Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
03-05-2021 08:48
Static task
static1
Behavioral task
behavioral1
Sample
aa6168d4e41ced2091baee9f5d59e11e.exe
Resource
win7v20210410
General
-
Target
aa6168d4e41ced2091baee9f5d59e11e.exe
-
Size
228KB
-
MD5
aa6168d4e41ced2091baee9f5d59e11e
-
SHA1
de7f4a8270fe216e68076ce93243b60d6d6d5f51
-
SHA256
7c6393b4e86ea5cec49c0f814b17e4bb85aa447c19896037252a94ff6416ce1b
-
SHA512
37c5d51495c0b53bdcd522d3b4a0346202d6069002b8d35f913a96596eb1a51c4fa41e445673024fbb62b4f701355aabb2e1804075709693c6339d1c3dad95e2
Malware Config
Extracted
formbook
4.1
http://www.shoprodeovegas.com/xcl/
sewingtherose.com
thesmartshareholder.com
afasyah.com
marolamusic.com
lookupgeorgina.com
plataforyou.com
dijcan.com
pawtyparcels.com
interprediction.com
fairerfinancehackathon.net
thehmnshop.com
jocelynlopez.com
launcheffecthouston.com
joyeveryminute.com
spyforu.com
ronerasanjuan.com
gadgetsdesi.com
nmrconsultants.com
travellpod.com
ballparksportscards.com
milehighcitygames.com
sophieberiault.com
2020uselectionresult.com
instantpeindia.com
topgradetutors.net
esveb.com
rftjrsrv.net
raphacall.com
wangrenkai.com
programme-zeste.com
idtiam.com
cruzealmeidaarquitetura.com
hidbatteries.com
print12580.com
realmartagent.com
tpsmg.com
mamapacho.com
rednetmarketing.com
syuan.xyz
floryi.com
photograph-gallery.com
devarajantraders.com
amarak-uniform.com
20190606.com
retailhutbd.net
craftbrewllc.com
myfreezic.com
crystalwiththecrystalz.com
ghallagherstudent.com
britishretailawards.com
thegoldenwork.com
dineztheunique.com
singlelookin.com
siyuanshe.com
apgfinancing.com
slicktechgadgets.com
wellemade.com
samytango.com
centaurme.com
shuairui.net
styleket.com
wpcfences.com
opolclothing.com
localiser.site
Signatures
-
Formbook Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1496-63-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Loads dropped DLL 1 IoCs
Processes:
aa6168d4e41ced2091baee9f5d59e11e.exepid process 1748 aa6168d4e41ced2091baee9f5d59e11e.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
aa6168d4e41ced2091baee9f5d59e11e.exedescription pid process target process PID 1748 set thread context of 1496 1748 aa6168d4e41ced2091baee9f5d59e11e.exe aa6168d4e41ced2091baee9f5d59e11e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
aa6168d4e41ced2091baee9f5d59e11e.exepid process 1496 aa6168d4e41ced2091baee9f5d59e11e.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
aa6168d4e41ced2091baee9f5d59e11e.exepid process 1748 aa6168d4e41ced2091baee9f5d59e11e.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
aa6168d4e41ced2091baee9f5d59e11e.exedescription pid process target process PID 1748 wrote to memory of 1496 1748 aa6168d4e41ced2091baee9f5d59e11e.exe aa6168d4e41ced2091baee9f5d59e11e.exe PID 1748 wrote to memory of 1496 1748 aa6168d4e41ced2091baee9f5d59e11e.exe aa6168d4e41ced2091baee9f5d59e11e.exe PID 1748 wrote to memory of 1496 1748 aa6168d4e41ced2091baee9f5d59e11e.exe aa6168d4e41ced2091baee9f5d59e11e.exe PID 1748 wrote to memory of 1496 1748 aa6168d4e41ced2091baee9f5d59e11e.exe aa6168d4e41ced2091baee9f5d59e11e.exe PID 1748 wrote to memory of 1496 1748 aa6168d4e41ced2091baee9f5d59e11e.exe aa6168d4e41ced2091baee9f5d59e11e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa6168d4e41ced2091baee9f5d59e11e.exe"C:\Users\Admin\AppData\Local\Temp\aa6168d4e41ced2091baee9f5d59e11e.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\aa6168d4e41ced2091baee9f5d59e11e.exe"C:\Users\Admin\AppData\Local\Temp\aa6168d4e41ced2091baee9f5d59e11e.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1496
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
7bee24f38e906d08f10c1b51be4be749
SHA1588f2f0f8b859e15620fbec8e6381c6addf2a3fd
SHA256974e158ea37951d137839d4189279330aa2e85f5bafa4f273f7007673cd4d3fc
SHA512417032d0c0decacd4332d9379843ef358b553960a2c00caf470d129f6f797aed3eb180a3e2182eb5e443772d24b8e8c7fe4bd3b06909b2a555a8e7c063137e25