Analysis
-
max time kernel
187s -
max time network
210s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 09:30
Static task
static1
Behavioral task
behavioral1
Sample
Swift Payment Copy .xla.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
Swift Payment Copy .xla.exe
Resource
win10v2004-20221111-en
General
-
Target
Swift Payment Copy .xla.exe
-
Size
793KB
-
MD5
1721e78ab207e52b366bf7a7723a656b
-
SHA1
d2cbaf931dc21807ae5f3ac477810f7f537d444e
-
SHA256
85465b3e86e0e4a460fcf28729773f52de6777db71890ead00e4bee867a3e3ec
-
SHA512
c03920bed87494876f7683ae7081c8977b90165e0645fe5b410dff13be305a61e60fef698972019a57074d7c9a2aa4ca0cf2089f66c323e70aaff73ee1a60510
-
SSDEEP
12288:VV2cbnbazcd5JluSVVvkYhrN+kZt+kXPqTdTB2O4rwSMpxwhxStY:V4cnOcd53uSVVJRskZQWq5oOqLM2xS+
Malware Config
Extracted
https://onedrive.live.com/download?cid=E0CF7F9E6AAF27EF&resid=E0CF7F9E6AAF27EF%21815&authkey=AO1B_84jlgMTl9c
Extracted
formbook
nvp4
EiywrQNofDNveWY1IESoBA==
yqEWFGRfErX7ICQCwyQ+YeLXtaA=
Ers0rc50nbjso0jbdZTmBw==
XQxVP45+F5OZn3ZBTC7MLe1OF3G5c5uK9A==
RHh4uwtsttjzlxy+eW3+
W+xQshfnvmF5n5x2d+cEVdBNIkQRHRE=
FwlyiuXNX0+Trw==
euLn91on/7DeDe++zbQ4YeLXtaA=
td4cO8m3HDRWtl8p7Q==
ZrlyAAPqc3GXI5k=
OM0IisKOI78FJC/IuIxxAu5nRg==
d6A0QJ6PV+AOpyK+eW3+
+EgxFWUu3Ulatl8p7Q==
GC/stck1ILXn+cWZx7w8W6rPFmO6c5uK9A==
hhIiK4+CKEOfB4tr
mA1pyQ85ye8N
4xgWYcEpEoidv8eXKNncAQ==
L+hOVbe+IWyc8oVUclc=
J7EGaJ+L+wKLXUYg7w==
L5R/nfdgQdMHD+TUKw1Zo3Hb
E4z2kWG/vE6yt5E=
+efGEVp82EycSL2U4cpFU2an/aM5SDuF
6zA2kAqIdAQKkve6y7RjtRBf+i8Nvw==
VRqXzvXLVF+hS9arybBihGeOTaKP
PgKByBDCpL4cd9+yO52n/xZmQZeF
pMit5lre4GVyi3xcfywQY58=
F/vD9x4Oz0RWtl8p7Q==
hvZhvTgp/H7Lm2RNdl0=
h/xWhNLDOEpSZUTmIguoBA==
o8qw6kCdiDV4kn1FMZ6et06V+dCQZEmG
bgMOGYox8vMQ
YmFKj+ZWVRBcep49cl0=
Wox2hOnIRnGp3s2RMZ9Zo3Hb
eeTk5zCrpCpSyntTeF0=
FOA7J3NsxuomwEARYVLNU1TR
yuLXKrWb72SKrA==
K6T6LoiKKwZrHY5i
B8UkEkol7nBvrLeOjSwQY58=
GwvWc8gVAk6yt5E=
4IboPYD24Hqi5mxf+g==
L4XQI2A00QtXxxi+eW3+
doMqp/ZMkE6yt5E=
1ebXKoTs0GSYqMZZc1U=
CYnoUKIiG5vI4/HHLNXpCw==
P/FwuirU0FeJxseeKNncAQ==
N21GaMlCYhFbtl8p7Q==
KY95j+NDjk6yt5E=
C/rJL7ACO0yfB4tr
z6QDKYo85+nxAx+zmTgBLYY=
IPBjddXCgzlvd2Y/C3KaMomhUQ==
KNsyKXJjN+wYPi8OLgNZo3Hb
kht0meHAHPpzqQ==
Rm5BMnxa1/s/yxq2wSJcfpc=
+Tn9l2Ax8vMQ
rwkQV4ruG7v1/s+ZKNncAQ==
7+RhcuhVYBpggr5YZUw=
YRaX4klS4xWfB4tr
YIZ5wgZjYOsslloz9A==
+SAdmP/smDZ6oKF4GxNZo3Hb
mSIWBEa/uz9JSodz
PGc0UrsbRk1LwHVWOp+9CQ==
DnJQctQ5jE6yt5E=
gYmlw+nLOxtYl4k=
eRJtqhQDH3KQsg==
brainbookgroup.com
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3536-132-0x0000000003E50000-0x0000000003E7C000-memory.dmp modiloader_stage2 -
Blocklisted process makes network request 2 IoCs
Processes:
powershell.exeflow pid process 50 1464 powershell.exe 57 1464 powershell.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Swift Payment Copy .xla.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Wgelnqfe = "C:\\Users\\Public\\Libraries\\efqnlegW.url" Swift Payment Copy .xla.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
colorcpl.exemsiexec.exedescription pid process target process PID 3488 set thread context of 2380 3488 colorcpl.exe Explorer.EXE PID 3304 set thread context of 2380 3304 msiexec.exe Explorer.EXE -
Processes:
msiexec.exedescription ioc process Key created \Registry\User\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 msiexec.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
Processes:
