Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2023 12:53
Static task
static1
Behavioral task
behavioral1
Sample
nfattura scaduta Pdf.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
nfattura scaduta Pdf.exe
Resource
win10v2004-20230703-en
General
-
Target
nfattura scaduta Pdf.exe
-
Size
1.5MB
-
MD5
0d4b25a33c69e4443f28a43ae3b015c9
-
SHA1
92267c25dc62805bdfff9497174bf91feec90f2c
-
SHA256
869eb1b44b9d5e0ee5b99b1189edd21d706c58094387ba32ebf2aa45703a9c9b
-
SHA512
f628aaa5e739534b6e7833f44ca96e3a83dc83aac026b0f75c3919e937ed468d18764f1b2347995822e98d3eb6c6797524c0c28d4c6371f3a9c57dab0eac9e1f
-
SSDEEP
24576:rbGHGrOrQ9gnMC6LO3cQoikKgti8PM2MCUrTDLwVIf2IOXkDtZ3NptsNbJZ:rbGWAJeDingti8P+TwSNO0n9vwbJZ
Malware Config
Extracted
formbook
4.1
ges9
lolofestival.store
amzin.info
pulsahokii.xyz
bahiszirve.com
animekoe.com
kansastaxaccountant.net
howgoodisgod.online
medakaravan.xyz
pesmagazine.net
americanpopulist.info
nepalihandicraft.com
mariabakermodeling.com
cavify.top
onlinewoonboulevard.com
furniture-22830.com
ophthalmicpersonneltraining.us
yz1204.com
extrawhite.site
tomo.store
martfind.online
united-bc.com
hethonglikesub.site
goldenstategeneralstore.com
amazdea.com
emiliahernandez.com
weeklyrhino.buzz
erjcbtwg.work
16321.xyz
crainbramp.games
studiochiodi.info
km97.xyz
synertel.site
ankerbios.expert
chipetaresort.com
gakuj.xyz
simmonsguitars.com
povsearcher.com
salesatomizer.app
loopmart.shop
easyonionringrecipe.site
icss.studio
ksamayaiu.xyz
xn--recomindame-gbb.com
bepillow.com
homesinowensboro.com
abrashina.com
dplck.com
michellentherapy.com
voyance.health
zwcl365.com
akroglobal.com
endlessillumination.store
florediemgardens.com
lis-journal.com
justinrichert.net
baschung.swiss
thesexyviking.com
abickofconsulting.com
vivacious713833.com
dental-implants-52958.com
tigaberlian.net
trxtr.xyz
offficebanking-cl.top
huslnfts.xyz
viralcx.com
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Suspicious use of NtCreateProcessOtherParentProcess 1 IoCs
Processes:
nfattura scaduta Pdf.exedescription pid process PID 4928 created 0 4928 nfattura scaduta Pdf.exe -
Formbook payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/4264-414-0x0000000001310000-0x000000000133F000-memory.dmp formbook behavioral2/memory/4264-432-0x0000000001310000-0x000000000133F000-memory.dmp formbook behavioral2/memory/4732-489-0x0000000000A60000-0x0000000000A8F000-memory.dmp formbook behavioral2/memory/4732-495-0x0000000000A60000-0x0000000000A8F000-memory.dmp formbook -
ModiLoader Second Stage 62 IoCs
Processes:
resource yara_rule behavioral2/memory/4928-211-0x0000000002470000-0x00000000024A1000-memory.dmp modiloader_stage2 behavioral2/memory/4928-255-0x0000000002470000-0x00000000024A1000-memory.dmp modiloader_stage2 behavioral2/memory/4928-256-0x0000000002470000-0x00000000024A1000-memory.dmp modiloader_stage2 behavioral2/memory/4928-257-0x0000000002470000-0x00000000024A1000-memory.dmp modiloader_stage2 behavioral2/memory/4928-258-0x0000000002470000-0x00000000024A1000-memory.dmp modiloader_stage2 behavioral2/memory/4928-259-0x0000000002470000-0x00000000024A1000-memory.dmp modiloader_stage2 behavioral2/memory/4928-260-0x0000000002470000-0x00000000024A1000-memory.dmp modiloader_stage2 behavioral2/memory/4928-261-0x0000000002470000-0x00000000024A1000-memory.dmp modiloader_stage2 behavioral2/memory/4928-262-0x0000000002470000-0x00000000024A1000-memory.dmp modiloader_stage2 behavioral2/memory/4928-263-0x0000000002470000-0x00000000024A1000-memory.dmp modiloader_stage2 behavioral2/memory/4928-264-0x0000000002470000-0x00000000024A1000-memory.dmp modiloader_stage2 behavioral2/memory/4928-265-0x0000000002470000-0x00000000024A1000-memory.dmp modiloader_stage2 behavioral2/memory/4928-266-0x0000000002470000-0x00000000024A1000-memory.dmp modiloader_stage2 behavioral2/memory/4928-267-0x0000000002470000-0x00000000024A1000-memory.dmp modiloader_stage2 behavioral2/memory/4928-268-0x0000000002470000-0x00000000024A1000-memory.dmp modiloader_stage2 