Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
27-12-2021 09:52
Static task
static1
Behavioral task
behavioral1
Sample
4fd44b1855341a3f6f31e08e4ad288747ecb8e5b8637b95fff99aa689de07446.bin.exe
Resource
win7-en-20211208
General
-
Target
4fd44b1855341a3f6f31e08e4ad288747ecb8e5b8637b95fff99aa689de07446.bin.exe
-
Size
335KB
-
MD5
619d2ba58ece0c805f96956f511f5155
-
SHA1
30441c1e27728e326e16627e64fc63abc49b05c1
-
SHA256
4fd44b1855341a3f6f31e08e4ad288747ecb8e5b8637b95fff99aa689de07446
-
SHA512
af7da2064473c6b277dcf833ad1de09c3fdc89fc1de2a94b987e7f95186cc0e058fc1c22875f821829e180c89e252cafcda6bc463fd15c8d01663434921943e3
Malware Config
Extracted
formbook
4.1
h4d0
onlinefinejewelry.com
samstringermusic.com
beam-lettings.info
optimumcoin.xyz
fasa.xyz
creativedime.com
eihncuz.online
griffin2008.top
europcarlive.com
jxhcar.com
museumsshop.international
bonolaboral-lnterbank.com
kelebandis.xyz
hiddenlakeranch.net
carelessyouth.com
jfkilfoil.store
potok-it-ua.site
magdulemediation.com
shakadal.xyz
coastconstructionfl.com
wilsonbrosvanlines.com
collagenroaster.com
thegetawayspace.com
grittybeetsproduction.com
ieemyanmar.com
gyozaviajera.com
familie-leben.info
finnbd.com
nomasrevolving.com
gtstudios.art
sergesur.com
hnljgame.com
lakemould.com
kandanmart.com
devinbutler.com
everythingisdetermined.com
justift96.com
crose.info
pb6111.com
thecollarcollective.com
jrc8899.com
studiocrypto.xyz
sadrarobotics.com
carpimuebles.com
chinaqcgg.com
ninjixiang.net
thewildexplorerabin.com
realestatenebraskanews.com
metaversenitro.com
com171ksw.xyz
fammilee.com
farmstoragesolution.com
some-things.net
kedaiwangi.one
aztrac.net
webzyn.xyz
cell-mex.com
argusprojects.com
jcaemporium.com
xfgyun.store
xdhgrl.com
creating-club.com
masterproperty34.com
joyemotion.com
voxelsoxx.xyz
Signatures
-
Formbook Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1664-55-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1664-56-0x000000000041F130-mapping.dmp formbook -
Loads dropped DLL 1 IoCs
Processes:
4fd44b1855341a3f6f31e08e4ad288747ecb8e5b8637b95fff99aa689de07446.bin.exepid process 944 4fd44b1855341a3f6f31e08e4ad288747ecb8e5b8637b95fff99aa689de07446.bin.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
4fd44b1855341a3f6f31e08e4ad288747ecb8e5b8637b95fff99aa689de07446.bin.exedescription pid process target process PID 944 set thread context of 1664 944 4fd44b1855341a3f6f31e08e4ad288747ecb8e5b8637b95fff99aa689de07446.bin.exe 4fd44b1855341a3f6f31e08e4ad288747ecb8e5b8637b95fff99aa689de07446.bin.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
4fd44b1855341a3f6f31e08e4ad288747ecb8e5b8637b95fff99aa689de07446.bin.exepid process 1664 4fd44b1855341a3f6f31e08e4ad288747ecb8e5b8637b95fff99aa689de07446.bin.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
4fd44b1855341a3f6f31e08e4ad288747ecb8e5b8637b95fff99aa689de07446.bin.exedescription pid process target process PID 944 wrote to memory of 1664 944 4fd44b1855341a3f6f31e08e4ad288747ecb8e5b8637b95fff99aa689de07446.bin.exe 4fd44b1855341a3f6f31e08e4ad288747ecb8e5b8637b95fff99aa689de07446.bin.exe PID 944 wrote to memory of 1664 944 4fd44b1855341a3f6f31e08e4ad288747ecb8e5b8637b95fff99aa689de07446.bin.exe 4fd44b1855341a3f6f31e08e4ad288747ecb8e5b8637b95fff99aa689de07446.bin.exe PID 944 wrote to memory of 1664 944 4fd44b1855341a3f6f31e08e4ad288747ecb8e5b8637b95fff99aa689de07446.bin.exe 4fd44b1855341a3f6f31e08e4ad288747ecb8e5b8637b95fff99aa689de07446.bin.exe PID 944 wrote to memory of 1664 944 4fd44b1855341a3f6f31e08e4ad288747ecb8e5b8637b95fff99aa689de07446.bin.exe 4fd44b1855341a3f6f31e08e4ad288747ecb8e5b8637b95fff99aa689de07446.bin.exe PID 944 wrote to memory of 1664 944 4fd44b1855341a3f6f31e08e4ad288747ecb8e5b8637b95fff99aa689de07446.bin.exe 4fd44b1855341a3f6f31e08e4ad288747ecb8e5b8637b95fff99aa689de07446.bin.exe PID 944 wrote to memory of 1664 944 4fd44b1855341a3f6f31e08e4ad288747ecb8e5b8637b95fff99aa689de07446.bin.exe 4fd44b1855341a3f6f31e08e4ad288747ecb8e5b8637b95fff99aa689de07446.bin.exe PID 944 wrote to memory of 1664 944 4fd44b1855341a3f6f31e08e4ad288747ecb8e5b8637b95fff99aa689de07446.bin.exe 4fd44b1855341a3f6f31e08e4ad288747ecb8e5b8637b95fff99aa689de07446.bin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4fd44b1855341a3f6f31e08e4ad288747ecb8e5b8637b95fff99aa689de07446.bin.exe"C:\Users\Admin\AppData\Local\Temp\4fd44b1855341a3f6f31e08e4ad288747ecb8e5b8637b95fff99aa689de07446.bin.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\4fd44b1855341a3f6f31e08e4ad288747ecb8e5b8637b95fff99aa689de07446.bin.exe"C:\Users\Admin\AppData\Local\Temp\4fd44b1855341a3f6f31e08e4ad288747ecb8e5b8637b95fff99aa689de07446.bin.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\nsdA9B8.tmp\wmadldla.dllMD5
0d9cf42bc6878ed5ea82d3e8760c9a57
SHA1e88d79333ff04e0b8e65d5c08770a21ea2204fc6
SHA2568adb44f44cbca44c05db74d30862843289a19cf50d80a24db2d0187510675aca
SHA5122dedd5bfe0b06403031ee8c744d9256f9a6c5d839c4611a00252b5935b86b62b5164e5eeade5b77f09fdfc29067ba5b89152cb1db9b24934e5099d6a37b40722
-
memory/944-53-0x0000000075D61000-0x0000000075D63000-memory.dmpFilesize
8KB
-
memory/1664-55-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1664-56-0x000000000041F130-mapping.dmp
-
memory/1664-57-0x0000000000900000-0x0000000000C03000-memory.dmpFilesize
3.0MB