Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
04-05-2021 02:00
Static task
static1
Behavioral task
behavioral1
Sample
propser16364.exe
Resource
win7v20210408
General
-
Target
propser16364.exe
-
Size
228KB
-
MD5
aa6168d4e41ced2091baee9f5d59e11e
-
SHA1
de7f4a8270fe216e68076ce93243b60d6d6d5f51
-
SHA256
7c6393b4e86ea5cec49c0f814b17e4bb85aa447c19896037252a94ff6416ce1b
-
SHA512
37c5d51495c0b53bdcd522d3b4a0346202d6069002b8d35f913a96596eb1a51c4fa41e445673024fbb62b4f701355aabb2e1804075709693c6339d1c3dad95e2
Malware Config
Extracted
formbook
4.1
http://www.shoprodeovegas.com/xcl/
sewingtherose.com
thesmartshareholder.com
afasyah.com
marolamusic.com
lookupgeorgina.com
plataforyou.com
dijcan.com
pawtyparcels.com
interprediction.com
fairerfinancehackathon.net
thehmnshop.com
jocelynlopez.com
launcheffecthouston.com
joyeveryminute.com
spyforu.com
ronerasanjuan.com
gadgetsdesi.com
nmrconsultants.com
travellpod.com
ballparksportscards.com
milehighcitygames.com
sophieberiault.com
2020uselectionresult.com
instantpeindia.com
topgradetutors.net
esveb.com
rftjrsrv.net
raphacall.com
wangrenkai.com
programme-zeste.com
idtiam.com
cruzealmeidaarquitetura.com
hidbatteries.com
print12580.com
realmartagent.com
tpsmg.com
mamapacho.com
rednetmarketing.com
syuan.xyz
floryi.com
photograph-gallery.com
devarajantraders.com
amarak-uniform.com
20190606.com
retailhutbd.net
craftbrewllc.com
myfreezic.com
crystalwiththecrystalz.com
ghallagherstudent.com
britishretailawards.com
thegoldenwork.com
dineztheunique.com
singlelookin.com
siyuanshe.com
apgfinancing.com
slicktechgadgets.com
wellemade.com
samytango.com
centaurme.com
shuairui.net
styleket.com
wpcfences.com
opolclothing.com
localiser.site
Signatures
-
Formbook Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/1796-117-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/2668-124-0x0000000000E00000-0x0000000000E2E000-memory.dmp formbook -
Loads dropped DLL 1 IoCs
Processes:
propser16364.exepid process 2208 propser16364.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
propser16364.exepropser16364.exehelp.exedescription pid process target process PID 2208 set thread context of 1796 2208 propser16364.exe propser16364.exe PID 1796 set thread context of 3048 1796 propser16364.exe Explorer.EXE PID 2668 set thread context of 3048 2668 help.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 60 IoCs
Processes:
propser16364.exehelp.exepid process 1796 propser16364.exe 1796 propser16364.exe 1796 propser16364.exe 1796 propser16364.exe 2668 help.exe 2668 help.exe 2668 help.exe 2668 help.exe 2668 help.exe 2668 help.exe 2668 help.exe 2668 help.exe 2668 help.exe 2668 help.exe 2668 help.exe 2668 help.exe 2668 help.exe 2668 help.exe 2668 help.exe 2668 help.exe 2668 help.exe 2668 help.exe 2668 help.exe 2668 help.exe 2668 help.exe 2668 help.exe 2668 help.exe 2668 help.exe 2668 help.exe 2668 help.exe 2668 help.exe 2668 help.exe 2668 help.exe 2668 help.exe 2668 help.exe 2668 help.exe 2668 help.exe 2668 help.exe 2668 help.exe 2668 help.exe 2668 help.exe 2668 help.exe 2668 help.exe 2668 help.exe 2668 help.exe 2668 help.exe 2668 help.exe 2668 help.exe 2668 help.exe 2668 help.exe 2668 help.exe 2668 help.exe 2668 help.exe 2668 help.exe 2668 help.exe 2668 help.exe 2668 help.exe 2668 help.exe 2668 help.exe 2668 help.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3048 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
propser16364.exepropser16364.exehelp.exepid process 2208 propser16364.exe 1796 propser16364.exe 1796 propser16364.exe 1796 propser16364.exe 2668 help.exe 2668 help.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
propser16364.exehelp.exedescription pid process Token: SeDebugPrivilege 1796 propser16364.exe Token: SeDebugPrivilege 2668 help.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
propser16364.exeExplorer.EXEhelp.exedescription pid process target process PID 2208 wrote to memory of 1796 2208 propser16364.exe propser16364.exe PID 2208 wrote to memory of 1796 2208 propser16364.exe propser16364.exe PID 2208 wrote to memory of 1796 2208 propser16364.exe propser16364.exe PID 2208 wrote to memory of 1796 2208 propser16364.exe propser16364.exe PID 3048 wrote to memory of 2668 3048 Explorer.EXE help.exe PID 3048 wrote to memory of 2668 3048 Explorer.EXE help.exe PID 3048 wrote to memory of 2668 3048 Explorer.EXE help.exe PID 2668 wrote to memory of 732 2668 help.exe cmd.exe PID 2668 wrote to memory of 732 2668 help.exe cmd.exe PID 2668 wrote to memory of 732 2668 help.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\propser16364.exe"C:\Users\Admin\AppData\Local\Temp\propser16364.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\propser16364.exe"C:\Users\Admin\AppData\Local\Temp\propser16364.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\help.exe"C:\Windows\SysWOW64\help.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\propser16364.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\nst1015.tmp\ghvea31n0uw.dllMD5
7bee24f38e906d08f10c1b51be4be749
SHA1588f2f0f8b859e15620fbec8e6381c6addf2a3fd
SHA256974e158ea37951d137839d4189279330aa2e85f5bafa4f273f7007673cd4d3fc
SHA512417032d0c0decacd4332d9379843ef358b553960a2c00caf470d129f6f797aed3eb180a3e2182eb5e443772d24b8e8c7fe4bd3b06909b2a555a8e7c063137e25
-
memory/732-122-0x0000000000000000-mapping.dmp
-
memory/1796-115-0x000000000041EB70-mapping.dmp
-
memory/1796-117-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/1796-119-0x00000000009E0000-0x00000000009F4000-memory.dmpFilesize
80KB
-
memory/1796-118-0x0000000000AC0000-0x0000000000DE0000-memory.dmpFilesize
3.1MB
-
memory/2208-116-0x00000000009B0000-0x00000000009B2000-memory.dmpFilesize
8KB
-
memory/2668-123-0x0000000000FB0000-0x0000000000FB7000-memory.dmpFilesize
28KB
-
memory/2668-121-0x0000000000000000-mapping.dmp
-
memory/2668-124-0x0000000000E00000-0x0000000000E2E000-memory.dmpFilesize
184KB
-
memory/2668-125-0x0000000002FC0000-0x000000000310A000-memory.dmpFilesize
1.3MB
-
memory/2668-126-0x0000000003380000-0x0000000003413000-memory.dmpFilesize
588KB
-
memory/3048-120-0x0000000005700000-0x0000000005886000-memory.dmpFilesize
1.5MB
-
memory/3048-127-0x0000000005890000-0x0000000005A17000-memory.dmpFilesize
1.5MB