Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
10-12-2021 13:39
Static task
static1
Behavioral task
behavioral1
Sample
0b50a75467d375b948edc7bcb6f01b60.exe
Resource
win7-en-20211208
General
-
Target
0b50a75467d375b948edc7bcb6f01b60.exe
-
Size
273KB
-
MD5
0b50a75467d375b948edc7bcb6f01b60
-
SHA1
d9d70c204806b74acf34e95e44f5528031e777a6
-
SHA256
b13782a081582cd40a427da82c93035d3a59cd7dffea1e9b3f3821c55fde233c
-
SHA512
267933362fd75201a23c33b075045f564871fe9a8ee3681a515ae1e5abb29686015274919a0db92a33b78d0cc0566bfffde47cd1906834ea912dc298cdc5c7ad
Malware Config
Extracted
formbook
4.1
nk6l
http://www.rthearts.com/nk6l/
cbnextra.com
entitysystemsinc.com
55midwoodave.com
ebelizzi.com
khojcity.com
1527brokenoakdrive.site
housinghproperties.com
ratiousa.com
lrcrepresentacoes.net
tocoec.net
khadamatdemnate.com
davidkastner.xyz
gardeniaresort.com
qiantangguoji.com
visaprepaidprocessinq.com
cristinamadara.com
semapisus.xyz
mpwebagency.net
alibabasdeli.com
gigasupplies.com
quantumskillset.com
eajui136.xyz
patsanchezelpaso.com
trined.mobi
amaturz.info
approveprvqsx.xyz
fronterapost.house
clairewashere.site
xn--3jst70hg8f.com
thursdaynightthriller.com
primacykapjlt.xyz
vaginette.site
olitusd.com
paypal-caseid521.com
preose.xyz
ferbsqlv28.club
iffiliatefreedom.com
okdahotel.com
cochuzyan.xyz
hotyachts.net
diamond-beauties.com
storyofsol.com
xianshucai.net
venusmedicalarts.com
energiaorgonu.com
savannah.biz
poeticdaily.com
wilddalmatian.com
kdydkyqksqucyuyen.com
meanmod.xyz
kaka.digital
viewcision.com
wowzerbackupandrestore-us.com
hydrogendatapower.com
427521.com
ponto-bras.space
chevalsk.com
hnftdl.com
nanasyhogar.com
createacarepack.com
wildkraeuter-wochenende.com
uchihomedeco.com
quintongiang.com
mnbvending.com
Signatures
-
Formbook Payload 2 IoCs
resource yara_rule behavioral1/memory/1148-57-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1148-58-0x000000000041F0F0-mapping.dmp formbook -
Loads dropped DLL 1 IoCs
pid Process 1632 0b50a75467d375b948edc7bcb6f01b60.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1632 set thread context of 1148 1632 0b50a75467d375b948edc7bcb6f01b60.exe 27 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1148 0b50a75467d375b948edc7bcb6f01b60.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1632 wrote to memory of 1148 1632 0b50a75467d375b948edc7bcb6f01b60.exe 27 PID 1632 wrote to memory of 1148 1632 0b50a75467d375b948edc7bcb6f01b60.exe 27 PID 1632 wrote to memory of 1148 1632 0b50a75467d375b948edc7bcb6f01b60.exe 27 PID 1632 wrote to memory of 1148 1632 0b50a75467d375b948edc7bcb6f01b60.exe 27 PID 1632 wrote to memory of 1148 1632 0b50a75467d375b948edc7bcb6f01b60.exe 27 PID 1632 wrote to memory of 1148 1632 0b50a75467d375b948edc7bcb6f01b60.exe 27 PID 1632 wrote to memory of 1148 1632 0b50a75467d375b948edc7bcb6f01b60.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b50a75467d375b948edc7bcb6f01b60.exe"C:\Users\Admin\AppData\Local\Temp\0b50a75467d375b948edc7bcb6f01b60.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\0b50a75467d375b948edc7bcb6f01b60.exe"C:\Users\Admin\AppData\Local\Temp\0b50a75467d375b948edc7bcb6f01b60.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1148
-