Analysis
-
max time kernel
154s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2023 16:29
Static task
static1
Behavioral task
behavioral1
Sample
Ylvjcujvcjtsqv.exe
Resource
win7-20231130-en
Behavioral task
behavioral2
Sample
Ylvjcujvcjtsqv.exe
Resource
win10v2004-20231127-en
General
-
Target
Ylvjcujvcjtsqv.exe
-
Size
2.8MB
-
MD5
9036abae6529a51f5d50825d88dc95a4
-
SHA1
5c10c6dc6146db9f545dd1e8fbac70fe2c333a8a
-
SHA256
1117ea5185a8c16dbc9af96cbb580f5ac55a5f4bc0963e149c83a6c9c35dba7a
-
SHA512
d9a9ce7096cc24985e8f2731e67e57abf7f24ea5213051b15a7951731db263f7a741b955fa672157c46d9e69ef5df614148b95ffbff246f7999df610be854c47
-
SSDEEP
49152:Xm/PpH8yc0/wU2lpe63ZrxKrVEbRIqiPt41uFehg1mQzZ:XOpcyV/wjpdZrxEVEtI14wqnY
Malware Config
Extracted
formbook
4.1
ao65
spins2023.pro
foodontario.com
jsnmz.com
canwealljustagree.com
shopthedivine.store
thelakahealth.com
kuis-raja-borong.website
hbqc2.com
optimusvisionlb.com
urdulatest.com
akhayarplus.com
info-antai-service.com
kermisbedrijfkramer.online
epansion.com
gxqingmeng.top
maltsky.net
ictwath.com
sharmafootcare.com
mycheese.net
portfoliotestkitchen.com
gwhi13.cfd
fuzzybraintrivia.com
thnkotb.com
merchdojacat.com
1techtrendzstore.com
cnkclaw.net
xsslm888.com
musecheng.net
flowandfield.online
somdevista.com
baissm.top
xn--88-uqi1dtk.com
cewra.com
stellarskyline.com
mbutunerfitness.com
ssongg13916.cfd
sprockettrucking.com
boonts.cfd
oaistetic.com
enfejbazi1sjrttrsjegfwafe.click
you-can-too.com
chamdiemcchc.com
mrgdistilling.info
yptv1.com
ecofare.xyz
ouxodb001.cfd
sdymavillageculturehouse.com
carbolife.net
iokgw1.top
harmonicod.com
bbpinata.com
grfngr.design
colibriinvest.com
infossphere.space
glistenbeautylounge.com
paysprinters.online
ruhaniiyat.com
leathfortexas.com
tuesdayfolder.com
autoinsurancebound.com
scwanguan.fun
darkcreamslivki.xyz
0qtqg.com
ycth3hhtkd.asia
hivaom.top
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Formbook payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/2396-10-0x0000000002570000-0x0000000003570000-memory.dmp formbook behavioral2/memory/2396-14-0x0000000002570000-0x0000000003570000-memory.dmp formbook behavioral2/memory/4804-20-0x0000000001260000-0x000000000128F000-memory.dmp formbook behavioral2/memory/4804-22-0x0000000001260000-0x000000000128F000-memory.dmp formbook -
ModiLoader Second Stage 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4896-3-0x0000000004520000-0x0000000005520000-memory.dmp modiloader_stage2 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Ylvjcujvcjtsqv.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3635043082-2972811465-3176142135-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Ylvjcujv = "C:\\Users\\Public\\Ylvjcujv.url" Ylvjcujvcjtsqv.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
SndVol.exehelp.exedescription pid process target process PID 2396 set thread context of 3172 2396 SndVol.exe Explorer.EXE PID 4804 set thread context of 3172 4804 help.exe Explorer.EXE -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 45 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 50 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 52 IoCs
Processes:
Ylvjcujvcjtsqv.exeSndVol.exehelp.exepid process 4896 Ylvjcujvcjtsqv.exe 4896 Ylvjcujvcjtsqv.exe 2396 SndVol.exe 2396 SndVol.exe 2396 SndVol.exe 2396 SndVol.exe 4804 help.exe 4804 help.exe 4804 help.exe 4804 help.exe 4804 help.exe 4804 help.exe 4804 help.exe 4804 help.exe 4804 help.exe 4804 help.exe 4804 help.exe 4804 help.exe 4804 help.exe 4804 help.exe 4804 help.exe 4804 help.exe 4804 help.exe 4804 help.exe 4804 help.exe 4804 help.exe 4804 help.exe 4804 help.exe 4804 help.exe 4804 help.exe 4804 help.exe 4804 help.exe 4804 help.exe 4804 help.exe 4804 help.exe 4804 help.exe 4804 help.exe 4804 help.exe 4804 help.exe 4804 help.exe 4804 help.exe 4804 help.exe 4804 help.exe 4804 help.exe 4804 help.exe 4804 help.exe 4804 help.exe 4804 help.exe 4804 help.exe 4804 help.exe 4804 help.exe 4804 help.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3172 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
SndVol.exehelp.exepid process 2396 SndVol.exe 2396 SndVol.exe 2396 SndVol.exe 4804 help.exe 4804 help.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
SndVol.exeExplorer.EXEhelp.exedescription pid process Token: SeDebugPrivilege 2396 SndVol.exe Token: SeShutdownPrivilege 3172 Explorer.EXE Token: SeCreatePagefilePrivilege 3172 Explorer.EXE Token: SeShutdownPrivilege 3172 Explorer.EXE Token: SeCreatePagefilePrivilege 3172 Explorer.EXE Token: SeShutdownPrivilege 3172 Explorer.EXE Token: SeCreatePagefilePrivilege 3172 Explorer.EXE Token: SeShutdownPrivilege 3172 Explorer.EXE Token: SeCreatePagefilePrivilege 3172 Explorer.EXE Token: SeDebugPrivilege 4804 help.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
SndVol.exepid process 2396 SndVol.exe -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
SndVol.exepid process 2396 SndVol.exe 2396 SndVol.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid process 3172 Explorer.EXE -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
Ylvjcujvcjtsqv.exeExplorer.EXEhelp.exedescription pid process target process PID 4896 wrote to memory of 2396 4896 Ylvjcujvcjtsqv.exe SndVol.exe PID 4896 wrote to memory of 2396 4896 Ylvjcujvcjtsqv.exe SndVol.exe PID 4896 wrote to memory of 2396 4896 Ylvjcujvcjtsqv.exe SndVol.exe PID 4896 wrote to memory of 2396 4896 Ylvjcujvcjtsqv.exe SndVol.exe PID 3172 wrote to memory of 4804 3172 Explorer.EXE help.exe PID 3172 wrote to memory of 4804 3172 Explorer.EXE help.exe PID 3172 wrote to memory of 4804 3172 Explorer.EXE help.exe PID 4804 wrote to memory of 4828 4804 help.exe cmd.exe PID 4804 wrote to memory of 4828 4804 help.exe cmd.exe PID 4804 wrote to memory of 4828 4804 help.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Users\Admin\AppData\Local\Temp\Ylvjcujvcjtsqv.exe"C:\Users\Admin\AppData\Local\Temp\Ylvjcujvcjtsqv.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Windows\SysWOW64\SndVol.exeC:\Windows\System32\SndVol.exe3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2396 -
C:\Windows\SysWOW64\help.exe"C:\Windows\SysWOW64\help.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\SndVol.exe"3⤵PID:4828