Analysis
-
max time kernel
148s -
max time network
142s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
07-05-2021 12:06
Static task
static1
Behavioral task
behavioral1
Sample
RFQ-2176 NEW PROJECT QUOTATION MAY.exe
Resource
win7v20210410
General
-
Target
RFQ-2176 NEW PROJECT QUOTATION MAY.exe
-
Size
664KB
-
MD5
e635ebf84417ed9ed97d4516de0cdaba
-
SHA1
33716297dd627e23010332c9fefd443447aeb47b
-
SHA256
cb0386454b283917d742dc6833ef4d7f5aaeeb5cd92acf9d54bb495752cdcda6
-
SHA512
e8ceacf9fcb559776237ba2de9518ee557ba8a073820403d59fa1f592c5047d349897003b304f3ee53c075413d7eebbd3a5c962dcf1b3d71f14c642fd4f8c5da
Malware Config
Extracted
formbook
4.1
http://www.royalelectricvehicle.com/m8uk/
blackcountryteshirts.com
pioneergeoscience.com
calacciwedding.com
theelegantdoorbow.com
graciosera.com
kwikversity.com
izita.xyz
drivewiththebest.co.uk
kakback.xyz
sachascott.net
lifeenterprisesystems.com
interimgirl.com
myviralplatform.com
spainmatrimony.com
supergenx.com
leglehla.icu
otlhswdok.icu
1stfdsqnre.com
xxxcentral.net
movimentare.com
chinafccs.com
dreamcodehosting.com
caffinaticscoffeeco.com
lange-global.com
ashtondrakr.com
yourproductmarketfit.com
juxrams.info
sportsapiens.com
mute.codes
plyedpiper.com
feel-the-glam.com
heigad.space
chanelbaghandbagss.com
yuzhuolabel.com
bymycamera.com
fcmalzeme.com
alnajammart.com
chocolatejerky.com
confusedframe.com
trufflesales.com
dxbj189.com
bboujeehair.com
freehdmovies.club
12dying.com
globalnetworkersacademy.com
notablescumbags.com
timnuwin.com
tampahemorrhoidclinic.com
hngxqwozw.icu
eshoplabo.com
britishlanguagecollege.com
eld-sarl-btp.com
sdfweee.com
sihe08.com
myvipshirt.com
ruthenfamilyoffice.com
majesticapparelprints.com
lunaraxe.com
nvect.com
ladyandoscar.com
lenacleaningandflooring.com
outfoxstudios.net
themmbcollection.com
provide-republic.xyz
Signatures
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/612-67-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/612-68-0x000000000041ED10-mapping.dmp formbook behavioral1/memory/1216-76-0x0000000000080000-0x00000000000AE000-memory.dmp formbook -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1516 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
RFQ-2176 NEW PROJECT QUOTATION MAY.exeRFQ-2176 NEW PROJECT QUOTATION MAY.exenetsh.exedescription pid process target process PID 484 set thread context of 612 484 RFQ-2176 NEW PROJECT QUOTATION MAY.exe RFQ-2176 NEW PROJECT QUOTATION MAY.exe PID 612 set thread context of 1288 612 RFQ-2176 NEW PROJECT QUOTATION MAY.exe Explorer.EXE PID 1216 set thread context of 1288 1216 netsh.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
RFQ-2176 NEW PROJECT QUOTATION MAY.exenetsh.exepid process 612 RFQ-2176 NEW PROJECT QUOTATION MAY.exe 612 RFQ-2176 NEW PROJECT QUOTATION MAY.exe 1216 netsh.exe 1216 netsh.exe 1216 netsh.exe 1216 netsh.exe 1216 netsh.exe 1216 netsh.exe 1216 netsh.exe 1216 netsh.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
RFQ-2176 NEW PROJECT QUOTATION MAY.exenetsh.exepid process 612 RFQ-2176 NEW PROJECT QUOTATION MAY.exe 612 RFQ-2176 NEW PROJECT QUOTATION MAY.exe 612 RFQ-2176 NEW PROJECT QUOTATION MAY.exe 1216 netsh.exe 1216 netsh.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
RFQ-2176 NEW PROJECT QUOTATION MAY.exenetsh.exedescription pid process Token: SeDebugPrivilege 612 RFQ-2176 NEW PROJECT QUOTATION MAY.exe Token: SeDebugPrivilege 1216 netsh.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
