Analysis
-
max time kernel
149s -
max time network
142s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
22-11-2021 12:06
Static task
static1
Behavioral task
behavioral1
Sample
Order form.exe
Resource
win7-en-20211104
General
-
Target
Order form.exe
-
Size
504KB
-
MD5
d4d2f0959d0b9197e2bc86880c543a92
-
SHA1
73823ab2066e8b461ad5b20575b64e6ca0b04640
-
SHA256
4fcbb9ac5129df9ecf9aac331df477a647d2a8c7081b73f2d27aef62d1a6cbaa
-
SHA512
fe5e2466b81462ef1df7ac62383f62e55675364d29ecd6f1db93def8bf1b6e21fdcf9adc45c2c134e1443314ad81c54941bfaf7d4167ce431bd2960da38c7ba9
Malware Config
Extracted
formbook
4.1
dn7r
http://www.yourherogarden.net/dn7r/
eventphotographerdfw.com
thehalalcoinstaking.com
philipfaziofineart.com
intercoh.com
gaiaseyephotography.com
chatbotforrealestate.com
lovelancemg.com
marlieskasberger.com
elcongoenespanol.info
lepirecredit.com
distribution-concept.com
e99game.com
exit11festival.com
twodollartoothbrushclub.com
cocktailsandlawn.com
performimprove.network
24horas-telefono-11840.com
cosmossify.com
kellenleote.com
perovskite.energy
crosschain.services
xiwanghe.com
mollycayton.com
bonipay.com
uuwyxc.com
viberiokno-online.com
mobceo.com
menzelna.com
tiffaniefoster.com
premiumautowesthartford.com
ownhome.house
bestmartinshop.com
splashstoreofficial.com
guidemining.com
ecshopdemo.com
bestprinting1.com
s-circle2020.com
ncagency.info
easydigitalzone.com
reikiforthecollective.com
theknottteam.com
evolvedpixel.com
japxo.online
ryansqualityrenovations.com
dentimagenquito.net
pantherprints.co.uk
apoporangi.com
thietkemietvuon.net
ifernshop.com
casaruralesgranada.com
camp-3saumons.com
eddsucks.com
blwcd.com
deldlab.com
susanperb.com
autosanitizingsolutions.com
femhouse.com
ironcageclash.com
thekinghealer.com
shaghayeghbovand.com
advertfaces.com
lonriley.com
mased-world.online
mythicspacex.com
Signatures
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/1588-119-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/1588-120-0x000000000041F200-mapping.dmp formbook behavioral2/memory/1460-128-0x0000000002BB0000-0x0000000002BDF000-memory.dmp formbook -
Loads dropped DLL 1 IoCs
Processes:
Order form.exepid process 2724 Order form.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
Order form.exeOrder form.exewscript.exedescription pid process target process PID 2724 set thread context of 1588 2724 Order form.exe Order form.exe PID 1588 set thread context of 1920 1588 Order form.exe Explorer.EXE PID 1460 set thread context of 1920 1460 wscript.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 60 IoCs
Processes:
Order form.exewscript.exepid process 1588 Order form.exe 1588 Order form.exe 1588 Order form.exe 1588 Order form.exe 1460 wscript.exe 1460 wscript.exe 1460 wscript.exe 1460 wscript.exe 1460 wscript.exe 1460 wscript.exe 1460 wscript.exe 1460 wscript.exe 1460 wscript.exe 1460 wscript.exe 1460 wscript.exe 1460 wscript.exe 1460 wscript.exe 1460 wscript.exe 1460 wscript.exe 1460 wscript.exe 1460 wscript.exe 1460 wscript.exe 1460 wscript.exe 1460 wscript.exe 1460 wscript.exe 1460 wscript.exe 1460 wscript.exe 1460 wscript.exe 1460 wscript.exe 1460 wscript.exe 1460 wscript.exe 1460 wscript.exe 1460 wscript.exe 1460 wscript.exe 1460 wscript.exe 1460 wscript.exe 1460 wscript.exe 1460 wscript.exe 1460 wscript.exe 1460 wscript.exe 1460 wscript.exe 1460 wscript.exe 1460 wscript.exe 1460 wscript.exe 1460 wscript.exe 1460 wscript.exe 1460 wscript.exe 1460 wscript.exe 1460 wscript.exe 1460 wscript.exe 1460 wscript.exe 1460 wscript.exe 1460 wscript.exe 1460 wscript.exe 1460 wscript.exe 1460 wscript.exe 1460 wscript.exe 1460 wscript.exe 1460 wscript.exe 1460 wscript.