Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
21/03/2023, 14:40
Static task
static1
Behavioral task
behavioral1
Sample
7ade248258607cabe21381f7bc1d26141e18c6cc5998da2f57eee775ba78d955.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
7ade248258607cabe21381f7bc1d26141e18c6cc5998da2f57eee775ba78d955.exe
Resource
win10v2004-20230220-en
General
-
Target
7ade248258607cabe21381f7bc1d26141e18c6cc5998da2f57eee775ba78d955.exe
-
Size
910KB
-
MD5
7d9e7b27f0510fb4776c55c0165ab25f
-
SHA1
c12cd673f4c8c516b367b091f3c30d30bc9c11b1
-
SHA256
db0e998a1dd20e1b6c853cc778592c580971032cc8362d236d055dde3824ca44
-
SHA512
2bc8144f54b93fb7019ceccf8c62ac043a33e570e21445f3beb8b4e3940310a28116b08ed356f5ad09d237bf68a50b48c9b8dda03008a51e09264e631e44d256
-
SSDEEP
12288:cvI/SRZe0WFIQ38UWtwn/8vprceJz5Roy59N7axbIeYPG48SLuk8A1xdY5mQPmdx:cQ3SQ3XWtwn/8vB99mDkFyYQPE29K
Malware Config
Extracted
formbook
4.1
ges9
lolofestival.store
amzin.info
pulsahokii.xyz
bahiszirve.com
animekoe.com
kansastaxaccountant.net
howgoodisgod.online
medakaravan.xyz
pesmagazine.net
americanpopulist.info
nepalihandicraft.com
mariabakermodeling.com
cavify.top
onlinewoonboulevard.com
furniture-22830.com
ophthalmicpersonneltraining.us
yz1204.com
extrawhite.site
tomo.store
martfind.online
united-bc.com
hethonglikesub.site
goldenstategeneralstore.com
amazdea.com
emiliahernandez.com
weeklyrhino.buzz
erjcbtwg.work
16321.xyz
crainbramp.games
studiochiodi.info
km97.xyz
synertel.site
ankerbios.expert
chipetaresort.com
gakuj.xyz
simmonsguitars.com
povsearcher.com
salesatomizer.app
loopmart.shop
easyonionringrecipe.site
icss.studio
ksamayaiu.xyz
xn--recomindame-gbb.com
bepillow.com
homesinowensboro.com
abrashina.com
dplck.com
michellentherapy.com
voyance.health
zwcl365.com
akroglobal.com
endlessillumination.store
florediemgardens.com
lis-journal.com
justinrichert.net
baschung.swiss
thesexyviking.com
abickofconsulting.com
vivacious713833.com
dental-implants-52958.com
tigaberlian.net
trxtr.xyz
offficebanking-cl.top
huslnfts.xyz
viralcx.com
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/2120-156-0x0000000010410000-0x000000001043F000-memory.dmp formbook behavioral2/memory/2528-165-0x0000000010410000-0x000000001043F000-memory.dmp formbook behavioral2/memory/1656-168-0x0000000000580000-0x00000000005AF000-memory.dmp formbook behavioral2/memory/1656-170-0x0000000000580000-0x00000000005AF000-memory.dmp formbook -
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral2/memory/2120-134-0x00000000025B0000-0x00000000025DC000-memory.dmp modiloader_stage2 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Nzarotih = "C:\\Users\\Public\\Libraries\\hitorazN.url" 7ade248258607cabe21381f7bc1d26141e18c6cc5998da2f57eee775ba78d955.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2528 set thread context of 3132 2528 iexpress.exe 46 PID 1656 set thread context of 3132 1656 rundll32.exe 46 -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2120 7ade248258607cabe21381f7bc1d26141e18c6cc5998da2f57eee775ba78d955.exe 2120 7ade248258607cabe21381f7bc1d26141e18c6cc5998da2f57eee775ba78d955.exe 2528 iexpress.exe 2528 iexpress.exe 2528 iexpress.exe 2528 iexpress.exe 1656 rundll32.exe 1656 rundll32.exe 1656 rundll32.exe 1656 rundll32.exe 1656 rundll32.exe 1656 rundll32.exe 1656 rundll32.exe 1656 rundll32.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2528 iexpress.exe 2528 iexpress.exe 2528 iexpress.exe 1656 rundll32.exe 1656 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2528 iexpress.exe Token: SeShutdownPrivilege 3132 Explorer.EXE Token: SeCreatePagefilePrivilege 3132 Explorer.EXE Token: SeShutdownPrivilege 3132 Explorer.EXE Token: SeCreatePagefilePrivilege 3132 Explorer.EXE Token: SeDebugPrivilege 1656 rundll32.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2120 wrote to memory of 2528 2120 7ade248258607cabe21381f7bc1d26141e18c6cc5998da2f57eee775ba78d955.exe 95 PID 2120 wrote to memory of 2528 2120 7ade248258607cabe21381f7bc1d26141e18c6cc5998da2f57eee775ba78d955.exe 95 PID 2120 wrote to memory of 2528 2120 7ade248258607cabe21381f7bc1d26141e18c6cc5998da2f57eee775ba78d955.exe 95 PID 2120 wrote to memory of 2528 2120 7ade248258607cabe21381f7bc1d26141e18c6cc5998da2f57eee775ba78d955.exe 95 PID 2120 wrote to memory of 2528 2120 7ade248258607cabe21381f7bc1d26141e18c6cc5998da2f57eee775ba78d955.exe 95 PID 2120 wrote to memory of 2528 2120 7ade248258607cabe21381f7bc1d26141e18c6cc5998da2f57eee775ba78d955.exe 95 PID 3132 wrote to memory of 1656 3132 Explorer.EXE 96 PID 3132 wrote to memory of 1656 3132 Explorer.EXE 96 PID 3132 wrote to memory of 1656 3132 Explorer.EXE 96 PID 1656 wrote to memory of 2380 1656 rundll32.exe 97 PID 1656 wrote to memory of 2380 1656 rundll32.exe 97 PID 1656 wrote to memory of 2380 1656 rundll32.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ade248258607cabe21381f7bc1d26141e18c6cc5998da2f57eee775ba78d955.exe"C:\Users\Admin\AppData\Local\Temp\7ade248258607cabe21381f7bc1d26141e18c6cc5998da2f57eee775ba78d955.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\iexpress.exeC:\Windows\System32\iexpress.exe2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2528
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\iexpress.exe"3⤵PID:2380
-
-