Analysis
-
max time kernel
213s -
max time network
228s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 08:29
Static task
static1
Behavioral task
behavioral1
Sample
proformaXfaturaXpdf.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
proformaXfaturaXpdf.exe
Resource
win10v2004-20230915-en
General
-
Target
proformaXfaturaXpdf.exe
-
Size
1.2MB
-
MD5
703eeb530cbd41d86e20113624a18bd7
-
SHA1
997930463f0362f53c5f9ee26afed94eff148505
-
SHA256
90f18e453ea2b0c1fa4d84d95499ab3bfd11db81a54caa2702cd3749f62c9dec
-
SHA512
89c1361a73c963985db922ec7d72e670f42eb09a2deba287ad535b93ce5e1c30aab53ea1a4e0395346b5647f060ec6f56650cb302d5a5db54d1e5fdd7a314e49
-
SSDEEP
24576:iFoEhCKAXS/1+O9P1Bza+78soKoxm5OST6Iytld3BIwbgKcQrE/k2+RVN:iF9ii/1+O9P1BB8soKXx7ytldxzV
Malware Config
Extracted
formbook
4.1
msev
brasforeyes.com
416js7.shop
hydratran.com
pro100.one
discuntasp.net
gxinee.com
sknwalker.com
finlandphotohides.com
helps.fyi
ingeciber-mailings.com
afswork.com
versebuild.xyz
supalupa.store
wagonlinework.com
wutaokyc.com
firecomponents.com
karaokezip.com
visoul.net
az-pinapcenter.click
nameswiki.com
truckdrivingjobsusa.today
toniquewinebangalore.com
chieftech.top
jphoo.net
botradio.online
fh5246.com
fisiosansimon.com
aovq.net
teamsoluciones.net
therealofar.xyz
thebrandingmasters.com
hediyelik34.site
1newkt.com
exploregenai.com
theleadpinintake.com
yoflnbggawn.cloud
honestonyx.com
customclearpockets.com
bandit188journey.ltd
themlc.net
iscriptics.com
alpha1removals.com
sdesqmoiqz.com
dreamrealestates.com
investingsensibly.com
mrakopedia.com
x4s9d.fun
hillshealthhouse.com
auction.yoga
risepm.space
jhzstore.online
azoresrentalhome.com
dissuaded.store
shedurrway.com
realityescaped.com
asiongjogja.net
050t966.com
elmared.net
xkmoirpxhpkamoo.top
jalebijunctionrestaurant.com
vsempodpiska.online
your-insurance.bond
madou.gay
colfaxtrailernc.com
clevelandheightsstorage.com
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/3044-17-0x0000000002530000-0x0000000003530000-memory.dmp formbook behavioral2/memory/3044-20-0x0000000002530000-0x0000000003530000-memory.dmp formbook behavioral2/memory/1676-29-0x0000000001210000-0x000000000123F000-memory.dmp formbook behavioral2/memory/1676-33-0x0000000001210000-0x000000000123F000-memory.dmp formbook -
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral2/memory/1636-2-0x0000000002970000-0x0000000003970000-memory.dmp modiloader_stage2 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Nysswthm = "C:\\Users\\Public\\Nysswthm.url" proformaXfaturaXpdf.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3044 set thread context of 2548 3044 colorcpl.exe 53 PID 1676 set thread context of 2548 1676 cmd.exe 53 -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 51 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 55 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1636 proformaXfaturaXpdf.exe 1636 proformaXfaturaXpdf.exe 3044 colorcpl.exe 3044 colorcpl.exe 3044 colorcpl.exe 3044 colorcpl.exe 1676 cmd.exe 1676 cmd.exe 1676 cmd.exe 1676 cmd.exe 1676 cmd.exe 1676 cmd.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 3044 colorcpl.exe 3044 colorcpl.exe 3044 colorcpl.exe 1676 cmd.exe 1676 cmd.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 3044 colorcpl.exe Token: SeShutdownPrivilege 2548 Explorer.EXE Token: SeCreatePagefilePrivilege 2548 Explorer.EXE Token: SeShutdownPrivilege 2548 Explorer.EXE Token: SeCreatePagefilePrivilege 2548 Explorer.EXE Token: SeDebugPrivilege 1676 cmd.exe Token: SeShutdownPrivilege 2548 Explorer.EXE Token: SeCreatePagefilePrivilege 2548 Explorer.EXE Token: SeShutdownPrivilege 2548 Explorer.EXE Token: SeCreatePagefilePrivilege 2548 Explorer.EXE -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1636 wrote to memory of 3044 1636 proformaXfaturaXpdf.exe 92 PID 1636 wrote to memory of 3044 1636 proformaXfaturaXpdf.exe 92 PID 1636 wrote to memory of 3044 1636 proformaXfaturaXpdf.exe 92 PID 1636 wrote to memory of 3044 1636 proformaXfaturaXpdf.exe 92 PID 2548 wrote to memory of 1676 2548 Explorer.EXE 98 PID 2548 wrote to memory of 1676 2548 Explorer.EXE 98 PID 2548 wrote to memory of 1676 2548 Explorer.EXE 98 PID 1676 wrote to memory of 2984 1676 cmd.exe 99 PID 1676 wrote to memory of 2984 1676 cmd.exe 99 PID 1676 wrote to memory of 2984 1676 cmd.exe 99
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\proformaXfaturaXpdf.exe"C:\Users\Admin\AppData\Local\Temp\proformaXfaturaXpdf.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\SysWOW64\colorcpl.exeC:\Windows\System32\colorcpl.exe3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3044
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\colorcpl.exe"3⤵PID:2984
-
-