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 1920 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
Order form.exewscript.exepid process 1588 Order form.exe 1588 Order form.exe 1588 Order form.exe 1460 wscript.exe 1460 wscript.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Order form.exewscript.exedescription pid process Token: SeDebugPrivilege 1588 Order form.exe Token: SeDebugPrivilege 1460 wscript.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
Order form.exeExplorer.EXEwscript.exedescription pid process target process PID 2724 wrote to memory of 1588 2724 Order form.exe Order form.exe PID 2724 wrote to memory of 1588 2724 Order form.exe Order form.exe PID 2724 wrote to memory of 1588 2724 Order form.exe Order form.exe PID 2724 wrote to memory of 1588 2724 Order form.exe Order form.exe PID 2724 wrote to memory of 1588 2724 Order form.exe Order form.exe PID 2724 wrote to memory of 1588 2724 Order form.exe Order form.exe PID 1920 wrote to memory of 1460 1920 Explorer.EXE wscript.exe PID 1920 wrote to memory of 1460 1920 Explorer.EXE wscript.exe PID 1920 wrote to memory of 1460 1920 Explorer.EXE wscript.exe PID 1460 wrote to memory of 3260 1460 wscript.exe cmd.exe PID 1460 wrote to memory of 3260 1460 wscript.exe cmd.exe PID 1460 wrote to memory of 3260 1460 wscript.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Order form.exe"C:\Users\Admin\AppData\Local\Temp\Order form.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Order form.exe"C:\Users\Admin\AppData\Local\Temp\Order form.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Order form.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\nss9695.tmp\kmuasy.dllMD5
42a7fa285b5c17f492bb125b8b3d47ba
SHA1744f37cecdaf575d948b67077d24315461bb0835
SHA256de9642df7f7270d0a399a1d046a060eba02d63e189cdb037d2d3c36cb5e66781
SHA512e3d57d2f86b0fe86ba06ebdf01e71cc4702dcfe3f843b58690620a00fa73b28c31787de6e239d4a9d63e74d6ab17afb071397548d9744da5e34f9076e165b133
-
memory/1460-128-0x0000000002BB0000-0x0000000002BDF000-memory.dmpFilesize
188KB
-
memory/1460-125-0x0000000000000000-mapping.dmp
-
memory/1460-127-0x00000000048C0000-0x0000000004BE0000-memory.dmpFilesize
3.1MB
-
memory/1460-126-0x0000000000230000-0x0000000000257000-memory.dmpFilesize
156KB
-
memory/1460-130-0x0000000004620000-0x00000000046B4000-memory.dmpFilesize
592KB
-
memory/1588-120-0x000000000041F200-mapping.dmp
-
memory/1588-122-0x0000000000990000-0x0000000000CB0000-memory.dmpFilesize
3.1MB
-
memory/1588-123-0x00000000008E0000-0x00000000008F5000-memory.dmpFilesize
84KB
-
memory/1588-119-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1920-124-0x0000000002AA0000-0x0000000002B72000-memory.dmpFilesize
840KB
-
memory/1920-131-0x0000000002C20000-0x0000000002CE8000-memory.dmpFilesize
800KB
-
memory/3260-129-0x0000000000000000-mapping.dmp