Analysis
-
max time kernel
151s -
max time network
140s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
30-09-2021 17:25
Static task
static1
Behavioral task
behavioral1
Sample
rocviud123.exe
Resource
win7v20210408
General
-
Target
rocviud123.exe
-
Size
254KB
-
MD5
9bb0511e947ca2a8ce34153f1b76400a
-
SHA1
311b128e5ef3995c04a754679237b778e85e7203
-
SHA256
90661f85c7864f95181eceebf32eafd0b4b166aebdfdf5529edfc3a3dd6c0715
-
SHA512
9741900e30ae1afee32dad16aceb55a98826be07d946a2d5a8dde8baeb5ad5a91ae9303b51f2a17d334c9335c63932f323f08102f9dbf287145f81c13f8a2bbf
Malware Config
Extracted
formbook
4.1
rv9n
http://www.cjspizza.net/rv9n/
olivia-grace.show
zhuwww.com
keiretsu.xyz
olidnh.space
searuleansec.com
2fastrepair.com
brooklynmetalroof.com
scodol.com
novaprint.pro
the-loaner.com
nextroundscap.com
zbwlggs.com
internetautodealer.com
xn--tornrealestate-ekb.com
yunjiuhuo.com
skandinaviskakryptobanken.com
coxivarag.rest
ophthalmologylab.com
zzzzgjcdbqnn98.net
doeful.com
beatthebank.fund
deposit-pulsa2021.xyz
uptownsecuritysystems.com
thegroveonglendale.com
destinationth.com
healthcareuninsured.com
longhang.xyz
ypxwwxjqcqhutyp.com
ip-15-235-90.net
rancholachiquita.com
macblog.xyz
skillsbazar.com
beatyup.com
academiapinto.com
myguagua.com
fto8y.com
ohioleads.net
paravocebrasil.com
thecanyonmanor.com
acu-bps.com
comunicaretresessanta.net
schwa-bingcorp.com
discountcouponcodes-jp.space
kufazo.online
metaverge.club
800car.online
brendanbaehr.com
garfieldtoken.net
secretfoldr.com
13itcasino.com
marketingatelier.net
computersslide.com
marcastudios.com
thestreetsoflondon.life
maintaintest.com
cronicasdebia.com
apm-app.com
sepulchral.xyz
lodha-project.com
theartofsoulwork.com
swimminglessonsshop.com
klarnabet.com
control-of-space.net
heliumathletic.com
Signatures
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/984-62-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/984-63-0x000000000041F120-mapping.dmp formbook behavioral1/memory/1660-70-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1904 cmd.exe -
Loads dropped DLL 1 IoCs
Processes:
rocviud123.exepid process 1304 rocviud123.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
rocviud123.exerocviud123.execmmon32.exedescription pid process target process PID 1304 set thread context of 984 1304 rocviud123.exe rocviud123.exe PID 984 set thread context of 1196 984 rocviud123.exe Explorer.EXE PID 1660 set thread context of 1196 1660 cmmon32.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 31 IoCs
Processes:
rocviud123.execmmon32.exepid process 984 rocviud123.exe 984 rocviud123.exe 1660 cmmon32.exe 1660 cmmon32.exe 1660 cmmon32.exe 1660 cmmon32.exe 1660 cmmon32.exe 1660 cmmon32.exe 1660 cmmon32.exe 1660 cmmon32.exe 1660 cmmon32.exe 1660 cmmon32.exe 1660 cmmon32.exe 1660 cmmon32.exe 1660 cmmon32.exe 1660 cmmon32.exe 1660 cmmon32.exe 1660 cmmon32.exe 1660 cmmon32.exe 1660 cmmon32.exe 1660 cmmon32.exe 1660 cmmon32.exe 1660 cmmon32.exe 1660 cmmon32.exe 1660 cmmon32.exe 1660 cmmon32.exe 1660 cmmon32.exe 1660 cmmon32.exe 1660 cmmon32.exe 1660 cmmon32.exe 1660 cmmon32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 1196 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
rocviud123.execmmon32.exepid process 984 rocviud123.exe 984 rocviud123.exe 984 rocviud123.exe 1660 cmmon32.exe 1660 cmmon32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
