Analysis
-
max time kernel
147s -
max time network
138s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
10-05-2021 21:14
Static task
static1
Behavioral task
behavioral1
Sample
MSIC170.exe
Resource
win7v20210408
General
-
Target
MSIC170.exe
-
Size
226KB
-
MD5
2eb5d3ef129f1a260919b4af6911a228
-
SHA1
5abb21082895b7d7d2a454b3a8080d4779a2ed5c
-
SHA256
d348cbf91ed1e466a286b17f93bf3fd27bb01de6ba91c76bf586788bf16876cb
-
SHA512
9c200d65f35cd6148897ca19d92563c1210abfb614e21d7f0afb749daee1b690e892ae5867d90b8ca69c77fc6b71d57325cb9f04e9c79917477537f5a8a8da5a
Malware Config
Extracted
formbook
4.1
http://www.craftsman-vail.com/cca/
whenpigsflyhigh.com
artistiklounge.com
tinytrendstique.com
projektpartner-ag.com
charvelevh.com
easycompliances.net
zengheqiye.com
professionalmallorca.com
bonzerstudio.com
nelivo.com
yangxeric.com
aredntech.com
twincitieshousingmarket.com
allshadesunscreen.com
xiang-life.net
qmcp00011.com
lindsayeandmarkv.com
fbcsbvsbvsjbvjs.com
saveonthrivelife.com
newdpo.com
raazjewellers.com
sangsterdesign.com
thedatdaiquiris.com
uljanarattel.com
daebak.cloud
hurricanekickgg.com
mercadilloartisanalfoods.com
salahdinortho.com
thisislandonbraverman.com
siliconesampler.com
youxiaoke.online
trucity.net
mychicpartyboutique.com
adsvestglobal.com
lidoshoreslistings.info
mexicoaprende.online
4-2ararinost.com
kevinberginlbi.com
vaudqa.com
alignedenergetics.info
conmielyconhiel.com
urweddingsite.com
angelshead.com
renejewels.com
sim201.com
fkdjjkdjkrefefe.com
thecontentchicks.com
sarikayalar.net
herspacephilly.com
fortwayneduiattorney.com
vallejocardealers.com
gmworldservice.com
mybuddyryde.net
zeneanyasbyerika.com
downloadhs.com
hernonymous.com
suu6.com
xuehuasa.ltd
miacting.com
thefreedomenvelope.com
yihuisq.net
steamshipautjority.com
lowcarblovefnp.com
knm.xyz
Signatures
-
Formbook Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2020-64-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/1920-72-0x0000000000090000-0x00000000000BE000-memory.dmp formbook -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 568 cmd.exe -
Loads dropped DLL 1 IoCs
Processes:
MSIC170.exepid process 736 MSIC170.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
MSIC170.exeMSIC170.execmstp.exedescription pid process target process PID 736 set thread context of 2020 736 MSIC170.exe MSIC170.exe PID 2020 set thread context of 1204 2020 MSIC170.exe Explorer.EXE PID 1920 set thread context of 1204 1920 cmstp.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 30 IoCs
Processes:
MSIC170.execmstp.exepid process 2020 MSIC170.exe 2020 MSIC170.exe 1920 cmstp.exe 1920 cmstp.exe 1920 cmstp.exe 1920 cmstp.exe 1920 cmstp.exe 1920 cmstp.exe 1920 cmstp.exe 1920 cmstp.exe 1920 cmstp.exe 1920 cmstp.exe 1920 cmstp.exe 1920 cmstp.exe 1920 cmstp.exe 1920 cmstp.exe 1920 cmstp.exe 1920 cmstp.exe 1920 cmstp.exe 1920 cmstp.exe 1920 cmstp.exe 1920 cmstp.exe 1920 cmstp.exe 1920 cmstp.exe 1920 cmstp.exe 1920 cmstp.exe 1920 cmstp.exe 1920 cmstp.exe 1920 cmstp.exe 1920 cmstp.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 1204 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
MSIC170.exeMSIC170.execmstp.exepid process 736 MSIC170.exe 2020 MSIC170.exe 2020 MSIC170.exe 2020 MSIC170.exe 1920 cmstp.exe 1920 cmstp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
MSIC170.execmstp.exedescription pid process Token: SeDebugPrivilege 2020 MSIC170.exe Token: SeDebugPrivilege 1920 cmstp.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
Explorer.EXEpid process 1204 Explorer.EXE 1204 Explorer.EXE 1204 Explorer.EXE 1204 Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
Explorer.EXEpid process 1204 Explorer.EXE 1204 Explorer.EXE 1204 Explorer.EXE 1204 Explorer.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
MSIC170.exeExplorer.EXEcmstp.exedescription pid process target process PID 736 wrote to memory of 2020 736 MSIC170.exe MSIC170.exe PID 736 wrote to memory of 2020 736 MSIC170.exe MSIC170.exe PID 736 wrote to memory of 2020 736 MSIC170.exe MSIC170.exe PID 736 wrote to memory of 2020 736 MSIC170.exe MSIC170.exe PID 736 wrote to memory of 2020 736 MSIC170.exe MSIC170.exe PID 1204 wrote to memory of 1920 1204 Explorer.EXE cmstp.exe PID 1204 wrote to memory of 1920 1204 Explorer.EXE cmstp.exe PID 1204 wrote to memory of 1920 1204 Explorer.EXE cmstp.exe PID 1204 wrote to memory of 1920 1204 Explorer.EXE cmstp.exe PID 1204 wrote to memory of 1920 1204 Explorer.EXE cmstp.exe PID 1204 wrote to memory of 1920 1204 Explorer.EXE cmstp.exe PID 1204 wrote to memory of 1920 1204 Explorer.EXE cmstp.exe PID 1920 wrote to memory of 568 1920 cmstp.exe cmd.exe PID 1920 wrote to memory of 568 1920 cmstp.exe cmd.exe PID 1920 wrote to memory of 568 1920 cmstp.exe cmd.exe PID 1920 wrote to memory of 568 1920 cmstp.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\MSIC170.exe"C:\Users\Admin\AppData\Local\Temp\MSIC170.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Users\Admin\AppData\Local\Temp\MSIC170.exe"C:\Users\Admin\AppData\Local\Temp\MSIC170.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2020
-
-
-
C:\Windows\SysWOW64\cmstp.exe"C:\Windows\SysWOW64\cmstp.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\MSIC170.exe"3⤵
- Deletes itself
PID:568
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
e2552ee6ee0b13489230453d6ef860f3
SHA1043969b1a93aa5c30cced7b59f305c0f264f3c15
SHA256977f2af0e86ce5aa922ae960a24284f199c46152db8664cf8f0b004b96df87d3
SHA5125d2c7001c5529e35ef001d617a206c85200cfd5f51b1ec406a6ecc2cd94e3eff3760f9fb808b4c033240e754501b228f9c79811c1ebad881ccbe9403bd686920