behavioral2/memory/4928-269-0x0000000002470000-0x00000000024A1000-memory.dmp modiloader_stage2 behavioral2/memory/4928-270-0x0000000002470000-0x00000000024A1000-memory.dmp modiloader_stage2 behavioral2/memory/4928-271-0x0000000002470000-0x00000000024A1000-memory.dmp modiloader_stage2 behavioral2/memory/4928-272-0x0000000002470000-0x00000000024A1000-memory.dmp modiloader_stage2 behavioral2/memory/4928-273-0x0000000002470000-0x00000000024A1000-memory.dmp modiloader_stage2 behavioral2/memory/4928-274-0x0000000002470000-0x00000000024A1000-memory.dmp modiloader_stage2 behavioral2/memory/4928-275-0x0000000002470000-0x00000000024A1000-memory.dmp modiloader_stage2 behavioral2/memory/4928-276-0x0000000002470000-0x00000000024A1000-memory.dmp modiloader_stage2 behavioral2/memory/4928-277-0x0000000002470000-0x00000000024A1000-memory.dmp modiloader_stage2 behavioral2/memory/4928-278-0x0000000002470000-0x00000000024A1000-memory.dmp modiloader_stage2 behavioral2/memory/4928-279-0x0000000002470000-0x00000000024A1000-memory.dmp modiloader_stage2 behavioral2/memory/4928-280-0x0000000002470000-0x00000000024A1000-memory.dmp modiloader_stage2 behavioral2/memory/4928-281-0x0000000002470000-0x00000000024A1000-memory.dmp modiloader_stage2 behavioral2/memory/4928-282-0x0000000002470000-0x00000000024A1000-memory.dmp modiloader_stage2 behavioral2/memory/4928-283-0x0000000002470000-0x00000000024A1000-memory.dmp modiloader_stage2 behavioral2/memory/4928-284-0x0000000002470000-0x00000000024A1000-memory.dmp modiloader_stage2 behavioral2/memory/4928-285-0x0000000002470000-0x00000000024A1000-memory.dmp modiloader_stage2 behavioral2/memory/4928-286-0x0000000002470000-0x00000000024A1000-memory.dmp modiloader_stage2 behavioral2/memory/4928-287-0x0000000002470000-0x00000000024A1000-memory.dmp modiloader_stage2 behavioral2/memory/4928-288-0x0000000002470000-0x00000000024A1000-memory.dmp modiloader_stage2 behavioral2/memory/4928-289-0x0000000002470000-0x00000000024A1000-memory.dmp modiloader_stage2 behavioral2/memory/4928-290-0x0000000002470000-0x00000000024A1000-memory.dmp modiloader_stage2 behavioral2/memory/4928-291-0x0000000002470000-0x00000000024A1000-memory.dmp modiloader_stage2 behavioral2/memory/4928-292-0x0000000002470000-0x00000000024A1000-memory.dmp modiloader_stage2 behavioral2/memory/4928-293-0x0000000002470000-0x00000000024A1000-memory.dmp modiloader_stage2 behavioral2/memory/4928-294-0x0000000002470000-0x00000000024A1000-memory.dmp modiloader_stage2 behavioral2/memory/4928-295-0x0000000002470000-0x00000000024A1000-memory.dmp modiloader_stage2 behavioral2/memory/4928-296-0x0000000002470000-0x00000000024A1000-memory.dmp modiloader_stage2 behavioral2/memory/4928-297-0x0000000002470000-0x00000000024A1000-memory.dmp modiloader_stage2 behavioral2/memory/4928-298-0x0000000002470000-0x00000000024A1000-memory.dmp modiloader_stage2 behavioral2/memory/4928-299-0x0000000002470000-0x00000000024A1000-memory.dmp modiloader_stage2 behavioral2/memory/4928-300-0x0000000002470000-0x00000000024A1000-memory.dmp modiloader_stage2 behavioral2/memory/4928-301-0x0000000002470000-0x00000000024A1000-memory.dmp modiloader_stage2 behavioral2/memory/4928-302-0x0000000002470000-0x00000000024A1000-memory.dmp modiloader_stage2 behavioral2/memory/4928-303-0x0000000002470000-0x00000000024A1000-memory.dmp modiloader_stage2 behavioral2/memory/4928-304-0x0000000002470000-0x00000000024A1000-memory.dmp modiloader_stage2 behavioral2/memory/4928-305-0x0000000002470000-0x00000000024A1000-memory.dmp modiloader_stage2 behavioral2/memory/4928-306-0x0000000002470000-0x00000000024A1000-memory.dmp modiloader_stage2 behavioral2/memory/4928-307-0x0000000002470000-0x00000000024A1000-memory.dmp modiloader_stage2 behavioral2/memory/4928-308-0x0000000002470000-0x00000000024A1000-memory.dmp modiloader_stage2 behavioral2/memory/4928-309-0x0000000002470000-0x00000000024A1000-memory.dmp modiloader_stage2 behavioral2/memory/4928-310-0x0000000002470000-0x00000000024A1000-memory.dmp modiloader_stage2 behavioral2/memory/4928-311-0x0000000002470000-0x00000000024A1000-memory.dmp modiloader_stage2 behavioral2/memory/4928-312-0x0000000002470000-0x00000000024A1000-memory.dmp modiloader_stage2 behavioral2/memory/4928-313-0x0000000002470000-0x00000000024A1000-memory.dmp modiloader_stage2 behavioral2/memory/4928-314-0x0000000002470000-0x00000000024A1000-memory.dmp modiloader_stage2 behavioral2/memory/4928-315-0x0000000002470000-0x00000000024A1000-memory.dmp modiloader_stage2 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