rocviud123.execmmon32.exedescription pid process Token: SeDebugPrivilege 984 rocviud123.exe Token: SeDebugPrivilege 1660 cmmon32.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
Processes:
Explorer.EXEpid process 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
Explorer.EXEpid process 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE 1196 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
rocviud123.exeExplorer.EXEcmmon32.exedescription pid process target process PID 1304 wrote to memory of 984 1304 rocviud123.exe rocviud123.exe PID 1304 wrote to memory of 984 1304 rocviud123.exe rocviud123.exe PID 1304 wrote to memory of 984 1304 rocviud123.exe rocviud123.exe PID 1304 wrote to memory of 984 1304 rocviud123.exe rocviud123.exe PID 1304 wrote to memory of 984 1304 rocviud123.exe rocviud123.exe PID 1304 wrote to memory of 984 1304 rocviud123.exe rocviud123.exe PID 1304 wrote to memory of 984 1304 rocviud123.exe rocviud123.exe PID 1196 wrote to memory of 1660 1196 Explorer.EXE cmmon32.exe PID 1196 wrote to memory of 1660 1196 Explorer.EXE cmmon32.exe PID 1196 wrote to memory of 1660 1196 Explorer.EXE cmmon32.exe PID 1196 wrote to memory of 1660 1196 Explorer.EXE cmmon32.exe PID 1660 wrote to memory of 1904 1660 cmmon32.exe cmd.exe PID 1660 wrote to memory of 1904 1660 cmmon32.exe cmd.exe PID 1660 wrote to memory of 1904 1660 cmmon32.exe cmd.exe PID 1660 wrote to memory of 1904 1660 cmmon32.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\rocviud123.exe"C:\Users\Admin\AppData\Local\Temp\rocviud123.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\rocviud123.exe"C:\Users\Admin\AppData\Local\Temp\rocviud123.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmmon32.exe"C:\Windows\SysWOW64\cmmon32.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\rocviud123.exe"3⤵
- Deletes itself
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\nsf4588.tmp\sapoqnmyo.dllMD5
877d8bff6420ad9e9a3c2f8b443e78bc
SHA12b30780849a48aeb353d02eaa3e2a53492c5035f
SHA2565c6ed2bf2593fe951107cb6eb64eb8064b768194c3ff32ef02a76c43810ae5e8
SHA51235091c2b43094df03c33e3b6eb87f2817dffab50dd0aa0259b722509ec54e7bc3c9c60379082e880c32d199c3fc6afe142684845479c18483c4ac2e12a9de0ee
-
memory/984-65-0x0000000000340000-0x0000000000354000-memory.dmpFilesize
80KB
-
memory/984-62-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/984-63-0x000000000041F120-mapping.dmp
-
memory/984-64-0x0000000000890000-0x0000000000B93000-memory.dmpFilesize
3.0MB
-
memory/1196-66-0x0000000006D20000-0x0000000006E8F000-memory.dmpFilesize
1.4MB
-
memory/1196-73-0x0000000007170000-0x00000000072C4000-memory.dmpFilesize
1.3MB
-
memory/1196-74-0x0000000003A30000-0x0000000003A40000-memory.dmpFilesize
64KB
-
memory/1304-60-0x0000000075AD1000-0x0000000075AD3000-memory.dmpFilesize
8KB
-
memory/1660-67-0x0000000000000000-mapping.dmp
-
memory/1660-71-0x0000000001F20000-0x0000000002223000-memory.dmpFilesize
3.0MB
-
memory/1660-70-0x0000000000080000-0x00000000000AF000-memory.dmpFilesize
188KB
-
memory/1660-69-0x0000000000980000-0x000000000098D000-memory.dmpFilesize
52KB
-
memory/1660-72-0x0000000001D90000-0x0000000001E23000-memory.dmpFilesize
588KB
-
memory/1904-68-0x0000000000000000-mapping.dmp