Analysis
-
max time kernel
150s -
max time network
144s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
26-07-2021 05:59
Static task
static1
Behavioral task
behavioral1
Sample
RFQ_Cicor_012.exe
Resource
win7v20210410
General
-
Target
RFQ_Cicor_012.exe
-
Size
968KB
-
MD5
27b5fcbd6865ea65fe7840f2557ae1de
-
SHA1
42ded4a3e5e2e21b1f596aae2174389ea29d255c
-
SHA256
36533f5c6cd7b6cf7e1c4cdfce1b185a9059a7fb0cc98ad1fdcbf11b54bb9fda
-
SHA512
a573affcbfbd1e82f106f0f6b36fa4dd7d27f29a513f5476ef1c9d44fb27b577203e29142dde17d4843a5fc4417d4c47b855f0a60f73d37b0ec5f44c920c3ebf
Malware Config
Extracted
formbook
4.1
http://www.radissonhotelsusa.com/cp5/
glcpunix.com
marabierta-coaching.com
osrs-remastered.com
lineagehealthxwellness.com
dunyadagezilecekyerler.com
negociosyfinanzasfaciles.com
bifa510.com
houseofutamasa.com
dopeneeds.com
sailacc.com
thewindgallery.com
elvinrisky.com
flowersassistedliving.com
lzbnwy.com
mrpentester.com
joinmytradingteam.com
jasabuatvisa.com
meherunnessa-foundation.com
notyourtypicaljocks.com
lobo-sports.com
nails-of-art.com
skinatoms.com
huadijc.com
elegantligting.com
zwasperr.com
401ne19thstapt51.com
semedburiti.com
andieweb.com
best20hookups.com
planttan.com
entrenamientoenequilibrio.com
newsecho.net
cocktailcrates.com
gurumedicalsupplies.com
legaca.trade
carscompetition.com
disloc.net
hsupi.com
s-sgasia.com
dictuse.xyz
vayocart.com
boxedhawaii.com
wateryourlandscape.com
countrytouring.com
shifamedico.com
gdhymc.com
sessionsup.com
viettellongxuyen.com
shindeconstruction.com
theautocareshop.com
maxwellgolf.com
hongdajunheng.com
mwakossolutions.com
fabulashpro.com
sklsdcollege.com
sensualblogs.com
gtainsinde.com
nehyam.com
itool.group
noblehare.com
amylaib.com
photosbylanie.com
palmoiltech.com
harrypotterwithguna.com
Signatures
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/3688-126-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/3688-127-0x000000000041EBF0-mapping.dmp formbook behavioral2/memory/3984-133-0x00000000001B0000-0x00000000001DE000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
Processes:
RFQ_Cicor_012.exeRFQ_Cicor_012.execscript.exedescription pid process target process PID 656 set thread context of 3688 656 RFQ_Cicor_012.exe RFQ_Cicor_012.exe PID 3688 set thread context of 3020 3688 RFQ_Cicor_012.exe Explorer.EXE PID 3984 set thread context of 3020 3984 cscript.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 39 IoCs
Processes:
RFQ_Cicor_012.exeRFQ_Cicor_012.execscript.exepid process 656 RFQ_Cicor_012.exe 3688 RFQ_Cicor_012.exe 3688 RFQ_Cicor_012.exe 3688 RFQ_Cicor_012.exe 3688 RFQ_Cicor_012.exe 3984 cscript.exe 3984 cscript.exe 3984 cscript.exe 3984 cscript.exe 3984 cscript.exe 3984 cscript.exe 3984 cscript.exe 3984 cscript.exe 3984 cscript.exe 3984 cscript.exe 3984 cscript.exe 3984 cscript.exe 3984 cscript.exe 3984 cscript.exe 3984 cscript.exe 3984 cscript.exe 3984 cscript.exe 3984 cscript.exe 3984 cscript.exe 3984 cscript.exe 3984 cscript.exe 3984 cscript.exe 3984 cscript.exe 3984 cscript.exe 3984 cscript.exe 3984 cscript.exe 3984 cscript.exe 3984 cscript.exe 3984 cscript.exe 3984 cscript.exe 3984 cscript.exe 3984 cscript.exe 3984 cscript.exe 3984 cscript.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3020 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
RFQ_Cicor_012.execscript.exepid process 3688 RFQ_Cicor_012.exe 3688 RFQ_Cicor_012.exe 3688 RFQ_Cicor_012.exe 3984 cscript.exe 3984 cscript.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
RFQ_Cicor_012.exeRFQ_Cicor_012.execscript.exedescription pid process Token: SeDebugPrivilege 656 RFQ_Cicor_012.exe Token: SeDebugPrivilege 3688 RFQ_Cicor_012.exe Token: SeDebugPrivilege 3984 cscript.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid process 3020 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
