Analysis
-
max time kernel
125s -
max time network
140s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
10-12-2021 13:39
Static task
static1
Behavioral task
behavioral1
Sample
0b50a75467d375b948edc7bcb6f01b60.exe
Resource
win7-en-20211208
General
-
Target
0b50a75467d375b948edc7bcb6f01b60.exe
-
Size
273KB
-
MD5
0b50a75467d375b948edc7bcb6f01b60
-
SHA1
d9d70c204806b74acf34e95e44f5528031e777a6
-
SHA256
b13782a081582cd40a427da82c93035d3a59cd7dffea1e9b3f3821c55fde233c
-
SHA512
267933362fd75201a23c33b075045f564871fe9a8ee3681a515ae1e5abb29686015274919a0db92a33b78d0cc0566bfffde47cd1906834ea912dc298cdc5c7ad
Malware Config
Extracted
formbook
4.1
nk6l
http://www.rthearts.com/nk6l/
cbnextra.com
entitysystemsinc.com
55midwoodave.com
ebelizzi.com
khojcity.com
1527brokenoakdrive.site
housinghproperties.com
ratiousa.com
lrcrepresentacoes.net
tocoec.net
khadamatdemnate.com
davidkastner.xyz
gardeniaresort.com
qiantangguoji.com
visaprepaidprocessinq.com
cristinamadara.com
semapisus.xyz
mpwebagency.net
alibabasdeli.com
gigasupplies.com
quantumskillset.com
eajui136.xyz
patsanchezelpaso.com
trined.mobi
amaturz.info
approveprvqsx.xyz
fronterapost.house
clairewashere.site
xn--3jst70hg8f.com
thursdaynightthriller.com
primacykapjlt.xyz
vaginette.site
olitusd.com
paypal-caseid521.com
preose.xyz
ferbsqlv28.club
iffiliatefreedom.com
okdahotel.com
cochuzyan.xyz
hotyachts.net
diamond-beauties.com
storyofsol.com
xianshucai.net
venusmedicalarts.com
energiaorgonu.com
savannah.biz
poeticdaily.com
wilddalmatian.com
kdydkyqksqucyuyen.com
meanmod.xyz
kaka.digital
viewcision.com
wowzerbackupandrestore-us.com
hydrogendatapower.com
427521.com
ponto-bras.space
chevalsk.com
hnftdl.com
nanasyhogar.com
createacarepack.com
wildkraeuter-wochenende.com
uchihomedeco.com
quintongiang.com
mnbvending.com
Signatures
-
Formbook Payload 2 IoCs
resource yara_rule behavioral2/memory/3832-119-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/3832-120-0x000000000041F0F0-mapping.dmp formbook -
Loads dropped DLL 1 IoCs
pid Process 2776 0b50a75467d375b948edc7bcb6f01b60.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2776 set thread context of 3832 2776 0b50a75467d375b948edc7bcb6f01b60.exe 68 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3832 0b50a75467d375b948edc7bcb6f01b60.exe 3832 0b50a75467d375b948edc7bcb6f01b60.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2776 wrote to memory of 3832 2776 0b50a75467d375b948edc7bcb6f01b60.exe 68 PID 2776 wrote to memory of 3832 2776 0b50a75467d375b948edc7bcb6f01b60.exe 68 PID 2776 wrote to memory of 3832 2776 0b50a75467d375b948edc7bcb6f01b60.exe 68 PID 2776 wrote to memory of 3832 2776 0b50a75467d375b948edc7bcb6f01b60.exe 68 PID 2776 wrote to memory of 3832 2776 0b50a75467d375b948edc7bcb6f01b60.exe 68 PID 2776 wrote to memory of 3832 2776 0b50a75467d375b948edc7bcb6f01b60.exe 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b50a75467d375b948edc7bcb6f01b60.exe"C:\Users\Admin\AppData\Local\Temp\0b50a75467d375b948edc7bcb6f01b60.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\0b50a75467d375b948edc7bcb6f01b60.exe"C:\Users\Admin\AppData\Local\Temp\0b50a75467d375b948edc7bcb6f01b60.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3832
-