Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2023 19:13
Static task
static1
Behavioral task
behavioral1
Sample
d164c7ce3856705552a7dcd91f577c12162d5eb522153e33e91f86536cac5fb2.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
d164c7ce3856705552a7dcd91f577c12162d5eb522153e33e91f86536cac5fb2.exe
Resource
win10v2004-20231127-en
General
-
Target
d164c7ce3856705552a7dcd91f577c12162d5eb522153e33e91f86536cac5fb2.exe
-
Size
2.3MB
-
MD5
072d323c28e7ba4d63eb7df9894f33c9
-
SHA1
cf6a2b1ba98bf303e93b4070919ec1cd30262377
-
SHA256
d164c7ce3856705552a7dcd91f577c12162d5eb522153e33e91f86536cac5fb2
-
SHA512
348e888f90e8582be54acc4c39d9531ec333a3f9deb5c7cc1c4d6dbf2cc094cbb744438d87d6d3a2357d2e2be7141412744287249b465eb39217a3f0cffb0a23
-
SSDEEP
49152:UkQzWGa8pH8yc0/wU2lpe63ZrxKrVEbRIqiPt415Fehg1mQ5C:UNqGa8pcyV/wjpdZrxEVEtI14xqn
Malware Config
Extracted
formbook
4.1
ao65
spins2023.pro
foodontario.com
jsnmz.com
canwealljustagree.com
shopthedivine.store
thelakahealth.com
kuis-raja-borong.website
hbqc2.com
optimusvisionlb.com
urdulatest.com
akhayarplus.com
info-antai-service.com
kermisbedrijfkramer.online
epansion.com
gxqingmeng.top
maltsky.net
ictwath.com
sharmafootcare.com
mycheese.net
portfoliotestkitchen.com
gwhi13.cfd
fuzzybraintrivia.com
thnkotb.com
merchdojacat.com
1techtrendzstore.com
cnkclaw.net
xsslm888.com
musecheng.net
flowandfield.online
somdevista.com
baissm.top
xn--88-uqi1dtk.com
cewra.com
stellarskyline.com
mbutunerfitness.com
ssongg13916.cfd
sprockettrucking.com
boonts.cfd
oaistetic.com
enfejbazi1sjrttrsjegfwafe.click
you-can-too.com
chamdiemcchc.com
mrgdistilling.info
yptv1.com
ecofare.xyz
ouxodb001.cfd
sdymavillageculturehouse.com
carbolife.net
iokgw1.top
harmonicod.com
bbpinata.com
grfngr.design
colibriinvest.com
infossphere.space
glistenbeautylounge.com
paysprinters.online
ruhaniiyat.com
leathfortexas.com
tuesdayfolder.com
autoinsurancebound.com
scwanguan.fun
darkcreamslivki.xyz
0qtqg.com
ycth3hhtkd.asia
hivaom.top
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Formbook payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/3884-7-0x0000000002630000-0x0000000003630000-memory.dmp formbook behavioral2/memory/3884-12-0x0000000002630000-0x0000000003630000-memory.dmp formbook behavioral2/memory/1676-18-0x0000000000FC0000-0x0000000000FEF000-memory.dmp formbook behavioral2/memory/1676-20-0x0000000000FC0000-0x0000000000FEF000-memory.dmp formbook -
ModiLoader Second Stage 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4644-2-0x0000000003170000-0x0000000004170000-memory.dmp modiloader_stage2 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
d164c7ce3856705552a7dcd91f577c12162d5eb522153e33e91f86536cac5fb2.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3455265224-196869244-2056873367-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Telragab = "C:\\Users\\Public\\Telragab.url" d164c7ce3856705552a7dcd91f577c12162d5eb522153e33e91f86536cac5fb2.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
SndVol.exewscript.exedescription pid process target process PID 3884 set thread context of 3296 3884 SndVol.exe Explorer.EXE PID 1676 set thread context of 3296 1676 wscript.exe Explorer.EXE -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 32 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 34 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 54 IoCs
Processes:
