Analysis
-
max time kernel
104s -
max time network
131s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
18-11-2021 09:38
Static task
static1
Behavioral task
behavioral1
Sample
cedc7056c435a629f10a443b40d6a818.exe
Resource
win7-en-20211014
General
-
Target
cedc7056c435a629f10a443b40d6a818.exe
-
Size
335KB
-
MD5
cedc7056c435a629f10a443b40d6a818
-
SHA1
508cf8b71f106c43997358508df7661e7c074776
-
SHA256
0e2e801a0cc0e4257442d1243a17ae2ec7e7057cdb4a41a899d9aec7eb77cfbb
-
SHA512
6552c1c22d4d44a86c8898a189abdd0975d7a7e4106ff4bf604f0a716071464595994b3cba4273e3fe7c496b7109993eced616caf566d633798afa02366ba07e
Malware Config
Extracted
formbook
4.1
jy0b
http://www.filecrev.com/jy0b/
lamejorimagen.com
mykabukibrush.com
modgon.com
barefoottherapeutics.com
shimpeg.net
trade-sniper.com
chiangkhancityhotel.com
joblessmoni.club
stespritsubways.com
chico-group.com
nni8.xyz
searchtypically.online
jobsyork.com
bestsales-crypto.com
iqmarketing.info
bullcityphotobooths.com
fwssc.icu
1oc87s.icu
usdiesel.xyz
secrets2optimumnutrition.com
charlotte-s-creations.com
homenetmidrand.com
sytypij.xyz
tapehitsscriptsparty.com
adelenashville.com
greendylife.com
agbqs.com
lilcrox.xyz
thepersonalevolutionmaven.com
graciasmiangel.com
heidisgifts.com
flchimneyspecialists.com
yorkrehabclinic.com
cent-pour-centsons.com
marcoislandsupsurf.net
expressdiagnostics.info
surferjackproductions.com
duscopy.store
uekra.tech
campaigncupgunplant.xyz
cheetahadvance.com
blickosinski.icu
laketacostahoe.com
drippysupplyco.com
isomassagegun.com
clarition.com
andrew-pillar.com
truthbudgeting.com
cloudfixr.com
cfasministries.com
compliant-now-beta.com
kssc17.icu
plewabuilders.com
uslugi-email.site
167hours.com
sodo6697.com
voyagesify.com
ranodalei.com
culturao.com
littlepotato-id.com
integtiryhvacsanmateo.com
neatmounts.com
reddictnflstream.com
digistore-maya.com
Signatures
-
Formbook Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3308-119-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/3308-120-0x000000000041F150-mapping.dmp formbook -
Loads dropped DLL 1 IoCs
Processes:
cedc7056c435a629f10a443b40d6a818.exepid process 3452 cedc7056c435a629f10a443b40d6a818.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
cedc7056c435a629f10a443b40d6a818.exedescription pid process target process PID 3452 set thread context of 3308 3452 cedc7056c435a629f10a443b40d6a818.exe cedc7056c435a629f10a443b40d6a818.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
cedc7056c435a629f10a443b40d6a818.exepid process 3308 cedc7056c435a629f10a443b40d6a818.exe 3308 cedc7056c435a629f10a443b40d6a818.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
cedc7056c435a629f10a443b40d6a818.exedescription pid process target process PID 3452 wrote to memory of 3308 3452 cedc7056c435a629f10a443b40d6a818.exe cedc7056c435a629f10a443b40d6a818.exe PID 3452 wrote to memory of 3308 3452 cedc7056c435a629f10a443b40d6a818.exe cedc7056c435a629f10a443b40d6a818.exe PID 3452 wrote to memory of 3308 3452 cedc7056c435a629f10a443b40d6a818.exe cedc7056c435a629f10a443b40d6a818.exe PID 3452 wrote to memory of 3308 3452 cedc7056c435a629f10a443b40d6a818.exe cedc7056c435a629f10a443b40d6a818.exe PID 3452 wrote to memory of 3308 3452 cedc7056c435a629f10a443b40d6a818.exe cedc7056c435a629f10a443b40d6a818.exe PID 3452 wrote to memory of 3308 3452 cedc7056c435a629f10a443b40d6a818.exe cedc7056c435a629f10a443b40d6a818.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cedc7056c435a629f10a443b40d6a818.exe"C:\Users\Admin\AppData\Local\Temp\cedc7056c435a629f10a443b40d6a818.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\cedc7056c435a629f10a443b40d6a818.exe"C:\Users\Admin\AppData\Local\Temp\cedc7056c435a629f10a443b40d6a818.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\nsoCC4B.tmp\ftbtjrox.dllMD5
9a46adb3491e5a39fd31dee94647cabf
SHA1c54d21a0afa947c16f112d3f5f4df66de37dfd25
SHA256bc2323a8dbf4bbe8bf23261359fe3fdb786d78fd0da538e8541ad35edb3dbdbf
SHA512b2034699dcaacd8ae9283d1e28f8ba2165412b7d0c1a8af94ae72637a5c7c3363f74fc8dfa6256ec592eb62ac362a1aa3a143f444b9d3bf62a1b162edf3e953a
-
memory/3308-119-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/3308-120-0x000000000041F150-mapping.dmp
-
memory/3308-121-0x00000000009D0000-0x0000000000CF0000-memory.dmpFilesize
3.1MB