Analysis
-
max time kernel
142s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
11-07-2023 12:10
Static task
static1
Behavioral task
behavioral1
Sample
cf239505512eadbb67efd822f3b684da.exe
Resource
win7-20230705-en
Behavioral task
behavioral2
Sample
cf239505512eadbb67efd822f3b684da.exe
Resource
win10v2004-20230703-en
General
-
Target
cf239505512eadbb67efd822f3b684da.exe
-
Size
1.1MB
-
MD5
cf239505512eadbb67efd822f3b684da
-
SHA1
3d661914d405692080aaf980c91b4a01a49f6304
-
SHA256
3df8c09e0234f26d46f193fe7f83f17ce5c0eb0d158a95904a8a07400728dd0a
-
SHA512
9daf2e52da964424bd35a0e66980b5f5ff4fa3e4cfd599d744e54afb08af9dd0084e4d406f90d25a7cfc94002997dc9484ebe7522505575934b4a6fef2ffc6c8
-
SSDEEP
12288:6jPvA1qLETL9Vu4StmmYLz11DFJ72LkzLS5T5ZG9yuT7CcnhlOd0QAl9ChIhJf/L:6jPvNLAgChLURZa3T7CcHTf+pbZpbaG
Malware Config
Extracted
formbook
4.1
t3c9
shadeshmarriagemedia.com
e-russ.com
sofiashome.com
theworriedwell.com
americantechfront.com
seasonssparkling.com
maximuscanada.net
tifin-private-markets.com
amecc2.net
xuexi22.icu
injectiontek.com
enrrocastoneimports.com
marvelouslightcandleco.com
eaamedia.com
pmediaerp.com
tikivips111.com
chesterfieldcleaningcare.com
thecrowdedtablemusic.com
duncanvillepanthers.com
floriculturajoinville.xyz
bestcleaningagent.com
blackpartyplanners.online
atlanticphotovideo.com
welfarewith.com
vsesvezhie.online
kingballyeg.com
onanshop.com
navarathnatemple.com
tajcostore.com
bittoastergames.com
brasswork.info
92luoli.top
neuroimagingai.com
travisheightspartners.com
securelifestyles21.net
toydrumhosting.com
a-2-zwholesale.com
mnehbr.cloud
hot51.one
3g10v4jwti2tur96.digital
barbosasilvaadv.com
addidas.me
onpu.sa.com
pienso-mascotas.com
brinkmicro.com
mari4731.com
redtocsin.com
tarponspringshandyman.com
shknote.com
jacksonholekush.com
thephilosophyacademy.com
gsolartech.com
oferstar.com
earlyrepeal.online
medi-vacations.net
bigredsellshomes.com
bonitageeks.icu
bossingh.xyz
shanghaizang.com
maisonlectio.com
monktech.xyz
hsmm999.com
bateful.com
billiondollar.company
millesimevintage.com
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Formbook payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4380-142-0x0000000005230000-0x000000000525F000-memory.dmp formbook -
ModiLoader Second Stage 26 IoCs
Processes:
resource yara_rule behavioral2/memory/4380-135-0x0000000002930000-0x0000000002960000-memory.dmp modiloader_stage2 behavioral2/memory/4380-143-0x0000000002930000-0x0000000002960000-memory.dmp modiloader_stage2 behavioral2/memory/4380-144-0x0000000002930000-0x0000000002960000-memory.dmp modiloader_stage2 behavioral2/memory/4380-145-0x0000000002930000-0x0000000002960000-memory.dmp modiloader_stage2 behavioral2/memory/4380-147-0x0000000002930000-0x0000000002960000-memory.dmp modiloader_stage2 behavioral2/memory/4380-148-0x0000000002930000-0x0000000002960000-memory.dmp modiloader_stage2 behavioral2/memory/4380-149-0x0000000002930000-0x0000000002960000-memory.dmp modiloader_stage2 behavioral2/memory/4380-146-0x0000000002930000-0x0000000002960000-memory.dmp modiloader_stage2 behavioral2/memory/4380-150-0x0000000002930000-0x0000000002960000-memory.dmp modiloader_stage2 behavioral2/memory/4380-151-0x0000000002930000-0x0000000002960000-memory.dmp modiloader_stage2 behavioral2/memory/4380-152-0x0000000002930000-0x0000000002960000-memory.dmp modiloader_stage2 behavioral2/memory/4380-154-0x0000000002930000-0x0000000002960000-memory.dmp modiloader_stage2 behavioral2/memory/4380-155-0x0000000002930000-0x0000000002960000-memory.dmp modiloader_stage2 behavioral2/memory/4380-156-0x0000000002930000-0x0000000002960000-memory.dmp modiloader_stage2 behavioral2/memory/4380-153-0x0000000002930000-0x0000000002960000-memory.dmp modiloader_stage2 behavioral2/memory/4380-157-0x0000000002930000-0x0000000002960000-memory.dmp modiloader_stage2 behavioral2/memory/4380-158-0x0000000002930000-0x0000000002960000-memory.dmp modiloader_stage2 