nfattura scaduta Pdf.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Vewxaunn = "C:\\Users\\Public\\Vewxaunn.url" nfattura scaduta Pdf.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
logagent.exemstsc.exedescription pid process target process PID 4264 set thread context of 3188 4264 logagent.exe Explorer.EXE PID 4732 set thread context of 3188 4732 mstsc.exe Explorer.EXE -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 26 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 29 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 58 IoCs
Processes:
nfattura scaduta Pdf.exelogagent.exemstsc.exepid process 4928 nfattura scaduta Pdf.exe 4928 nfattura scaduta Pdf.exe 4264 logagent.exe 4264 logagent.exe 4264 logagent.exe 4264 logagent.exe 4732 mstsc.exe 4732 mstsc.exe 4732 mstsc.exe 4732 mstsc.exe 4732 mstsc.exe 4732 mstsc.exe 4732 mstsc.exe 4732 mstsc.exe 4732 mstsc.exe 4732 mstsc.exe 4732 mstsc.exe 4732 mstsc.exe 4732 mstsc.exe 4732 mstsc.exe 4732 mstsc.exe 4732 mstsc.exe 4732 mstsc.exe 4732 mstsc.exe 4732 mstsc.exe 4732 mstsc.exe 4732 mstsc.exe 4732 mstsc.exe 4732 mstsc.exe 4732 mstsc.exe 4732 mstsc.exe 4732 mstsc.exe 4732 mstsc.exe 4732 mstsc.exe 4732 mstsc.exe 4732 mstsc.exe 4732 mstsc.exe 4732 mstsc.exe 4732 mstsc.exe 4732 mstsc.exe 4732 mstsc.exe 4732 mstsc.exe 4732 mstsc.exe 4732 mstsc.exe 4732 mstsc.exe 4732 mstsc.exe 4732 mstsc.exe 4732 mstsc.exe 4732 mstsc.exe 4732 mstsc.exe 4732 mstsc.exe 4732 mstsc.exe 4732 mstsc.exe 4732 mstsc.exe 4732 mstsc.exe 4732 mstsc.exe 4732 mstsc.exe 4732 mstsc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3188 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
logagent.exemstsc.exepid process 4264 logagent.exe 4264 logagent.exe 4264 logagent.exe 4732 mstsc.exe 4732 mstsc.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
logagent.exeExplorer.EXEmstsc.exedescription pid process Token: SeDebugPrivilege 4264 logagent.exe Token: SeShutdownPrivilege 3188 Explorer.EXE Token: SeCreatePagefilePrivilege 3188 Explorer.EXE Token: SeDebugPrivilege 4732 mstsc.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
nfattura scaduta Pdf.exeExplorer.EXEmstsc.exedescription pid process target process PID 4928 wrote to memory of 4264 4928 nfattura scaduta Pdf.exe logagent.exe PID 4928 wrote to memory of 4264 4928 nfattura scaduta Pdf.exe logagent.exe PID 4928 wrote to memory of 4264 4928 nfattura scaduta Pdf.exe logagent.exe PID 4928 wrote to memory of 4264 4928 nfattura scaduta Pdf.exe logagent.exe PID 3188 wrote to memory of 4732 3188 Explorer.EXE mstsc.exe PID 3188 wrote to memory of 4732 3188 Explorer.EXE mstsc.exe PID 3188 wrote to memory of 4732 3188 Explorer.EXE mstsc.exe PID 4732 wrote to memory of 1184 4732 mstsc.exe cmd.exe PID 4732 wrote to memory of 1184 4732 mstsc.exe cmd.exe PID 4732 wrote to memory of 1184 4732 mstsc.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Users\Admin\AppData\Local\Temp\nfattura scaduta Pdf.exe"C:\Users\Admin\AppData\Local\Temp\nfattura scaduta Pdf.exe"2⤵
- Suspicious use of NtCreateProcessOtherParentProcess
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Windows\SysWOW64\logagent.exeC:\Windows\System32\logagent.exe3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4264
-
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2284
-
-
C:\Windows\SysWOW64\mstsc.exe"C:\Windows\SysWOW64\mstsc.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\logagent.exe"3⤵PID:1184
-
-