Analysis
-
max time kernel
26s -
max time network
35s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
07-05-2023 09:14
Static task
static1
Behavioral task
behavioral1
Sample
PURCHASE001.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
PURCHASE001.exe
Resource
win10v2004-20230220-en
General
-
Target
PURCHASE001.exe
-
Size
876KB
-
MD5
73fb99c411ecc3783a6f8ca99c4b38d3
-
SHA1
0fac050f30927c0bdb6a59b629a28e9d9277b741
-
SHA256
be67380a29f7a6441a097d6921cf5c7348bc0ed6d20844b7ec662c24d96c82a5
-
SHA512
115b8e5b9327b5040aa128cb27df87a21d39e283514ee27b6385566c97f3741b4fb2bf31a8ae9ac013a5faca3613654b6d8fcbf7e67ddaa8a1c36b722c258b67
-
SSDEEP
12288:NtN+qFRD49GYo3EU9Aj4aNJqzSiMpV+j5fnur1/AUiXZSGjrJ3xigV:NLX89GZ9NaLlpo5S7oZ//J3L
Malware Config
Extracted
formbook
4.1
h3sc
seemessage.com
bitlab.website
cheesestuff.ru
bhartiyafitness.com
bardapps.com
l7a4.com
chiara-samatanga.com
lesrollintioup.com
dropwc.com
mackey242.com
rackksfresheggs.com
thinkvlog.com
aidmedicalassist.com
firehousepickleball.net
sifreyonetici.com
teka-mart.com
ddttzone.xyz
macfeeupdate.com
ivocastillo.com
serjayparks.com
uptimeps.cfd
prioritivity.com
linjia.cfd
rentmobil99.com
amazonpublicationhouse.com
wisconsinprivatelenders.com
emavgrfcolvin.click
navegadornet.tech
extremetension.com
hpm8cnb5s2vqr.com
sxhjdp.com
breathevitality.com
easyshopalgeria.com
profibex.com
3546464356.top
shopanml.space
andhra2telangana.com
b4pizzeria.click
thehealingcoaches.com
theantalyas37d.com
tyuuhai.site
look.fashion
zbzhaochang.com
emmettis.com
data4u-e.shop
dawnzdesignzz.com
modulatic.com
measuremateshop.com
5starseptics.com
zexalin.top
r693.xyz
techcryptoreview.com
singiteasy.store
portpay.site
holmtransport.com
zkdwvtg.top
nonetdc.xyz
customerservicesafesteptub.com
myhandmadeheaven.com
prostockdirect.store
vppq.buzz
malibu5.com
alexfallah.com
93oo.top
illatales.com
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Formbook payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1256-61-0x0000000030410000-0x000000003043F000-memory.dmp formbook -
ModiLoader Second Stage 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1256-54-0x00000000003A0000-0x00000000003F9000-memory.dmp modiloader_stage2 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
PURCHASE001.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Windows\CurrentVersion\Run\Nkgvk = "C:\\Users\\Public\\Libraries\\kvgkN.url" PURCHASE001.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
PURCHASE001.exepid process 1256 PURCHASE001.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
PURCHASE001.exedescription pid process target process PID 1256 wrote to memory of 984 1256 PURCHASE001.exe wscript.exe PID 1256 wrote to memory of 984 1256 PURCHASE001.exe wscript.exe PID 1256 wrote to memory of 984 1256 PURCHASE001.exe wscript.exe PID 1256 wrote to memory of 984 1256 PURCHASE001.exe wscript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PURCHASE001.exe"C:\Users\Admin\AppData\Local\Temp\PURCHASE001.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Windows\SysWOW64\wscript.exeC:\Windows\System32\wscript.exe2⤵PID:984
-