powershell.exeSwift Payment Copy .xla.execolorcpl.exemsiexec.exepid process 1464 powershell.exe 1464 powershell.exe 3536 Swift Payment Copy .xla.exe 3536 Swift Payment Copy .xla.exe 3488 colorcpl.exe 3488 colorcpl.exe 3488 colorcpl.exe 3488 colorcpl.exe 3488 colorcpl.exe 3488 colorcpl.exe 3488 colorcpl.exe 3488 colorcpl.exe 3304 msiexec.exe 3304 msiexec.exe 3304 msiexec.exe 3304 msiexec.exe 3304 msiexec.exe 3304 msiexec.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
colorcpl.exemsiexec.exepid process 3488 colorcpl.exe 3488 colorcpl.exe 3488 colorcpl.exe 3304 msiexec.exe 3304 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
powershell.execolorcpl.exeExplorer.EXEmsiexec.exedescription pid process Token: SeDebugPrivilege 1464 powershell.exe Token: SeDebugPrivilege 3488 colorcpl.exe Token: SeShutdownPrivilege 2380 Explorer.EXE Token: SeCreatePagefilePrivilege 2380 Explorer.EXE Token: SeShutdownPrivilege 2380 Explorer.EXE Token: SeCreatePagefilePrivilege 2380 Explorer.EXE Token: SeDebugPrivilege 3304 msiexec.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
Swift Payment Copy .xla.execmd.exeExplorer.EXEdescription pid process target process PID 3536 wrote to memory of 4020 3536 Swift Payment Copy .xla.exe cmd.exe PID 3536 wrote to memory of 4020 3536 Swift Payment Copy .xla.exe cmd.exe PID 3536 wrote to memory of 4020 3536 Swift Payment Copy .xla.exe cmd.exe PID 4020 wrote to memory of 1464 4020 cmd.exe powershell.exe PID 4020 wrote to memory of 1464 4020 cmd.exe powershell.exe PID 4020 wrote to memory of 1464 4020 cmd.exe powershell.exe PID 3536 wrote to memory of 3488 3536 Swift Payment Copy .xla.exe colorcpl.exe PID 3536 wrote to memory of 3488 3536 Swift Payment Copy .xla.exe colorcpl.exe PID 3536 wrote to memory of 3488 3536 Swift Payment Copy .xla.exe colorcpl.exe PID 3536 wrote to memory of 3488 3536 Swift Payment Copy .xla.exe colorcpl.exe PID 3536 wrote to memory of 3488 3536 Swift Payment Copy .xla.exe colorcpl.exe PID 3536 wrote to memory of 3488 3536 Swift Payment Copy .xla.exe colorcpl.exe PID 2380 wrote to memory of 3304 2380 Explorer.EXE msiexec.exe PID 2380 wrote to memory of 3304 2380 Explorer.EXE msiexec.exe PID 2380 wrote to memory of 3304 2380 Explorer.EXE msiexec.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\Swift Payment Copy .xla.exe"C:\Users\Admin\AppData\Local\Temp\Swift Payment Copy .xla.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Public\Libraries\png.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -FILE C:\Users\Public\Libraries\png.ps14⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1464 -
C:\Windows\SysWOW64\colorcpl.exeC:\Windows\System32\colorcpl.exe3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3488 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3304
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
185KB
MD53385285a8ae3b9aa8b29c9056f219725
SHA1ce533bc605693d957c552e3bfada86c68c2f352b
SHA256d630d5ab79ce2fc0f479a92226f945b7be51104f35e95ec0c9490d78ecc960e3
SHA512689e87d6aa05bda334b18a4e2cd39d9445cfa8cb7e2495dec110aea7c851dc7abc5e00ae376884fd44f7479a1075e7121003d81b406be8cd9832d9c950db9321
-
Filesize
100B
MD5c385a71887d828b1df961942e68ecfe8
SHA13f539a56267af3db91be9ac9ea2fd5d803a53279
SHA256bcd9e416bc017b7f079e7daee3b628ccdcf34cfb93d1d131f0d11ee2ba3498f3
SHA51283d48fa5c8d06918fe63404500f35231f461dd7ce57540d9f9c36b0fcc81a15e02f28e5aa66acdf2183ce95acd2f301e3d5963c10e2bc298c93dab87e9d90848
-
Filesize
241B
MD516347e9f1fab632cc9f3bda14900ac97
SHA19d7838e4d9693b0911028a1976d3179dfc17c583
SHA25625cef2e7db529683a3725c54e4cf7a596c872a5e42519095ce2fe5730888e57e
SHA5129bde664979109e99f7d9a3bc70783befd706a722f8e9b0e3f5da177e0d4c0746b15dd929d882439479817822edc1b384a645a3617585de8215bcdf90d9001f67