Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
13/05/2023, 22:49
Static task
static1
Behavioral task
behavioral1
Sample
d5b181be63ce08ec89eb7db52735a626.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
d5b181be63ce08ec89eb7db52735a626.exe
Resource
win10v2004-20230220-en
General
-
Target
d5b181be63ce08ec89eb7db52735a626.exe
-
Size
841KB
-
MD5
d5b181be63ce08ec89eb7db52735a626
-
SHA1
c33df2f9fcd1e2b961f990bbbd819fff218c0a20
-
SHA256
fcc333cc2afdf31c58e273f1ffe429fa7a765479582f9508867517c23d51a9f4
-
SHA512
1cb6bb49cf683f66c7a631131797b7c6ebe9d041dd9285368ec8817c8725e88d63d6a095cc915f3dc84bf63858e73ec44318ee25d452ece5ef7759cd448071ff
-
SSDEEP
12288:werZScSZpW3BcOfqg1EM50Pbkttml53kbXJ2zl:woUZpW3S2gKIsbZ2h
Malware Config
Extracted
formbook
4.1
ges9
lolofestival.store
amzin.info
pulsahokii.xyz
bahiszirve.com
animekoe.com
kansastaxaccountant.net
howgoodisgod.online
medakaravan.xyz
pesmagazine.net
americanpopulist.info
nepalihandicraft.com
mariabakermodeling.com
cavify.top
onlinewoonboulevard.com
furniture-22830.com
ophthalmicpersonneltraining.us
yz1204.com
extrawhite.site
tomo.store
martfind.online
united-bc.com
hethonglikesub.site
goldenstategeneralstore.com
amazdea.com
emiliahernandez.com
weeklyrhino.buzz
erjcbtwg.work
16321.xyz
crainbramp.games
studiochiodi.info
km97.xyz
synertel.site
ankerbios.expert
chipetaresort.com
gakuj.xyz
simmonsguitars.com
povsearcher.com
salesatomizer.app
loopmart.shop
easyonionringrecipe.site
icss.studio
ksamayaiu.xyz
xn--recomindame-gbb.com
bepillow.com
homesinowensboro.com
abrashina.com
dplck.com
michellentherapy.com
voyance.health
zwcl365.com
akroglobal.com
endlessillumination.store
florediemgardens.com
lis-journal.com
justinrichert.net
baschung.swiss
thesexyviking.com
abickofconsulting.com
vivacious713833.com
dental-implants-52958.com
tigaberlian.net
trxtr.xyz
offficebanking-cl.top
huslnfts.xyz
viralcx.com
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/948-140-0x0000000010410000-0x000000001043F000-memory.dmp formbook behavioral2/memory/4016-145-0x0000000010410000-0x000000001043F000-memory.dmp formbook behavioral2/memory/3092-151-0x0000000000800000-0x000000000082F000-memory.dmp formbook behavioral2/memory/3092-153-0x0000000000800000-0x000000000082F000-memory.dmp formbook -
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral2/memory/948-133-0x00000000023C0000-0x00000000023F1000-memory.dmp modiloader_stage2 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Foioxsua = "C:\\Users\\Public\\Libraries\\ausxoioF.url" d5b181be63ce08ec89eb7db52735a626.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4016 set thread context of 3144 4016 logagent.exe 55 PID 3092 set thread context of 3144 3092 cmstp.exe 55 -
Script User-Agent 3 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 24 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 20 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 21 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 54 IoCs
pid Process 4016 logagent.exe 4016 logagent.exe 4016 logagent.exe 4016 logagent.exe 3092 cmstp.exe 3092 cmstp.exe 3092 cmstp.exe 3092 cmstp.exe 3092 cmstp.exe 3092 cmstp.exe 3092 cmstp.exe 3092 cmstp.exe 3092 cmstp.exe 3092 cmstp.exe 3092 cmstp.exe 3092 cmstp.exe 3092 cmstp.exe 3092 cmstp.exe 3092 cmstp.exe 3092 cmstp.exe 3092 cmstp.exe 3092 cmstp.exe 3092 cmstp.exe 3092 cmstp.exe 3092 cmstp.exe 3092 cmstp.exe 3092 cmstp.exe 3092 cmstp.exe 3092 cmstp.exe 3092 cmstp.exe 3092 cmstp.exe 3092 cmstp.exe 3092 cmstp.exe 3092 cmstp.exe 3092 cmstp.exe 3092 cmstp.exe 3092 cmstp.exe 3092 cmstp.exe 3092 cmstp.exe 3092 cmstp.exe 3092 cmstp.exe 3092 cmstp.exe 3092 cmstp.exe 3092 cmstp.exe 3092 cmstp.exe 3092 cmstp.exe 3092 cmstp.exe 3092 cmstp.exe 3092 cmstp.exe 3092 cmstp.exe 3092 cmstp.exe 3092 cmstp.exe 3092 cmstp.exe 3092 cmstp.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3144 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 4016 logagent.exe 4016 logagent.exe 4016 logagent.exe 3092 cmstp.exe 3092 cmstp.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 4016 logagent.exe Token: SeDebugPrivilege 3092 cmstp.exe Token: SeShutdownPrivilege 3144 Explorer.EXE Token: SeCreatePagefilePrivilege 3144 Explorer.EXE Token: SeShutdownPrivilege 3144 Explorer.EXE Token: SeCreatePagefilePrivilege 3144 Explorer.EXE Token: SeShutdownPrivilege 3144 Explorer.EXE Token: SeCreatePagefilePrivilege 3144 Explorer.EXE Token: SeShutdownPrivilege 3144 Explorer.EXE Token: SeCreatePagefilePrivilege 3144 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 948 wrote to memory of 4016 948 d5b181be63ce08ec89eb7db52735a626.exe 90 PID 948 wrote to memory of 4016 948 d5b181be63ce08ec89eb7db52735a626.exe 90 PID 948 wrote to memory of 4016 948 d5b181be63ce08ec89eb7db52735a626.exe 90 PID 948 wrote to memory of 4016 948 d5b181be63ce08ec89eb7db52735a626.exe 90 PID 948 wrote to memory of 4016 948 d5b181be63ce08ec89eb7db52735a626.exe 90 PID 948 wrote to memory of 4016 948 d5b181be63ce08ec89eb7db52735a626.exe 90 PID 3144 wrote to memory of 3092 3144 Explorer.EXE 91 PID 3144 wrote to memory of 3092 3144 Explorer.EXE 91 PID 3144 wrote to memory of 3092 3144 Explorer.EXE 91 PID 3092 wrote to memory of 2012 3092 cmstp.exe 92 PID 3092 wrote to memory of 2012 3092 cmstp.exe 92 PID 3092 wrote to memory of 2012 3092 cmstp.exe 92
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Users\Admin\AppData\Local\Temp\d5b181be63ce08ec89eb7db52735a626.exe"C:\Users\Admin\AppData\Local\Temp\d5b181be63ce08ec89eb7db52735a626.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Windows\SysWOW64\logagent.exe"C:\Windows\System32\logagent.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4016
-
-
-
C:\Windows\SysWOW64\cmstp.exe"C:\Windows\SysWOW64\cmstp.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\logagent.exe"3⤵PID:2012
-
-