behavioral2/memory/4380-159-0x0000000002930000-0x0000000002960000-memory.dmp modiloader_stage2 behavioral2/memory/4380-160-0x0000000002930000-0x0000000002960000-memory.dmp modiloader_stage2 behavioral2/memory/4380-161-0x0000000002930000-0x0000000002960000-memory.dmp modiloader_stage2 behavioral2/memory/4380-162-0x0000000002930000-0x0000000002960000-memory.dmp modiloader_stage2 behavioral2/memory/4380-163-0x0000000002930000-0x0000000002960000-memory.dmp modiloader_stage2 behavioral2/memory/4380-164-0x0000000002930000-0x0000000002960000-memory.dmp modiloader_stage2 behavioral2/memory/4380-167-0x0000000002930000-0x0000000002960000-memory.dmp modiloader_stage2 behavioral2/memory/4380-168-0x0000000002930000-0x0000000002960000-memory.dmp modiloader_stage2 behavioral2/memory/4380-165-0x0000000002930000-0x0000000002960000-memory.dmp modiloader_stage2 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
cf239505512eadbb67efd822f3b684da.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Yltmelth = "C:\\Users\\Public\\Yltmelth.url" cf239505512eadbb67efd822f3b684da.exe -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 32 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 34 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
cf239505512eadbb67efd822f3b684da.exepid process 4380 cf239505512eadbb67efd822f3b684da.exe 4380 cf239505512eadbb67efd822f3b684da.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4380-133-0x0000000002720000-0x0000000002721000-memory.dmpFilesize
4KB
-
memory/4380-135-0x0000000002930000-0x0000000002960000-memory.dmpFilesize
192KB
-
memory/4380-137-0x0000000000400000-0x0000000000521000-memory.dmpFilesize
1.1MB
-
memory/4380-138-0x0000000002720000-0x0000000002721000-memory.dmpFilesize
4KB
-
memory/4380-142-0x0000000005230000-0x000000000525F000-memory.dmpFilesize
188KB
-
memory/4380-143-0x0000000002930000-0x0000000002960000-memory.dmpFilesize
192KB
-
memory/4380-144-0x0000000002930000-0x0000000002960000-memory.dmpFilesize
192KB
-
memory/4380-145-0x0000000002930000-0x0000000002960000-memory.dmpFilesize
192KB
-
memory/4380-147-0x0000000002930000-0x0000000002960000-memory.dmpFilesize
192KB
-
memory/4380-148-0x0000000002930000-0x0000000002960000-memory.dmpFilesize
192KB
-
memory/4380-149-0x0000000002930000-0x0000000002960000-memory.dmpFilesize
192KB
-
memory/4380-146-0x0000000002930000-0x0000000002960000-memory.dmpFilesize
192KB
-
memory/4380-150-0x0000000002930000-0x0000000002960000-memory.dmpFilesize
192KB
-
memory/4380-151-0x0000000002930000-0x0000000002960000-memory.dmpFilesize
192KB
-
memory/4380-152-0x0000000002930000-0x0000000002960000-memory.dmpFilesize
192KB
-
memory/4380-154-0x0000000002930000-0x0000000002960000-memory.dmpFilesize
192KB
-
memory/4380-155-0x0000000002930000-0x0000000002960000-memory.dmpFilesize
192KB
-
memory/4380-156-0x0000000002930000-0x0000000002960000-memory.dmpFilesize
192KB
-
memory/4380-153-0x0000000002930000-0x0000000002960000-memory.dmpFilesize
192KB
-
memory/4380-157-0x0000000002930000-0x0000000002960000-memory.dmpFilesize
192KB
-
memory/4380-158-0x0000000002930000-0x0000000002960000-memory.dmpFilesize
192KB
-
memory/4380-159-0x0000000002930000-0x0000000002960000-memory.dmpFilesize
192KB
-
memory/4380-160-0x0000000002930000-0x0000000002960000-memory.dmpFilesize
192KB
-
memory/4380-161-0x0000000002930000-0x0000000002960000-memory.dmpFilesize
192KB
-
memory/4380-162-0x0000000002930000-0x0000000002960000-memory.dmpFilesize
192KB
-
memory/4380-163-0x0000000002930000-0x0000000002960000-memory.dmpFilesize
192KB
-
memory/4380-164-0x0000000002930000-0x0000000002960000-memory.dmpFilesize
192KB
-
memory/4380-166-0x0000000005900000-0x0000000005C4A000-memory.dmpFilesize
3.3MB
-
memory/4380-167-0x0000000002930000-0x0000000002960000-memory.dmpFilesize
192KB
-
memory/4380-168-0x0000000002930000-0x0000000002960000-memory.dmpFilesize
192KB
-
memory/4380-165-0x0000000002930000-0x0000000002960000-memory.dmpFilesize
192KB