d164c7ce3856705552a7dcd91f577c12162d5eb522153e33e91f86536cac5fb2.exeSndVol.exewscript.exepid process 4644 d164c7ce3856705552a7dcd91f577c12162d5eb522153e33e91f86536cac5fb2.exe 4644 d164c7ce3856705552a7dcd91f577c12162d5eb522153e33e91f86536cac5fb2.exe 3884 SndVol.exe 3884 SndVol.exe 3884 SndVol.exe 3884 SndVol.exe 1676 wscript.exe 1676 wscript.exe 1676 wscript.exe 1676 wscript.exe 1676 wscript.exe 1676 wscript.exe 1676 wscript.exe 1676 wscript.exe 1676 wscript.exe 1676 wscript.exe 1676 wscript.exe 1676 wscript.exe 1676 wscript.exe 1676 wscript.exe 1676 wscript.exe 1676 wscript.exe 1676 wscript.exe 1676 wscript.exe 1676 wscript.exe 1676 wscript.exe 1676 wscript.exe 1676 wscript.exe 1676 wscript.exe 1676 wscript.exe 1676 wscript.exe 1676 wscript.exe 1676 wscript.exe 1676 wscript.exe 1676 wscript.exe 1676 wscript.exe 1676 wscript.exe 1676 wscript.exe 1676 wscript.exe 1676 wscript.exe 1676 wscript.exe 1676 wscript.exe 1676 wscript.exe 1676 wscript.exe 1676 wscript.exe 1676 wscript.exe 1676 wscript.exe 1676 wscript.exe 1676 wscript.exe 1676 wscript.exe 1676 wscript.exe 1676 wscript.exe 1676 wscript.exe 1676 wscript.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3296 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
SndVol.exewscript.exepid process 3884 SndVol.exe 3884 SndVol.exe 3884 SndVol.exe 1676 wscript.exe 1676 wscript.exe -
Suspicious use of AdjustPrivilegeToken 18 IoCs
Processes:
SndVol.exeExplorer.EXEwscript.exedescription pid process Token: SeDebugPrivilege 3884 SndVol.exe Token: SeShutdownPrivilege 3296 Explorer.EXE Token: SeCreatePagefilePrivilege 3296 Explorer.EXE Token: SeShutdownPrivilege 3296 Explorer.EXE Token: SeCreatePagefilePrivilege 3296 Explorer.EXE Token: SeShutdownPrivilege 3296 Explorer.EXE Token: SeCreatePagefilePrivilege 3296 Explorer.EXE Token: SeShutdownPrivilege 3296 Explorer.EXE Token: SeCreatePagefilePrivilege 3296 Explorer.EXE Token: SeDebugPrivilege 1676 wscript.exe Token: SeShutdownPrivilege 3296 Explorer.EXE Token: SeCreatePagefilePrivilege 3296 Explorer.EXE Token: SeShutdownPrivilege 3296 Explorer.EXE Token: SeCreatePagefilePrivilege 3296 Explorer.EXE Token: SeShutdownPrivilege 3296 Explorer.EXE Token: SeCreatePagefilePrivilege 3296 Explorer.EXE Token: SeShutdownPrivilege 3296 Explorer.EXE Token: SeCreatePagefilePrivilege 3296 Explorer.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
SndVol.exepid process 3884 SndVol.exe -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
SndVol.exepid process 3884 SndVol.exe 3884 SndVol.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
d164c7ce3856705552a7dcd91f577c12162d5eb522153e33e91f86536cac5fb2.exeExplorer.EXEwscript.exedescription pid process target process PID 4644 wrote to memory of 3884 4644 d164c7ce3856705552a7dcd91f577c12162d5eb522153e33e91f86536cac5fb2.exe SndVol.exe PID 4644 wrote to memory of 3884 4644 d164c7ce3856705552a7dcd91f577c12162d5eb522153e33e91f86536cac5fb2.exe SndVol.exe PID 4644 wrote to memory of 3884 4644 d164c7ce3856705552a7dcd91f577c12162d5eb522153e33e91f86536cac5fb2.exe SndVol.exe PID 4644 wrote to memory of 3884 4644 d164c7ce3856705552a7dcd91f577c12162d5eb522153e33e91f86536cac5fb2.exe SndVol.exe PID 3296 wrote to memory of 1676 3296 Explorer.EXE wscript.exe PID 3296 wrote to memory of 1676 3296 Explorer.EXE wscript.exe PID 3296 wrote to memory of 1676 3296 Explorer.EXE wscript.exe PID 1676 wrote to memory of 2924 1676 wscript.exe cmd.exe PID 1676 wrote to memory of 2924 1676 wscript.exe cmd.exe PID 1676 wrote to memory of 2924 1676 wscript.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3296 -
C:\Users\Admin\AppData\Local\Temp\d164c7ce3856705552a7dcd91f577c12162d5eb522153e33e91f86536cac5fb2.exe"C:\Users\Admin\AppData\Local\Temp\d164c7ce3856705552a7dcd91f577c12162d5eb522153e33e91f86536cac5fb2.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Windows\SysWOW64\SndVol.exeC:\Windows\System32\SndVol.exe3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3884 -
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\SndVol.exe"3⤵PID:2924