Analysis
-
max time kernel
61s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2022 15:58
Static task
static1
Behavioral task
behavioral1
Sample
LBOYSFOW.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
LBOYSFOW.exe
Resource
win10v2004-20220812-en
General
-
Target
LBOYSFOW.exe
-
Size
1.1MB
-
MD5
b6211b4885b55082836497b0de3e669e
-
SHA1
2d43a7310b06a3b5dc71c7d393eca6361a9a48ef
-
SHA256
ad3b106fafc9cbbcc00766e2f68aac4b963312092a3a3cce1aa325348b9824e6
-
SHA512
87d438d078ca18ba828577a2403ee2e3860edffea9b89fcd54cf7586272a989dfe7af4761b2c4a10b6800d77bd5566155cecddee094fca465c120b1d4154810a
-
SSDEEP
24576:wIk11alpxKYvIOWdB6yfgb8SDxOTeCYSfI5b2sJxHJHtuSCg/c3kCv/oMw2n+OkX:wfQnyf1dA
Malware Config
Extracted
bitrat
1.38
davidmanne.casacam.net:2223
-
communication_password
b6c6e855edf908ec7c12ce8c8e628a5c
-
tor_process
tor
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 63 IoCs
Processes:
resource yara_rule behavioral2/memory/4612-132-0x00000000021E0000-0x000000000220B000-memory.dmp modiloader_stage2 behavioral2/memory/4612-134-0x00000000021E0000-0x000000000220B000-memory.dmp modiloader_stage2 behavioral2/memory/4612-135-0x00000000021E0000-0x000000000220B000-memory.dmp modiloader_stage2 behavioral2/memory/4612-136-0x00000000021E0000-0x000000000220B000-memory.dmp modiloader_stage2 behavioral2/memory/4612-137-0x00000000021E0000-0x000000000220B000-memory.dmp modiloader_stage2 behavioral2/memory/4612-138-0x00000000021E0000-0x000000000220B000-memory.dmp modiloader_stage2 behavioral2/memory/4612-139-0x00000000021E0000-0x000000000220B000-memory.dmp modiloader_stage2 behavioral2/memory/4612-140-0x00000000021E0000-0x000000000220B000-memory.dmp modiloader_stage2 behavioral2/memory/4612-141-0x00000000021E0000-0x000000000220B000-memory.dmp modiloader_stage2 behavioral2/memory/4612-142-0x00000000021E0000-0x000000000220B000-memory.dmp modiloader_stage2 behavioral2/memory/4612-143-0x00000000021E0000-0x000000000220B000-memory.dmp modiloader_stage2 behavioral2/memory/4612-144-0x00000000021E0000-0x000000000220B000-memory.dmp modiloader_stage2 behavioral2/memory/4612-145-0x00000000021E0000-0x000000000220B000-memory.dmp modiloader_stage2 behavioral2/memory/4612-146-0x00000000021E0000-0x000000000220B000-memory.dmp modiloader_stage2 behavioral2/memory/4612-147-0x00000000021E0000-0x000000000220B000-memory.dmp modiloader_stage2 behavioral2/memory/4612-148-0x00000000021E0000-0x000000000220B000-memory.dmp modiloader_stage2 behavioral2/memory/4612-149-0x00000000021E0000-0x000000000220B000-memory.dmp modiloader_stage2 behavioral2/memory/4612-150-0x00000000021E0000-0x000000000220B000-memory.dmp modiloader_stage2 behavioral2/memory/4612-151-0x00000000021E0000-0x000000000220B000-memory.dmp modiloader_stage2 behavioral2/memory/4612-152-0x00000000021E0000-0x000000000220B000-memory.dmp modiloader_stage2 behavioral2/memory/4612-153-0x00000000021E0000-0x000000000220B000-memory.dmp modiloader_stage2 behavioral2/memory/4612-154-0x00000000021E0000-0x000000000220B000-memory.dmp modiloader_stage2 behavioral2/memory/4612-155-0x00000000021E0000-0x000000000220B000-memory.dmp