Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
04/07/2023, 12:16
Static task
static1
Behavioral task
behavioral1
Sample
2b05890fb7420b28f7bf26724.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
2b05890fb7420b28f7bf26724.exe
Resource
win10v2004-20230703-en
General
-
Target
2b05890fb7420b28f7bf26724.exe
-
Size
762KB
-
MD5
177ed09e1d8216f87a593057ec413a52
-
SHA1
1cec954b01bcd3fc8e9e35f0d07dc49c1fcb9853
-
SHA256
2b05890fb7420b28f7bf26724e58d2ae4a09c9cd9b1020d2bbe42d03ac4b35f8
-
SHA512
44f92f848c1eae04cc0dfe2452a5dadd6293cfde9b8c742c612c839f4970e1b463bb27549ce6ccc32341aa9ef093861c0b39b0bb25c7d07e54bd3206058e950e
-
SSDEEP
12288:VPRdmMlUOv2nhg+kX0WmSJXkP4x5MlnXkr:VJddU7nS+FJSiPGMlnXk
Malware Config
Extracted
formbook
nvp4
EiywrQNofDNveWY1IESoBA==
yqEWFGRfErX7ICQCwyQ+YeLXtaA=
Ers0rc50nbjso0jbdZTmBw==
XQxVP45+F5OZn3ZBTC7MLe1OF3G5c5uK9A==
RHh4uwtsttjzlxy+eW3+
W+xQshfnvmF5n5x2d+cEVdBNIkQRHRE=
FwlyiuXNX0+Trw==
euLn91on/7DeDe++zbQ4YeLXtaA=
td4cO8m3HDRWtl8p7Q==
ZrlyAAPqc3GXI5k=
OM0IisKOI78FJC/IuIxxAu5nRg==
d6A0QJ6PV+AOpyK+eW3+
+EgxFWUu3Ulatl8p7Q==
GC/stck1ILXn+cWZx7w8W6rPFmO6c5uK9A==
hhIiK4+CKEOfB4tr
mA1pyQ85ye8N
4xgWYcEpEoidv8eXKNncAQ==
L+hOVbe+IWyc8oVUclc=
J7EGaJ+L+wKLXUYg7w==
L5R/nfdgQdMHD+TUKw1Zo3Hb
E4z2kWG/vE6yt5E=
+efGEVp82EycSL2U4cpFU2an/aM5SDuF
6zA2kAqIdAQKkve6y7RjtRBf+i8Nvw==
VRqXzvXLVF+hS9arybBihGeOTaKP
PgKByBDCpL4cd9+yO52n/xZmQZeF
pMit5lre4GVyi3xcfywQY58=
F/vD9x4Oz0RWtl8p7Q==
hvZhvTgp/H7Lm2RNdl0=
h/xWhNLDOEpSZUTmIguoBA==
o8qw6kCdiDV4kn1FMZ6et06V+dCQZEmG
bgMOGYox8vMQ
YmFKj+ZWVRBcep49cl0=
Wox2hOnIRnGp3s2RMZ9Zo3Hb
eeTk5zCrpCpSyntTeF0=
FOA7J3NsxuomwEARYVLNU1TR
yuLXKrWb72SKrA==
K6T6LoiKKwZrHY5i
B8UkEkol7nBvrLeOjSwQY58=
GwvWc8gVAk6yt5E=
4IboPYD24Hqi5mxf+g==
L4XQI2A00QtXxxi+eW3+
doMqp/ZMkE6yt5E=
1ebXKoTs0GSYqMZZc1U=
CYnoUKIiG5vI4/HHLNXpCw==
P/FwuirU0FeJxseeKNncAQ==
N21GaMlCYhFbtl8p7Q==
KY95j+NDjk6yt5E=
C/rJL7ACO0yfB4tr
z6QDKYo85+nxAx+zmTgBLYY=
IPBjddXCgzlvd2Y/C3KaMomhUQ==
KNsyKXJjN+wYPi8OLgNZo3Hb
kht0meHAHPpzqQ==
Rm5BMnxa1/s/yxq2wSJcfpc=
+Tn9l2Ax8vMQ
rwkQV4ruG7v1/s+ZKNncAQ==
7+RhcuhVYBpggr5YZUw=
YRaX4klS4xWfB4tr
YIZ5wgZjYOsslloz9A==
+SAdmP/smDZ6oKF4GxNZo3Hb
mSIWBEa/uz9JSodz
PGc0UrsbRk1LwHVWOp+9CQ==
DnJQctQ5jE6yt5E=
gYmlw+nLOxtYl4k=
eRJtqhQDH3KQsg==
brainbookgroup.com
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral2/memory/2928-135-0x00000000023A0000-0x00000000023D1000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\Control Panel\International\Geo\Nation 2b05890fb7420b28f7bf26724.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Qekkvthl = "C:\\Users\\Public\\Qekkvthl.url" 2b05890fb7420b28f7bf26724.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2928 set thread context of 788 2928 2b05890fb7420b28f7bf26724.exe 28 PID 2064 set thread context of 788 2064 WWAHost.exe 28 -