RFQ-2176 NEW PROJECT QUOTATION MAY.exeExplorer.EXEnetsh.exedescription pid process target process PID 484 wrote to memory of 332 484 RFQ-2176 NEW PROJECT QUOTATION MAY.exe schtasks.exe PID 484 wrote to memory of 332 484 RFQ-2176 NEW PROJECT QUOTATION MAY.exe schtasks.exe PID 484 wrote to memory of 332 484 RFQ-2176 NEW PROJECT QUOTATION MAY.exe schtasks.exe PID 484 wrote to memory of 332 484 RFQ-2176 NEW PROJECT QUOTATION MAY.exe schtasks.exe PID 484 wrote to memory of 612 484 RFQ-2176 NEW PROJECT QUOTATION MAY.exe RFQ-2176 NEW PROJECT QUOTATION MAY.exe PID 484 wrote to memory of 612 484 RFQ-2176 NEW PROJECT QUOTATION MAY.exe RFQ-2176 NEW PROJECT QUOTATION MAY.exe PID 484 wrote to memory of 612 484 RFQ-2176 NEW PROJECT QUOTATION MAY.exe RFQ-2176 NEW PROJECT QUOTATION MAY.exe PID 484 wrote to memory of 612 484 RFQ-2176 NEW PROJECT QUOTATION MAY.exe RFQ-2176 NEW PROJECT QUOTATION MAY.exe PID 484 wrote to memory of 612 484 RFQ-2176 NEW PROJECT QUOTATION MAY.exe RFQ-2176 NEW PROJECT QUOTATION MAY.exe PID 484 wrote to memory of 612 484 RFQ-2176 NEW PROJECT QUOTATION MAY.exe RFQ-2176 NEW PROJECT QUOTATION MAY.exe PID 484 wrote to memory of 612 484 RFQ-2176 NEW PROJECT QUOTATION MAY.exe RFQ-2176 NEW PROJECT QUOTATION MAY.exe PID 1288 wrote to memory of 1216 1288 Explorer.EXE netsh.exe PID 1288 wrote to memory of 1216 1288 Explorer.EXE netsh.exe PID 1288 wrote to memory of 1216 1288 Explorer.EXE netsh.exe PID 1288 wrote to memory of 1216 1288 Explorer.EXE netsh.exe PID 1216 wrote to memory of 1516 1216 netsh.exe cmd.exe PID 1216 wrote to memory of 1516 1216 netsh.exe cmd.exe PID 1216 wrote to memory of 1516 1216 netsh.exe cmd.exe PID 1216 wrote to memory of 1516 1216 netsh.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\RFQ-2176 NEW PROJECT QUOTATION MAY.exe"C:\Users\Admin\AppData\Local\Temp\RFQ-2176 NEW PROJECT QUOTATION MAY.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\pqaJglPNgqcbj" /XML "C:\Users\Admin\AppData\Local\Temp\tmpBA79.tmp"3⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\RFQ-2176 NEW PROJECT QUOTATION MAY.exe"C:\Users\Admin\AppData\Local\Temp\RFQ-2176 NEW PROJECT QUOTATION MAY.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\SysWOW64\netsh.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\RFQ-2176 NEW PROJECT QUOTATION MAY.exe"3⤵
- Deletes itself
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmpBA79.tmpMD5
0b7e50a46f1d14ada16dac76c851f4eb
SHA1524bc709e9f640a06e0af12755c76712a92cb332
SHA256626035e20df57faae12648d3d67c93af174d26fa93360ee9c37729d0743e9d97
SHA512542f5b215635b7df7dd1558ecda07678f15dab1cb8123dedf3f6c5e1c42a2ebe095b9bd65718311565c63adeebbf260540c4917dc9c8be2ec2ad52ed5779a643
-
memory/332-65-0x0000000000000000-mapping.dmp
-
memory/484-59-0x0000000000D90000-0x0000000000D91000-memory.dmpFilesize
4KB
-
memory/484-61-0x0000000004370000-0x0000000004371000-memory.dmpFilesize
4KB
-
memory/484-62-0x00000000002F0000-0x00000000002FE000-memory.dmpFilesize
56KB
-
memory/484-63-0x00000000050B0000-0x0000000005142000-memory.dmpFilesize
584KB
-
memory/484-64-0x0000000000BA0000-0x0000000000BF0000-memory.dmpFilesize
320KB
-
memory/612-68-0x000000000041ED10-mapping.dmp
-
memory/612-67-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/612-70-0x00000000009E0000-0x0000000000CE3000-memory.dmpFilesize
3.0MB
-
memory/612-71-0x0000000000140000-0x0000000000154000-memory.dmpFilesize
80KB
-
memory/1216-73-0x0000000000000000-mapping.dmp
-
memory/1216-75-0x00000000016D0000-0x00000000016EB000-memory.dmpFilesize
108KB
-
memory/1216-76-0x0000000000080000-0x00000000000AE000-memory.dmpFilesize
184KB
-
memory/1216-77-0x0000000000AC0000-0x0000000000DC3000-memory.dmpFilesize
3.0MB
-
memory/1216-78-0x00000000009C0000-0x0000000000A53000-memory.dmpFilesize
588KB
-
memory/1288-72-0x00000000064A0000-0x0000000006630000-memory.dmpFilesize
1.6MB
-
memory/1288-79-0x0000000003BD0000-0x0000000003C79000-memory.dmpFilesize
676KB
-
memory/1516-74-0x0000000000000000-mapping.dmp