modiloader_stage2 behavioral2/memory/4612-156-0x00000000021E0000-0x000000000220B000-memory.dmp modiloader_stage2 behavioral2/memory/4612-157-0x00000000021E0000-0x000000000220B000-memory.dmp modiloader_stage2 behavioral2/memory/4612-158-0x00000000021E0000-0x000000000220B000-memory.dmp modiloader_stage2 behavioral2/memory/4612-159-0x00000000021E0000-0x000000000220B000-memory.dmp modiloader_stage2 behavioral2/memory/4612-160-0x00000000021E0000-0x000000000220B000-memory.dmp modiloader_stage2 behavioral2/memory/4612-161-0x00000000021E0000-0x000000000220B000-memory.dmp modiloader_stage2 behavioral2/memory/4612-162-0x00000000021E0000-0x000000000220B000-memory.dmp modiloader_stage2 behavioral2/memory/4612-163-0x00000000021E0000-0x000000000220B000-memory.dmp modiloader_stage2 behavioral2/memory/4612-164-0x00000000021E0000-0x000000000220B000-memory.dmp modiloader_stage2 behavioral2/memory/4612-165-0x00000000021E0000-0x000000000220B000-memory.dmp modiloader_stage2 behavioral2/memory/4612-166-0x00000000021E0000-0x000000000220B000-memory.dmp modiloader_stage2 behavioral2/memory/4612-167-0x00000000021E0000-0x000000000220B000-memory.dmp modiloader_stage2 behavioral2/memory/4612-168-0x00000000021E0000-0x000000000220B000-memory.dmp modiloader_stage2 behavioral2/memory/4612-169-0x00000000021E0000-0x000000000220B000-memory.dmp modiloader_stage2 behavioral2/memory/4612-170-0x00000000021E0000-0x000000000220B000-memory.dmp modiloader_stage2 behavioral2/memory/4612-171-0x00000000021E0000-0x000000000220B000-memory.dmp modiloader_stage2 behavioral2/memory/4612-172-0x00000000021E0000-0x000000000220B000-memory.dmp modiloader_stage2 behavioral2/memory/4612-173-0x00000000021E0000-0x000000000220B000-memory.dmp modiloader_stage2 behavioral2/memory/4612-174-0x00000000021E0000-0x000000000220B000-memory.dmp modiloader_stage2 behavioral2/memory/4612-175-0x00000000021E0000-0x000000000220B000-memory.dmp modiloader_stage2 behavioral2/memory/4612-176-0x00000000021E0000-0x000000000220B000-memory.dmp modiloader_stage2 behavioral2/memory/4612-177-0x00000000021E0000-0x000000000220B000-memory.dmp modiloader_stage2 behavioral2/memory/4612-178-0x00000000021E0000-0x000000000220B000-memory.dmp modiloader_stage2 behavioral2/memory/4612-179-0x00000000021E0000-0x000000000220B000-memory.dmp modiloader_stage2 behavioral2/memory/4612-180-0x00000000021E0000-0x000000000220B000-memory.dmp modiloader_stage2 behavioral2/memory/4612-181-0x00000000021E0000-0x000000000220B000-memory.dmp modiloader_stage2 behavioral2/memory/4612-182-0x00000000021E0000-0x000000000220B000-memory.dmp modiloader_stage2 behavioral2/memory/4612-183-0x00000000021E0000-0x000000000220B000-memory.dmp modiloader_stage2 behavioral2/memory/4612-184-0x00000000021E0000-0x000000000220B000-memory.dmp modiloader_stage2 behavioral2/memory/4612-185-0x00000000021E0000-0x000000000220B000-memory.dmp modiloader_stage2 behavioral2/memory/4612-186-0x00000000021E0000-0x000000000220B000-memory.dmp modiloader_stage2 behavioral2/memory/4612-187-0x00000000021E0000-0x000000000220B000-memory.dmp