description ioc Process Key created \Registry\User\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 WWAHost.exe -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 2 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 4 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 58 IoCs
pid Process 2928 2b05890fb7420b28f7bf26724.exe 2928 2b05890fb7420b28f7bf26724.exe 2928 2b05890fb7420b28f7bf26724.exe 2928 2b05890fb7420b28f7bf26724.exe 2928 2b05890fb7420b28f7bf26724.exe 2928 2b05890fb7420b28f7bf26724.exe 2928 2b05890fb7420b28f7bf26724.exe 2928 2b05890fb7420b28f7bf26724.exe 2064 WWAHost.exe 2064 WWAHost.exe 2064 WWAHost.exe 2064 WWAHost.exe 2064 WWAHost.exe 2064 WWAHost.exe 2064 WWAHost.exe 2064 WWAHost.exe 2064 WWAHost.exe 2064 WWAHost.exe 2064 WWAHost.exe 2064 WWAHost.exe 2064 WWAHost.exe 2064 WWAHost.exe 2064 WWAHost.exe 2064 WWAHost.exe 2064 WWAHost.exe 2064 WWAHost.exe 2064 WWAHost.exe 2064 WWAHost.exe 2064 WWAHost.exe 2064 WWAHost.exe 2064 WWAHost.exe 2064 WWAHost.exe 2064 WWAHost.exe 2064 WWAHost.exe 2064 WWAHost.exe 2064 WWAHost.exe 2064 WWAHost.exe 2064 WWAHost.exe 2064 WWAHost.exe 2064 WWAHost.exe 2064 WWAHost.exe 2064 WWAHost.exe 2064 WWAHost.exe 2064 WWAHost.exe 2064 WWAHost.exe 2064 WWAHost.exe 2064 WWAHost.exe 2064 WWAHost.exe 2064 WWAHost.exe 2064 WWAHost.exe 2064 WWAHost.exe 2064 WWAHost.exe 2064 WWAHost.exe 2064 WWAHost.exe 2064 WWAHost.exe 2064 WWAHost.exe 2064 WWAHost.exe 2064 WWAHost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 788 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 2928 2b05890fb7420b28f7bf26724.exe 2928 2b05890fb7420b28f7bf26724.exe 2928 2b05890fb7420b28f7bf26724.exe 2064 WWAHost.exe 2064 WWAHost.exe 2064 WWAHost.exe 2064 WWAHost.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 2928 2b05890fb7420b28f7bf26724.exe Token: SeShutdownPrivilege 788 Explorer.EXE Token: SeCreatePagefilePrivilege 788 Explorer.EXE Token: SeDebugPrivilege 2064 WWAHost.exe Token: SeShutdownPrivilege 788 Explorer.EXE Token: SeCreatePagefilePrivilege 788 Explorer.EXE Token: SeShutdownPrivilege 788 Explorer.EXE Token: SeCreatePagefilePrivilege 788 Explorer.EXE Token: SeShutdownPrivilege 788 Explorer.EXE Token: SeCreatePagefilePrivilege 788 Explorer.EXE Token: SeShutdownPrivilege 788 Explorer.EXE Token: SeCreatePagefilePrivilege 788 Explorer.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 788 wrote to memory of 2064 788 Explorer.EXE 79 PID 788 wrote to memory of 2064 788 Explorer.EXE 79 PID 788 wrote to memory of 2064 788 Explorer.EXE 79 PID 2064 wrote to memory of 2852 2064 WWAHost.exe 80 PID 2064 wrote to memory of 2852 2064 WWAHost.exe 80 PID 2064 wrote to memory of 2852 2064 WWAHost.exe 80
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Users\Admin\AppData\Local\Temp\2b05890fb7420b28f7bf26724.exe"C:\Users\Admin\AppData\Local\Temp\2b05890fb7420b28f7bf26724.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2928
-
-
C:\Windows\SysWOW64\WWAHost.exe"C:\Windows\SysWOW64\WWAHost.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:2852
-
-