Analysis
-
max time kernel
121s -
max time network
35s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
28-04-2023 23:10
Static task
static1
Behavioral task
behavioral1
Sample
PURCHASE001.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
PURCHASE001.exe
Resource
win10v2004-20230220-en
General
-
Target
PURCHASE001.exe
-
Size
876KB
-
MD5
73fb99c411ecc3783a6f8ca99c4b38d3
-
SHA1
0fac050f30927c0bdb6a59b629a28e9d9277b741
-
SHA256
be67380a29f7a6441a097d6921cf5c7348bc0ed6d20844b7ec662c24d96c82a5
-
SHA512
115b8e5b9327b5040aa128cb27df87a21d39e283514ee27b6385566c97f3741b4fb2bf31a8ae9ac013a5faca3613654b6d8fcbf7e67ddaa8a1c36b722c258b67
-
SSDEEP
12288:NtN+qFRD49GYo3EU9Aj4aNJqzSiMpV+j5fnur1/AUiXZSGjrJ3xigV:NLX89GZ9NaLlpo5S7oZ//J3L
Malware Config
Extracted
formbook
4.1
h3sc
seemessage.com
bitlab.website
cheesestuff.ru
bhartiyafitness.com
bardapps.com
l7a4.com
chiara-samatanga.com
lesrollintioup.com
dropwc.com
mackey242.com
rackksfresheggs.com
thinkvlog.com
aidmedicalassist.com
firehousepickleball.net
sifreyonetici.com
teka-mart.com
ddttzone.xyz
macfeeupdate.com
ivocastillo.com
serjayparks.com
uptimeps.cfd
prioritivity.com
linjia.cfd
rentmobil99.com
amazonpublicationhouse.com
wisconsinprivatelenders.com
emavgrfcolvin.click
navegadornet.tech
extremetension.com
hpm8cnb5s2vqr.com
sxhjdp.com
breathevitality.com
easyshopalgeria.com
profibex.com
3546464356.top
shopanml.space
andhra2telangana.com
b4pizzeria.click
thehealingcoaches.com
theantalyas37d.com
tyuuhai.site
look.fashion
zbzhaochang.com
emmettis.com
data4u-e.shop
dawnzdesignzz.com
modulatic.com
measuremateshop.com
5starseptics.com
zexalin.top
r693.xyz
techcryptoreview.com
singiteasy.store
portpay.site
holmtransport.com
zkdwvtg.top
nonetdc.xyz
customerservicesafesteptub.com
myhandmadeheaven.com
prostockdirect.store
vppq.buzz
malibu5.com
alexfallah.com
93oo.top
illatales.com
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Formbook payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1992-61-0x0000000010410000-0x000000001043F000-memory.dmp formbook behavioral1/memory/1924-69-0x0000000010410000-0x000000001043F000-memory.dmp formbook -
ModiLoader Second Stage 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1992-54-0x00000000003A0000-0x00000000003F9000-memory.dmp modiloader_stage2 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
PURCHASE001.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Windows\CurrentVersion\Run\Nkgvk = "C:\\Users\\Public\\Libraries\\kvgkN.url" PURCHASE001.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
wscript.exedescription pid process target process PID 1924 set thread context of 1244 1924 wscript.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
PURCHASE001.exewscript.exepid process 1992 PURCHASE001.exe 1924 wscript.exe 1924 wscript.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 1244 Explorer.EXE -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
wscript.exepid process 1924 wscript.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
wscript.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 1924 wscript.exe Token: SeShutdownPrivilege 1244 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid process 1244 Explorer.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
PURCHASE001.exeExplorer.EXEdescription pid process target process PID 1992 wrote to memory of 1924 1992 PURCHASE001.exe wscript.exe PID 1992 wrote to memory of 1924 1992 PURCHASE001.exe wscript.exe PID 1992 wrote to memory of 1924 1992 PURCHASE001.exe wscript.exe PID 1992 wrote to memory of 1924 1992 PURCHASE001.exe wscript.exe PID 1992 wrote to memory of 1924 1992 PURCHASE001.exe wscript.exe PID 1992 wrote to memory of 1924 1992 PURCHASE001.exe wscript.exe PID 1992 wrote to memory of 1924 1992 PURCHASE001.exe wscript.exe PID 1244 wrote to memory of 664 1244 Explorer.EXE help.exe PID 1244 wrote to memory of 664 1244 Explorer.EXE help.exe PID 1244 wrote to memory of 664 1244 Explorer.EXE help.exe PID 1244 wrote to memory of 664 1244 Explorer.EXE help.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Users\Admin\AppData\Local\Temp\PURCHASE001.exe"C:\Users\Admin\AppData\Local\Temp\PURCHASE001.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\SysWOW64\wscript.exeC:\Windows\System32\wscript.exe3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1924
-
-
-
C:\Windows\SysWOW64\help.exe"C:\Windows\SysWOW64\help.exe"2⤵PID:664
-