Analysis
-
max time kernel
152s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2022 12:39
Static task
static1
Behavioral task
behavioral1
Sample
fatura e vonuar e bashkangjitur.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
fatura e vonuar e bashkangjitur.exe
Resource
win10v2004-20221111-en
General
-
Target
fatura e vonuar e bashkangjitur.exe
-
Size
777KB
-
MD5
8bf3e429a207bdf60279f3076a85108f
-
SHA1
da48577ad55bf7c75893dea2306973ed3cad499c
-
SHA256
20722f90d97d84e6453888a294f2a6b8e62c15daf9da7b6e13649ffb95c2146f
-
SHA512
b56454134d55655d87e30309b965cfecdc2b516c5a2abf68f5a748d8c187fe1cd1581701b947f399d10f4b257bfda8208a638394a906f4bd6291c4063115b771
-
SSDEEP
12288:4aDW4pT3boLduwYh0H7/C+khXx7ogdmTOeIurz7MJUXbXzaHyCkonBcyrj:4ajVsLduwA0HLC+k7MgdmTRrl/ronBd
Malware Config
Extracted
xloader
2.5
euv4
anniebapartments.com
hagenbicycles.com
herbalist101.com
southerncorrosion.net
kuechenpruefer.com
tajniezdrzi.quest
segurofunerarioar.com
boardsandbeamsdecor.com
alifdanismanlik.com
pkem.top
mddc.clinic
handejqr.com
crux-at.com
awp.email
hugsforbubbs.com
cielotherepy.com
turkcuyuz.com
teamidc.com
lankasirinspa.com
68135.online
oprimanumerodos.com
launchclik.com
customapronsnow.com
thecuratedpour.com
20dzwww.com
encludemedia.com
kreativevisibility.net
mehfeels.com
oecmgroup.com
alert78.info
1207rossmoyne.com
spbutoto.com
t1uba.com
protection-onepa.com
byausorsm26-plala.xyz
bestpleasure4u.com
allmnlenem.quest
mobilpartes.com
fabio.tools
bubu3cin.com
nathanmartinez.digital
shristiprintingplaces.com
silkyflawless.com
berylgrote.top
laidbackfurniture.store
leatherman-neal.com
uschargeport.com
the-pumps.com
deepootech.com
drimev.com
seo-art.agency
jasabacklinkweb20.com
tracynicolalamond.com
dandtglaziers.com
vulacils.com
bendyourtongue.com
gulfund.com
ahmadfaizlajis.com
595531.com
metavillagehub.com
librairie-adrienne.com
77777.store
gongwenbo.com
game2plays.com
rematedeldia.com
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1540-132-0x0000000000A20000-0x0000000000A4B000-memory.dmp modiloader_stage2 -
Xloader payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1540-136-0x0000000030410000-0x0000000030439000-memory.dmp xloader -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
fatura e vonuar e bashkangjitur.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Gsizunxx = "C:\\Users\\Public\\Libraries\\xxnuzisG.url" fatura e vonuar e bashkangjitur.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
fatura e vonuar e bashkangjitur.exepid process 1540 fatura e vonuar e bashkangjitur.exe 1540 fatura e vonuar e bashkangjitur.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
fatura e vonuar e bashkangjitur.exedescription pid process target process PID 1540 wrote to memory of 4728 1540 fatura e vonuar e bashkangjitur.exe wscript.exe PID 1540 wrote to memory of 4728 1540 fatura e vonuar e bashkangjitur.exe wscript.exe PID 1540 wrote to memory of 4728 1540 fatura e vonuar e bashkangjitur.exe wscript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fatura e vonuar e bashkangjitur.exe"C:\Users\Admin\AppData\Local\Temp\fatura e vonuar e bashkangjitur.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\wscript.exeC:\Windows\System32\wscript.exe2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1540-132-0x0000000000A20000-0x0000000000A4B000-memory.dmpFilesize
172KB
-
memory/1540-135-0x0000000030410000-0x0000000030439000-memory.dmpFilesize
164KB
-
memory/1540-136-0x0000000030410000-0x0000000030439000-memory.dmpFilesize
164KB
-
memory/4728-134-0x0000000000000000-mapping.dmp