Analysis
-
max time kernel
148s -
max time network
147s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
30-04-2021 19:01
Static task
static1
Behavioral task
behavioral1
Sample
lH9gneQxxLcSOHF.exe
Resource
win7v20210410
General
-
Target
lH9gneQxxLcSOHF.exe
-
Size
1.1MB
-
MD5
d336f736a9c84ce0b1e253c52f1643b3
-
SHA1
b9d79e4168b0e2bf89457ed7fc4b3fd83540d1c3
-
SHA256
8ed07c91dc9c7015a41b341c574e797402cecbaa097e0a12559fbb848420a11c
-
SHA512
42f7764c7c652bd8e9a91cefdd51a1a8dd45e535b10a98b9b144f8f7dc2143868c79b0da2b22348f6811fbcb0466b60037e04e6959b980fcc989bfe255da9016
Malware Config
Extracted
formbook
4.1
http://www.royalelectricvehicle.com/m8uk/
blackcountryteshirts.com
pioneergeoscience.com
calacciwedding.com
theelegantdoorbow.com
graciosera.com
kwikversity.com
izita.xyz
drivewiththebest.co.uk
kakback.xyz
sachascott.net
lifeenterprisesystems.com
interimgirl.com
myviralplatform.com
spainmatrimony.com
supergenx.com
leglehla.icu
otlhswdok.icu
1stfdsqnre.com
xxxcentral.net
movimentare.com
chinafccs.com
dreamcodehosting.com
caffinaticscoffeeco.com
lange-global.com
ashtondrakr.com
yourproductmarketfit.com
juxrams.info
sportsapiens.com
mute.codes
plyedpiper.com
feel-the-glam.com
heigad.space
chanelbaghandbagss.com
yuzhuolabel.com
bymycamera.com
fcmalzeme.com
alnajammart.com
chocolatejerky.com
confusedframe.com
trufflesales.com
dxbj189.com
bboujeehair.com
freehdmovies.club
12dying.com
globalnetworkersacademy.com
notablescumbags.com
timnuwin.com
tampahemorrhoidclinic.com
hngxqwozw.icu
eshoplabo.com
britishlanguagecollege.com
eld-sarl-btp.com
sdfweee.com
sihe08.com
myvipshirt.com
ruthenfamilyoffice.com
majesticapparelprints.com
lunaraxe.com
nvect.com
ladyandoscar.com
lenacleaningandflooring.com
outfoxstudios.net
themmbcollection.com
provide-republic.xyz
Signatures
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/744-68-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/744-69-0x000000000041ED10-mapping.dmp formbook behavioral1/memory/972-77-0x00000000001D0000-0x00000000001FE000-memory.dmp formbook -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1476 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
lH9gneQxxLcSOHF.exelH9gneQxxLcSOHF.execmd.exedescription pid process target process PID 1116 set thread context of 744 1116 lH9gneQxxLcSOHF.exe lH9gneQxxLcSOHF.exe PID 744 set thread context of 1292 744 lH9gneQxxLcSOHF.exe Explorer.EXE PID 972 set thread context of 1292 972 cmd.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 11 IoCs
Processes:
lH9gneQxxLcSOHF.exelH9gneQxxLcSOHF.execmd.exepid process 1116 lH9gneQxxLcSOHF.exe 1116 lH9gneQxxLcSOHF.exe 744 lH9gneQxxLcSOHF.exe 744 lH9gneQxxLcSOHF.exe 972 cmd.exe 972 cmd.exe 972 cmd.exe 972 cmd.exe 972 cmd.exe 972 cmd.exe 972 cmd.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
lH9gneQxxLcSOHF.execmd.exepid process 744 lH9gneQxxLcSOHF.exe 744 lH9gneQxxLcSOHF.exe 744 lH9gneQxxLcSOHF.exe 972 cmd.exe 972 cmd.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
lH9gneQxxLcSOHF.exelH9gneQxxLcSOHF.execmd.exedescription pid process Token: SeDebugPrivilege 1116 lH9gneQxxLcSOHF.exe Token: SeDebugPrivilege 744 lH9gneQxxLcSOHF.exe Token: SeDebugPrivilege 972 cmd.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
