Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
10-05-2021 02:01
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Gen.Variant.Androm.29.10561.9603.exe
Resource
win7v20210410
General
-
Target
SecuriteInfo.com.Gen.Variant.Androm.29.10561.9603.exe
-
Size
277KB
-
MD5
1eee31b469afc0350b13b3f5749e7df9
-
SHA1
2469eefb13b89912c0f557390f9c5d56999bd9aa
-
SHA256
78b11874a66b80ec78962b27c352a643d1a11c7f5cf9273f0db06df3f4f7e76c
-
SHA512
55a5bf6f3467dc31ef6aa3e5a60034959d850387c52238c86bb34da0964996e4b9a7d8b1587da9a441b812d8cf5ccd216f0f5da462dbe8ab05583c8d04bacfce
Malware Config
Extracted
formbook
4.1
http://www.knighttechinca.com/dxe/
sardarfarm.com
959tremont.com
privat-livecam.net
ansel-homebakery.com
joysupermarket.com
peninsulamatchmakers.net
northsytyle.com
radioconexaoubermusic.com
relocatingrealtor.com
desyrnan.com
onlinehoortoestel.online
enpointe.online
rvvikings.com
paulpoirier.com
shitarpa.net
kerneis.net
rokitreach.com
essentiallygaia.com
prestiged.net
fuerzaagavera.com
soukid.com
moderndatingcoach.com
mentalfreedom.guru
bullishsoftware.com
sectorulb.com
outletyana.com
fptplaybox.website
artinmemory.com
buyruon.com
ljd.xyz
mondaysmatters.com
spiritsoundart.net
ixiangzu.com
lacompagniadelfardello.com
bnctly.com
sarasvati-yoga.com
0055game.com
lagrangewildliferemoval.com
umlausa.com
chaytel.com
kkkc5.com
union-green.com
philreid4cc.com
theanimehat.com
redlightlegal.com
myaustraliarewards.com
barkinlot.com
mujahidservice.online
nugeneraonline.com
sopplugin.com
makemyroom.design
ferienschweden.com
fps2020dkasphotoop.com
stylezbykay.com
royalpropertiesgurugram.com
birzulova.com
cosmicmtn.com
kissanime.press
poweringprogress.today
omsamedic.com
drunkpoetsociety.com
hostbison.com
asapdecor.com
houseofsisson.com
Signatures
-
Formbook Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1992-64-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Loads dropped DLL 1 IoCs
Processes:
SecuriteInfo.com.Gen.Variant.Androm.29.10561.9603.exepid process 1748 SecuriteInfo.com.Gen.Variant.Androm.29.10561.9603.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
SecuriteInfo.com.Gen.Variant.Androm.29.10561.9603.exedescription pid process target process PID 1748 set thread context of 1992 1748 SecuriteInfo.com.Gen.Variant.Androm.29.10561.9603.exe SecuriteInfo.com.Gen.Variant.Androm.29.10561.9603.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
SecuriteInfo.com.Gen.Variant.Androm.29.10561.9603.exepid process 1992 SecuriteInfo.com.Gen.Variant.Androm.29.10561.9603.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
SecuriteInfo.com.Gen.Variant.Androm.29.10561.9603.exepid process 1748 SecuriteInfo.com.Gen.Variant.Androm.29.10561.9603.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
SecuriteInfo.com.Gen.Variant.Androm.29.10561.9603.exedescription pid process target process PID 1748 wrote to memory of 1992 1748 SecuriteInfo.com.Gen.Variant.Androm.29.10561.9603.exe SecuriteInfo.com.Gen.Variant.Androm.29.10561.9603.exe PID 1748 wrote to memory of 1992 1748 SecuriteInfo.com.Gen.Variant.Androm.29.10561.9603.exe SecuriteInfo.com.Gen.Variant.Androm.29.10561.9603.exe PID 1748 wrote to memory of 1992 1748 SecuriteInfo.com.Gen.Variant.Androm.29.10561.9603.exe SecuriteInfo.com.Gen.Variant.Androm.29.10561.9603.exe PID 1748 wrote to memory of 1992 1748 SecuriteInfo.com.Gen.Variant.Androm.29.10561.9603.exe SecuriteInfo.com.Gen.Variant.Androm.29.10561.9603.exe PID 1748 wrote to memory of 1992 1748 SecuriteInfo.com.Gen.Variant.Androm.29.10561.9603.exe SecuriteInfo.com.Gen.Variant.Androm.29.10561.9603.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Gen.Variant.Androm.29.10561.9603.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Gen.Variant.Androm.29.10561.9603.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Gen.Variant.Androm.29.10561.9603.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Gen.Variant.Androm.29.10561.9603.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1992
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
666d499d9bd488d17f35fcb8ff84a759
SHA1adbc80c2a265a194478a1c9f541c7bc0320500f6
SHA2563e8861ac898a1034a9642d170a1eb496f4d5884f99a7faea6ae8c27385a9d1f1
SHA5127c6505d10ec2427333f8324058d588d2a633406d0cd19d7ec5cc86857a477a3517c54ab1923678a0c3ce5d057b72b8bfd337d3f3d6df45952081d119f7705385