RFQ_Cicor_012.exeExplorer.EXEcscript.exedescription pid process target process PID 656 wrote to memory of 3940 656 RFQ_Cicor_012.exe schtasks.exe PID 656 wrote to memory of 3940 656 RFQ_Cicor_012.exe schtasks.exe PID 656 wrote to memory of 3940 656 RFQ_Cicor_012.exe schtasks.exe PID 656 wrote to memory of 3688 656 RFQ_Cicor_012.exe RFQ_Cicor_012.exe PID 656 wrote to memory of 3688 656 RFQ_Cicor_012.exe RFQ_Cicor_012.exe PID 656 wrote to memory of 3688 656 RFQ_Cicor_012.exe RFQ_Cicor_012.exe PID 656 wrote to memory of 3688 656 RFQ_Cicor_012.exe RFQ_Cicor_012.exe PID 656 wrote to memory of 3688 656 RFQ_Cicor_012.exe RFQ_Cicor_012.exe PID 656 wrote to memory of 3688 656 RFQ_Cicor_012.exe RFQ_Cicor_012.exe PID 3020 wrote to memory of 3984 3020 Explorer.EXE cscript.exe PID 3020 wrote to memory of 3984 3020 Explorer.EXE cscript.exe PID 3020 wrote to memory of 3984 3020 Explorer.EXE cscript.exe PID 3984 wrote to memory of 3876 3984 cscript.exe cmd.exe PID 3984 wrote to memory of 3876 3984 cscript.exe cmd.exe PID 3984 wrote to memory of 3876 3984 cscript.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\RFQ_Cicor_012.exe"C:\Users\Admin\AppData\Local\Temp\RFQ_Cicor_012.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\okSIfG" /XML "C:\Users\Admin\AppData\Local\Temp\tmp44CA.tmp"3⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\RFQ_Cicor_012.exe"C:\Users\Admin\AppData\Local\Temp\RFQ_Cicor_012.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cscript.exe"C:\Windows\SysWOW64\cscript.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\RFQ_Cicor_012.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp44CA.tmpMD5
3042dd1a1bedb553cf426b517bb81fd0
SHA1f7570c43a96bffbce452cf8bf1a72fd73db8af94
SHA2565793f49a45a839dcc890addaa36f07c93d5ddb95cb6d3c850d329a62fae6a0c9
SHA5129f5fb03900353c9ca25623f53538d79b9cbcf8915a88957d373262901518c02a9334fef6bc0ab8129550ef1dda7183c370397c2392fcefdbd1293aedbc163d34
-
memory/656-120-0x0000000003300000-0x0000000003301000-memory.dmpFilesize
4KB
-
memory/656-118-0x0000000005960000-0x0000000005961000-memory.dmpFilesize
4KB
-
memory/656-117-0x0000000005E60000-0x0000000005E61000-memory.dmpFilesize
4KB
-
memory/656-119-0x0000000005960000-0x0000000005E5E000-memory.dmpFilesize
5.0MB
-
memory/656-114-0x0000000000EF0000-0x0000000000EF1000-memory.dmpFilesize
4KB
-
memory/656-121-0x0000000005AC0000-0x0000000005AC1000-memory.dmpFilesize
4KB
-
memory/656-122-0x0000000005B20000-0x0000000005B43000-memory.dmpFilesize
140KB
-
memory/656-123-0x00000000066E0000-0x000000000674D000-memory.dmpFilesize
436KB
-
memory/656-116-0x00000000058C0000-0x00000000058C1000-memory.dmpFilesize
4KB
-
memory/3020-137-0x0000000006530000-0x0000000006636000-memory.dmpFilesize
1.0MB
-
memory/3020-130-0x0000000005EC0000-0x000000000602A000-memory.dmpFilesize
1.4MB
-
memory/3688-127-0x000000000041EBF0-mapping.dmp
-
memory/3688-126-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/3688-128-0x00000000013A0000-0x00000000016C0000-memory.dmpFilesize
3.1MB
-
memory/3688-129-0x00000000016E0000-0x00000000016F4000-memory.dmpFilesize
80KB
-
memory/3876-134-0x0000000000000000-mapping.dmp
-
memory/3940-124-0x0000000000000000-mapping.dmp
-
memory/3984-133-0x00000000001B0000-0x00000000001DE000-memory.dmpFilesize
184KB
-
memory/3984-132-0x0000000000BC0000-0x0000000000BE7000-memory.dmpFilesize
156KB
-
memory/3984-135-0x0000000004720000-0x0000000004A40000-memory.dmpFilesize
3.1MB
-
memory/3984-136-0x00000000045A0000-0x0000000004633000-memory.dmpFilesize
588KB
-
memory/3984-131-0x0000000000000000-mapping.dmp