Analysis
-
max time kernel
117s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2023 10:30
Static task
static1
Behavioral task
behavioral1
Sample
Fpopgapwdcgvxn.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
Fpopgapwdcgvxn.exe
Resource
win10v2004-20231127-en
General
-
Target
Fpopgapwdcgvxn.exe
-
Size
2.3MB
-
MD5
072d323c28e7ba4d63eb7df9894f33c9
-
SHA1
cf6a2b1ba98bf303e93b4070919ec1cd30262377
-
SHA256
d164c7ce3856705552a7dcd91f577c12162d5eb522153e33e91f86536cac5fb2
-
SHA512
348e888f90e8582be54acc4c39d9531ec333a3f9deb5c7cc1c4d6dbf2cc094cbb744438d87d6d3a2357d2e2be7141412744287249b465eb39217a3f0cffb0a23
-
SSDEEP
49152:UkQzWGa8pH8yc0/wU2lpe63ZrxKrVEbRIqiPt415Fehg1mQ5C:UNqGa8pcyV/wjpdZrxEVEtI14xqn
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1712-2-0x0000000003130000-0x0000000004130000-memory.dmp modiloader_stage2 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Fpopgapwdcgvxn.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1067295379-1486014338-1703171060-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Telragab = "C:\\Users\\Public\\Telragab.url" Fpopgapwdcgvxn.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4364 1712 WerFault.exe Fpopgapwdcgvxn.exe -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 35 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 37 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
Fpopgapwdcgvxn.exepid process 1712 Fpopgapwdcgvxn.exe 1712 Fpopgapwdcgvxn.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
Fpopgapwdcgvxn.exedescription pid process target process PID 1712 wrote to memory of 3340 1712 Fpopgapwdcgvxn.exe colorcpl.exe PID 1712 wrote to memory of 3340 1712 Fpopgapwdcgvxn.exe colorcpl.exe PID 1712 wrote to memory of 3340 1712 Fpopgapwdcgvxn.exe colorcpl.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Fpopgapwdcgvxn.exe"C:\Users\Admin\AppData\Local\Temp\Fpopgapwdcgvxn.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\colorcpl.exeC:\Windows\System32\colorcpl.exe2⤵PID:3340
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1712 -s 18042⤵
- Program crash
PID:4364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1712 -ip 17121⤵PID:3540