Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
23-04-2021 09:40
Static task
static1
Behavioral task
behavioral1
Sample
4.exe
Resource
win7v20210410
General
-
Target
4.exe
-
Size
643KB
-
MD5
9c8c50b10343843f860fff79ac4511af
-
SHA1
c6f52f87914312e817655fc0492815b86d053e90
-
SHA256
ba06bef45227ff0ac912a66434014b848348f6be9780e8d86de0ffcc8c5c2c12
-
SHA512
9e6380d41e80a312f2f0e0b588381e57519b50203e436587ab936344787cb54aac7b85c739e048996d729ecc297d6e09ec4a72a7a7e948d554d131ef9647c350
Malware Config
Extracted
formbook
4.1
http://www.ostecosarcomamd.com/gmn/
phulieutockemnghiaanhtuyet.com
shortbarrelspirits.com
livestreamreport.com
shopthemuze.com
fmtourist.com
competitionlaw.info
saint-elmos.club
foxcar.net
automatedwoodworks.com
abenillc.net
sfccservices.com
vegeteur.com
bitinnovo.com
in-home-theater.com
yakinikugenki.com
zeednee.com
hospiceinpomona.com
techservicesreviews.com
silkandhoney.store
sport-stars.online
thebusinessmanagementclub.com
szhb.kim
bosschicstyle.com
sarahsvirtualofficeteam.com
resceposac.com
coffeecrimewave.com
byonf.com
xsekka.com
immer-schneller.com
spotfoundry.com
myvulva.com
dzn1.com
thechenk.com
maybex.net
targetedads.info
firedoom.com
ayaatri.com
barilochetravels.com
bbunnystudios.com
pinpongclub.com
wheelerwayinc.com
birdsockshop.com
artelierbyjackottanio.com
sexpharms.com
oakleticfitnesstraining.com
afforditconsulting.com
eudoraappliances.com
gidhhsne.com
npbuyhomes.com
developerpedia.com
villabluebayou.com
novatechxf.com
weirogin.com
shopqubi.com
erinssoliki.com
mnztsdlifsdserd-online.com
missionwellnesshealth.com
curso-ruralvia.com
fhll.net
shouthenny.com
myhairgr.com
blackllamarecords.com
keverettcrozier.com
rhinocustomdesigns.com
Signatures
-
Formbook Payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/2120-126-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/2120-127-0x000000000041EB20-mapping.dmp formbook behavioral2/memory/2120-130-0x0000000000C20000-0x0000000000D6A000-memory.dmp formbook behavioral2/memory/660-135-0x0000000001110000-0x000000000113E000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
Processes:
4.exeRegSvcs.exewscript.exedescription pid process target process PID 624 set thread context of 2120 624 4.exe RegSvcs.exe PID 2120 set thread context of 2988 2120 RegSvcs.exe Explorer.EXE PID 660 set thread context of 2988 660 wscript.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 19 IoCs
Processes:
4.exeRegSvcs.exewscript.exepid process 624 4.exe 624 4.exe 624 4.exe 2120 RegSvcs.exe 2120 RegSvcs.exe 2120 RegSvcs.exe 2120 RegSvcs.exe 660 wscript.exe 660 wscript.exe 660 wscript.exe 660 wscript.exe 660 wscript.exe 660 wscript.exe 660 wscript.exe 660 wscript.exe 660 wscript.exe 660 wscript.exe 660 wscript.exe 660 wscript.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
RegSvcs.exewscript.exepid process 2120 RegSvcs.exe 2120 RegSvcs.exe 2120 RegSvcs.exe 660 wscript.exe 660 wscript.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
4.exeRegSvcs.exewscript.exedescription pid process Token: SeDebugPrivilege 624 4.exe Token: SeDebugPrivilege 2120 RegSvcs.exe Token: SeDebugPrivilege 660 wscript.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