lH9gneQxxLcSOHF.exeExplorer.EXEcmd.exedescription pid process target process PID 1116 wrote to memory of 320 1116 lH9gneQxxLcSOHF.exe schtasks.exe PID 1116 wrote to memory of 320 1116 lH9gneQxxLcSOHF.exe schtasks.exe PID 1116 wrote to memory of 320 1116 lH9gneQxxLcSOHF.exe schtasks.exe PID 1116 wrote to memory of 320 1116 lH9gneQxxLcSOHF.exe schtasks.exe PID 1116 wrote to memory of 1412 1116 lH9gneQxxLcSOHF.exe lH9gneQxxLcSOHF.exe PID 1116 wrote to memory of 1412 1116 lH9gneQxxLcSOHF.exe lH9gneQxxLcSOHF.exe PID 1116 wrote to memory of 1412 1116 lH9gneQxxLcSOHF.exe lH9gneQxxLcSOHF.exe PID 1116 wrote to memory of 1412 1116 lH9gneQxxLcSOHF.exe lH9gneQxxLcSOHF.exe PID 1116 wrote to memory of 744 1116 lH9gneQxxLcSOHF.exe lH9gneQxxLcSOHF.exe PID 1116 wrote to memory of 744 1116 lH9gneQxxLcSOHF.exe lH9gneQxxLcSOHF.exe PID 1116 wrote to memory of 744 1116 lH9gneQxxLcSOHF.exe lH9gneQxxLcSOHF.exe PID 1116 wrote to memory of 744 1116 lH9gneQxxLcSOHF.exe lH9gneQxxLcSOHF.exe PID 1116 wrote to memory of 744 1116 lH9gneQxxLcSOHF.exe lH9gneQxxLcSOHF.exe PID 1116 wrote to memory of 744 1116 lH9gneQxxLcSOHF.exe lH9gneQxxLcSOHF.exe PID 1116 wrote to memory of 744 1116 lH9gneQxxLcSOHF.exe lH9gneQxxLcSOHF.exe PID 1292 wrote to memory of 972 1292 Explorer.EXE cmd.exe PID 1292 wrote to memory of 972 1292 Explorer.EXE cmd.exe PID 1292 wrote to memory of 972 1292 Explorer.EXE cmd.exe PID 1292 wrote to memory of 972 1292 Explorer.EXE cmd.exe PID 972 wrote to memory of 1476 972 cmd.exe cmd.exe PID 972 wrote to memory of 1476 972 cmd.exe cmd.exe PID 972 wrote to memory of 1476 972 cmd.exe cmd.exe PID 972 wrote to memory of 1476 972 cmd.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\lH9gneQxxLcSOHF.exe"C:\Users\Admin\AppData\Local\Temp\lH9gneQxxLcSOHF.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jVtLppC" /XML "C:\Users\Admin\AppData\Local\Temp\tmpC11D.tmp"3⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\lH9gneQxxLcSOHF.exe"C:\Users\Admin\AppData\Local\Temp\lH9gneQxxLcSOHF.exe"3⤵
-
C:\Users\Admin\AppData\Local\Temp\lH9gneQxxLcSOHF.exe"C:\Users\Admin\AppData\Local\Temp\lH9gneQxxLcSOHF.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\lH9gneQxxLcSOHF.exe"3⤵
- Deletes itself
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmpC11D.tmpMD5
fe06d7e2991be78368341f50f515e8d0
SHA1b57f4384f718606ff107ffb22308af0452b2adba
SHA256af43350cf84b30c72f868e73d2d0a895dd2f2aa295a28c4b3f549c82744404c5
SHA512c17c573a529a5dec3c68c7d002df657a76547450150c0ecdd17fd55e5e6e1520bd0ae8bfab6a99e08328f220f0a64c490ab2aaa4fd3cf99cdac02a0fe5b6f6a4
-
memory/320-66-0x0000000000000000-mapping.dmp
-
memory/744-72-0x0000000000360000-0x0000000000374000-memory.dmpFilesize
80KB
-
memory/744-71-0x0000000000950000-0x0000000000C53000-memory.dmpFilesize
3.0MB
-
memory/744-69-0x000000000041ED10-mapping.dmp
-
memory/744-68-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/972-74-0x0000000000000000-mapping.dmp
-
memory/972-75-0x000000004A4F0000-0x000000004A53C000-memory.dmpFilesize
304KB
-
memory/972-76-0x0000000001F60000-0x0000000002263000-memory.dmpFilesize
3.0MB
-
memory/972-77-0x00000000001D0000-0x00000000001FE000-memory.dmpFilesize
184KB
-
memory/972-79-0x00000000005A0000-0x0000000000633000-memory.dmpFilesize
588KB
-
memory/1116-65-0x00000000011F0000-0x0000000001225000-memory.dmpFilesize
212KB
-
memory/1116-64-0x0000000007C70000-0x0000000007CED000-memory.dmpFilesize
500KB
-
memory/1116-63-0x0000000000A80000-0x0000000000A8D000-memory.dmpFilesize
52KB
-
memory/1116-62-0x00000000072E0000-0x00000000072E1000-memory.dmpFilesize
4KB
-
memory/1116-60-0x0000000001330000-0x0000000001331000-memory.dmpFilesize
4KB
-
memory/1292-73-0x0000000004740000-0x0000000004801000-memory.dmpFilesize
772KB
-
memory/1292-80-0x0000000006CE0000-0x0000000006E30000-memory.dmpFilesize
1.3MB
-
memory/1476-78-0x0000000000000000-mapping.dmp