modiloader_stage2 behavioral2/memory/4612-188-0x00000000021E0000-0x000000000220B000-memory.dmp modiloader_stage2 behavioral2/memory/4612-189-0x00000000021E0000-0x000000000220B000-memory.dmp modiloader_stage2 behavioral2/memory/4612-190-0x00000000021E0000-0x000000000220B000-memory.dmp modiloader_stage2 behavioral2/memory/4612-191-0x00000000021E0000-0x000000000220B000-memory.dmp modiloader_stage2 behavioral2/memory/4612-192-0x00000000021E0000-0x000000000220B000-memory.dmp modiloader_stage2 behavioral2/memory/4612-193-0x00000000021E0000-0x000000000220B000-memory.dmp modiloader_stage2 behavioral2/memory/4612-194-0x00000000021E0000-0x000000000220B000-memory.dmp modiloader_stage2 behavioral2/memory/4612-195-0x00000000021E0000-0x000000000220B000-memory.dmp modiloader_stage2 -
Processes:
resource yara_rule behavioral2/memory/3772-308-0x0000000010410000-0x00000000107F4000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
LBOYSFOW.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Lboysfow = "C:\\Users\\Public\\Libraries\\wofsyobL.url" LBOYSFOW.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
LBOYSFOW.exepid process 4612 LBOYSFOW.exe 4612 LBOYSFOW.exe -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
LBOYSFOW.exedescription pid process target process PID 4612 wrote to memory of 3772 4612 LBOYSFOW.exe wscript.exe PID 4612 wrote to memory of 3772 4612 LBOYSFOW.exe wscript.exe PID 4612 wrote to memory of 3772 4612 LBOYSFOW.exe wscript.exe PID 4612 wrote to memory of 3772 4612 LBOYSFOW.exe wscript.exe PID 4612 wrote to memory of 3772 4612 LBOYSFOW.exe wscript.exe PID 4612 wrote to memory of 3772 4612 LBOYSFOW.exe wscript.exe PID 4612 wrote to memory of 3772 4612 LBOYSFOW.exe wscript.exe PID 4612 wrote to memory of 3772 4612 LBOYSFOW.exe wscript.exe PID 4612 wrote to memory of 3772 4612 LBOYSFOW.exe wscript.exe PID 4612 wrote to memory of 3772 4612 LBOYSFOW.exe wscript.exe PID 4612 wrote to memory of 3772 4612 LBOYSFOW.exe wscript.exe PID 4612 wrote to memory of 3772 4612 LBOYSFOW.exe wscript.exe PID 4612 wrote to memory of 3772 4612 LBOYSFOW.exe wscript.exe PID 4612 wrote to memory of 3772 4612 LBOYSFOW.exe wscript.exe PID 4612 wrote to memory of 3772 4612 LBOYSFOW.exe wscript.exe PID 4612 wrote to memory of 3772 4612 LBOYSFOW.exe wscript.exe PID 4612 wrote to memory of 3772 4612 LBOYSFOW.exe wscript.exe PID 4612 wrote to memory of 3772 4612 LBOYSFOW.exe wscript.exe PID 4612 wrote to memory of 3772 4612 LBOYSFOW.exe wscript.exe PID 4612 wrote to memory of 3772 4612 LBOYSFOW.exe wscript.exe PID 4612 wrote to memory of 3772 4612 LBOYSFOW.exe wscript.exe PID 4612 wrote to memory of 3772 4612 LBOYSFOW.exe wscript.exe PID 4612 wrote to memory of 3772 4612 LBOYSFOW.exe wscript.exe PID 4612 wrote to memory of 3772 4612 LBOYSFOW.exe wscript.exe PID 4612 wrote to memory of 3772 4612 LBOYSFOW.exe wscript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\LBOYSFOW.exe"C:\Users\Admin\AppData\Local\Temp\LBOYSFOW.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Windows\SysWOW64\wscript.exeC:\Windows\System32\wscript.exe2⤵PID:3772