4.exeExplorer.EXEwscript.exedescription pid process target process PID 624 wrote to memory of 4000 624 4.exe schtasks.exe PID 624 wrote to memory of 4000 624 4.exe schtasks.exe PID 624 wrote to memory of 4000 624 4.exe schtasks.exe PID 624 wrote to memory of 2120 624 4.exe RegSvcs.exe PID 624 wrote to memory of 2120 624 4.exe RegSvcs.exe PID 624 wrote to memory of 2120 624 4.exe RegSvcs.exe PID 624 wrote to memory of 2120 624 4.exe RegSvcs.exe PID 624 wrote to memory of 2120 624 4.exe RegSvcs.exe PID 624 wrote to memory of 2120 624 4.exe RegSvcs.exe PID 2988 wrote to memory of 660 2988 Explorer.EXE wscript.exe PID 2988 wrote to memory of 660 2988 Explorer.EXE wscript.exe PID 2988 wrote to memory of 660 2988 Explorer.EXE wscript.exe PID 660 wrote to memory of 3916 660 wscript.exe cmd.exe PID 660 wrote to memory of 3916 660 wscript.exe cmd.exe PID 660 wrote to memory of 3916 660 wscript.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\4.exe"C:\Users\Admin\AppData\Local\Temp\4.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\vGDImNjzE" /XML "C:\Users\Admin\AppData\Local\Temp\tmpF3E6.tmp"3⤵
- Creates scheduled task(s)
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmpF3E6.tmpMD5
9c08f3971bfa64d04df4e731db961f83
SHA112feb6794ab9f013132995f32b3970cb1fc69ef8
SHA2565a38ba9766265b6715e1165bf88b77c10b9a4bf8cee7b2b75acd67a733d003c8
SHA51263bc13f61b6aec5188587b4e1621c9c1e21d6c99ee6fd987f92e095c527a7378b50d39a2a208448a150651b7f53892dc98680b06d890ed8c2180b9b3b03d44a9
-
memory/624-120-0x00000000054C0000-0x00000000059BE000-memory.dmpFilesize
5.0MB
-
memory/624-118-0x00000000056A0000-0x00000000056A1000-memory.dmpFilesize
4KB
-
memory/624-117-0x0000000005560000-0x0000000005561000-memory.dmpFilesize
4KB
-
memory/624-119-0x0000000005600000-0x0000000005601000-memory.dmpFilesize
4KB
-
memory/624-114-0x0000000000C90000-0x0000000000C91000-memory.dmpFilesize
4KB
-
memory/624-121-0x0000000005850000-0x000000000585D000-memory.dmpFilesize
52KB
-
memory/624-122-0x00000000014C0000-0x0000000001549000-memory.dmpFilesize
548KB
-
memory/624-123-0x0000000006040000-0x0000000006084000-memory.dmpFilesize
272KB
-
memory/624-116-0x00000000059C0000-0x00000000059C1000-memory.dmpFilesize
4KB
-
memory/660-137-0x00000000050C0000-0x0000000005153000-memory.dmpFilesize
588KB
-
memory/660-136-0x0000000005260000-0x0000000005580000-memory.dmpFilesize
3.1MB
-
memory/660-134-0x0000000001340000-0x0000000001367000-memory.dmpFilesize
156KB
-
memory/660-132-0x0000000000000000-mapping.dmp
-
memory/660-135-0x0000000001110000-0x000000000113E000-memory.dmpFilesize
184KB
-
memory/2120-127-0x000000000041EB20-mapping.dmp
-
memory/2120-126-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/2120-129-0x0000000001150000-0x0000000001470000-memory.dmpFilesize
3.1MB
-
memory/2120-130-0x0000000000C20000-0x0000000000D6A000-memory.dmpFilesize
1.3MB
-
memory/2988-138-0x0000000002A20000-0x0000000002AF9000-memory.dmpFilesize
868KB
-
memory/2988-131-0x00000000060F0000-0x00000000061F7000-memory.dmpFilesize
1.0MB
-
memory/3916-133-0x0000000000000000-mapping.dmp
-
memory/4000-124-0x0000000000000000-mapping.dmp