivilege 3004 Explorer.EXE Token: SeShutdownPrivilege 3004 Explorer.EXE Token: SeCreatePagefilePrivilege 3004 Explorer.EXE Token: SeShutdownPrivilege 3004 Explorer.EXE Token: SeCreatePagefilePrivilege 3004 Explorer.EXE Token: SeShutdownPrivilege 3004 Explorer.EXE Token: SeCreatePagefilePrivilege 3004 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1380 wrote to memory of 2228 1380 85ba889a32a7f05f10259b60b5b99489392865c025978171d93c9074a7cdb84f.exe 84 PID 1380 wrote to memory of 2228 1380 85ba889a32a7f05f10259b60b5b99489392865c025978171d93c9074a7cdb84f.exe 84 PID 1380 wrote to memory of 2228 1380 85ba889a32a7f05f10259b60b5b99489392865c025978171d93c9074a7cdb84f.exe 84 PID 1380 wrote to memory of 2228 1380 85ba889a32a7f05f10259b60b5b99489392865c025978171d93c9074a7cdb84f.exe 84 PID 1380 wrote to memory of 2228 1380 85ba889a32a7f05f10259b60b5b99489392865c025978171d93c9074a7cdb84f.exe 84 PID 1380 wrote to memory of 2228 1380 85ba889a32a7f05f10259b60b5b99489392865c025978171d93c9074a7cdb84f.exe 84 PID 3004 wrote to memory of 2364 3004 Explorer.EXE 85 PID 3004 wrote to memory of 2364 3004 Explorer.EXE 85 PID 3004 wrote to memory of 2364 3004 Explorer.EXE 85 PID 2364 wrote to memory of 2356 2364 wlanext.exe 93 PID 2364 wrote to memory of 2356 2364 wlanext.exe 93 PID 2364 wrote to memory of 2356 2364 wlanext.exe 93
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\85ba889a32a7f05f10259b60b5b99489392865c025978171d93c9074a7cdb84f.exe"C:\Users\Admin\AppData\Local\Temp\85ba889a32a7f05f10259b60b5b99489392865c025978171d93c9074a7cdb84f.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\SysWOW64\iexpress.exe"C:\Windows\System32\iexpress.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2228
-
-
-
C:\Windows\SysWOW64\wlanext.exe"C:\Windows\SysWOW64\wlanext.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:2356
-
-