Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2022 11:47
Static task
static1
Behavioral task
behavioral1
Sample
Copie a bonului de plata.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
Copie a bonului de plata.exe
Resource
win10v2004-20220901-en
General
-
Target
Copie a bonului de plata.exe
-
Size
733KB
-
MD5
eb8c68c29d6131d6b903dd268d6ff0ef
-
SHA1
61dfb557d2e792229060bdeb21285f65daf48492
-
SHA256
d1798c288b296009d8049ca5364b29b079d59fadc870af65e92fe5fa23bdcec5
-
SHA512
077a05f65709382d70c1fed0836125854ae56802eb2bbfe3d3b1ecd1958f9f3c35dfaa8c91058ba6248b15e4bdd8c3a35aff8d20f302996609b0d0cae9b51fad
-
SSDEEP
12288:i1qMhtVLzLypCggIh36+O9dvjpQVeri4O2qKk/RqIkr:WFhHzmQgn6+8T/r7JaqI
Malware Config
Extracted
formbook
4.1
3nop
slot999.site
hagsahoy.com
howdyart.com
orders-marketplace.com
ranaa.email
masterlink.guru
archershut.com
weikumcommunications.com
dphardmoney.com
shjyutie.com
vivaberlin.net
mycto.today
curvygirlugc.com
otnmp.cfd
alwrists.com
propercandlecompany.com
allindustry-bg.com
theyoungbizacademy.com
expand658170.com
leslainesdumouchon.com
suptisa.com
picnic-in-andong.com
wanligui.com
cesarjunaro.com
kuxita.xyz
simpkecpr.com
microsoftsecuritys.com
responsefactor.com
polyggroup.com
talonxmfg.biz
jam-nins.com
picuar.com
familysafehidingplaces.com
centericehockey.com
appleidd.info
igctsansculottism.sbs
guiaestilosaude.online
happysscribe.com
tizzbizz.com
qcorretor.com
baremaster.online
liputanlima.com
ontherighttrack.systems
zzza002.xyz
k-aashirwaad.com
stillwatersagawork.com
skindoze.com
asdjmhfg.xyz
refaccionariafgnogales.com
hunn.pro
tlland.group
homebizen.com
newszi.xyz
nicetimecafe.net
qdbs.cloud
ebtl.wtf
dchasss.com
kijangjantan.tech
elegant-story.com
glimtmedia.com
1dot.online
neatneighborncclean.com
marionarzel.com
app-arthrex.com
xctech.world
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Formbook payload 2 IoCs
resource yara_rule behavioral2/memory/1612-136-0x0000000010410000-0x000000001043F000-memory.dmp formbook behavioral2/memory/2188-141-0x0000000010410000-0x000000001043F000-memory.dmp formbook -
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral2/memory/1612-132-0x00000000022B0000-0x00000000022DB000-memory.dmp modiloader_stage2 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Ndvmyrkf = "C:\\Users\\Public\\Libraries\\fkrymvdN.url" Copie a bonului de plata.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2188 set thread context of 2440 2188 wscript.exe 55 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1612 Copie a bonului de plata.exe 1612 Copie a bonului de plata.exe 2188 wscript.exe 2188 wscript.exe 2188 wscript.exe 2188 wscript.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2440 Explorer.EXE -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2188 wscript.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 2188 wscript.exe Token: SeShutdownPrivilege 2440 Explorer.EXE Token: SeCreatePagefilePrivilege 2440 Explorer.EXE Token: SeShutdownPrivilege 2440 Explorer.EXE Token: SeCreatePagefilePrivilege 2440 Explorer.EXE Token: SeShutdownPrivilege 2440 Explorer.EXE Token: SeCreatePagefilePrivilege 2440 Explorer.EXE Token: SeShutdownPrivilege 2440 Explorer.EXE Token: SeCreatePagefilePrivilege 2440 Explorer.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1612 wrote to memory of 2188 1612 Copie a bonului de plata.exe 88 PID 1612 wrote to memory of 2188 1612 Copie a bonului de plata.exe 88 PID 1612 wrote to memory of 2188 1612 Copie a bonului de plata.exe 88 PID 1612 wrote to memory of 2188 1612 Copie a bonului de plata.exe 88 PID 1612 wrote to memory of 2188 1612 Copie a bonului de plata.exe 88 PID 1612 wrote to memory of 2188 1612 Copie a bonului de plata.exe 88 PID 2440 wrote to memory of 3712 2440 Explorer.EXE 89 PID 2440 wrote to memory of 3712 2440 Explorer.EXE 89 PID 2440 wrote to memory of 3712 2440 Explorer.EXE 89
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\Copie a bonului de plata.exe"C:\Users\Admin\AppData\Local\Temp\Copie a bonului de plata.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\SysWOW64\wscript.exeC:\Windows\System32\wscript.exe3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2188
-
-
-
C:\Windows\SysWOW64\WWAHost.exe"C:\Windows\SysWOW64\WWAHost.exe"2⤵PID:3712
-