Analysis
-
max time kernel
3s -
max time network
9s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
06-05-2021 17:06
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Gen.Variant.Jaik.45760.22297.11380.exe
Resource
win7v20210410
General
-
Target
SecuriteInfo.com.Gen.Variant.Jaik.45760.22297.11380.exe
-
Size
226KB
-
MD5
7b4973aec7a63ca2903b317601acbd10
-
SHA1
342038824bb18ecc6c4a1097d62755bd06ef4969
-
SHA256
49418af33201289e66136b482386db29a68e32c689f0b625eed3699b8bb45940
-
SHA512
386a1f9ed6e79f6af9931ae16f96a3e810b1ce94722d88b742a861561f9a5540290c205bc4168603048cfa696b86f21b6fe46d95530d6f6acac0bfacf1247355
Malware Config
Extracted
formbook
4.1
http://www.knighttechinca.com/dxe/
sardarfarm.com
959tremont.com
privat-livecam.net
ansel-homebakery.com
joysupermarket.com
peninsulamatchmakers.net
northsytyle.com
radioconexaoubermusic.com
relocatingrealtor.com
desyrnan.com
onlinehoortoestel.online
enpointe.online
rvvikings.com
paulpoirier.com
shitarpa.net
kerneis.net
rokitreach.com
essentiallygaia.com
prestiged.net
fuerzaagavera.com
soukid.com
moderndatingcoach.com
mentalfreedom.guru
bullishsoftware.com
sectorulb.com
outletyana.com
fptplaybox.website
artinmemory.com
buyruon.com
ljd.xyz
mondaysmatters.com
spiritsoundart.net
ixiangzu.com
lacompagniadelfardello.com
bnctly.com
sarasvati-yoga.com
0055game.com
lagrangewildliferemoval.com
umlausa.com
chaytel.com
kkkc5.com
union-green.com
philreid4cc.com
theanimehat.com
redlightlegal.com
myaustraliarewards.com
barkinlot.com
mujahidservice.online
nugeneraonline.com
sopplugin.com
makemyroom.design
ferienschweden.com
fps2020dkasphotoop.com
stylezbykay.com
royalpropertiesgurugram.com
birzulova.com
cosmicmtn.com
kissanime.press
poweringprogress.today
omsamedic.com
drunkpoetsociety.com
hostbison.com
asapdecor.com
houseofsisson.com
Signatures
-
Formbook Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1964-63-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Loads dropped DLL 1 IoCs
Processes:
SecuriteInfo.com.Gen.Variant.Jaik.45760.22297.11380.exepid process 1996 SecuriteInfo.com.Gen.Variant.Jaik.45760.22297.11380.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
SecuriteInfo.com.Gen.Variant.Jaik.45760.22297.11380.exedescription pid process target process PID 1996 set thread context of 1964 1996 SecuriteInfo.com.Gen.Variant.Jaik.45760.22297.11380.exe SecuriteInfo.com.Gen.Variant.Jaik.45760.22297.11380.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
SecuriteInfo.com.Gen.Variant.Jaik.45760.22297.11380.exepid process 1964 SecuriteInfo.com.Gen.Variant.Jaik.45760.22297.11380.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
SecuriteInfo.com.Gen.Variant.Jaik.45760.22297.11380.exepid process 1996 SecuriteInfo.com.Gen.Variant.Jaik.45760.22297.11380.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
SecuriteInfo.com.Gen.Variant.Jaik.45760.22297.11380.exedescription pid process target process PID 1996 wrote to memory of 1964 1996 SecuriteInfo.com.Gen.Variant.Jaik.45760.22297.11380.exe SecuriteInfo.com.Gen.Variant.Jaik.45760.22297.11380.exe PID 1996 wrote to memory of 1964 1996 SecuriteInfo.com.Gen.Variant.Jaik.45760.22297.11380.exe SecuriteInfo.com.Gen.Variant.Jaik.45760.22297.11380.exe PID 1996 wrote to memory of 1964 1996 SecuriteInfo.com.Gen.Variant.Jaik.45760.22297.11380.exe SecuriteInfo.com.Gen.Variant.Jaik.45760.22297.11380.exe PID 1996 wrote to memory of 1964 1996 SecuriteInfo.com.Gen.Variant.Jaik.45760.22297.11380.exe SecuriteInfo.com.Gen.Variant.Jaik.45760.22297.11380.exe PID 1996 wrote to memory of 1964 1996 SecuriteInfo.com.Gen.Variant.Jaik.45760.22297.11380.exe SecuriteInfo.com.Gen.Variant.Jaik.45760.22297.11380.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Gen.Variant.Jaik.45760.22297.11380.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Gen.Variant.Jaik.45760.22297.11380.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Gen.Variant.Jaik.45760.22297.11380.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Gen.Variant.Jaik.45760.22297.11380.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1964
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
3d9d6e6ac1aa74a9f893d791c7119b68
SHA11040ff294f2e65b5cecf7bb7651011c1a1b65891
SHA256f5706588a7904db84355bd99792765e174a216a0479daa9d44a7d49f56c516fa
SHA512c55cd85e246fd6d48e3fa31ed7e4ddbd587dc0dce3353c26e01c19823adfe418dfab34f99b9de793088d8c446187f21c04fc84c099de6c52d9df0aaa93d93bb3