Analysis
-
max time kernel
152s -
max time network
152s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
25-01-2022 14:19
Static task
static1
Behavioral task
behavioral1
Sample
ROTONDI-NEW ORDER PT004.exe
Resource
win7-en-20211208
General
-
Target
ROTONDI-NEW ORDER PT004.exe
-
Size
250KB
-
MD5
f536635d5e97e42c2094f8b55a1c6c28
-
SHA1
931da46b998bb65a6a08a01e90d41689653d4103
-
SHA256
baef60b7ed8a0286e276a7b7d76c7a9d52a8a77c2688b0d2b2cc1d886954b1a0
-
SHA512
07eccfbe1c8a9753eeee8e18b6d3f5de2e41f7c2e01f6da9234aba0b63985b20dac15061cda990023d4f905bbefa309edf192d157d1f19193601b9b7946a80a3
Malware Config
Extracted
formbook
4.1
a0p6
taxlaws.info
porn-star-depot.com
cpf-comptes.com
metropark.xyz
transformselfhypnosis.com
wu8g8aerxgjr.xyz
jingzhouhan.net
granicors.com
monografiaonline.com
4972hillcrestdrive.com
gridironagriculturist.com
xtrasomething.com
scbndirects.com
agglutinatesmicromanagers.xyz
butsuyokulog.xyz
parttimejobsinuk.site
kriylzf.xyz
sinashakib.com
hpessoa.website
interscopealbums.com
bathandlicious.com
jrowlandmarketing.com
okforbk.com
xjbyctc.com
vitospark.com
threewisewords.com
antonioloiodice.com
fastvpnreward.com
baamusa.com
yanatransportationsrvs.net
ol0vdw.xyz
climbingtreehollow.com
barterlinealarmselect.com
integrant.xyz
nepalgci.com
wu8j3tx49l5a.xyz
surpmel.xyz
autocarbying101.com
otakusofneverland.com
pawsitiveclosings.com
h9220.com
newshaiya.com
progressiveprizes.com
groovybingo.com
iconuncle.com
icon-club-dxb.com
ruokanetti.com
cooperjss.com
governorperdue.com
brfujdersomngreqt.com
bcubnk.com
digitalmedicinetechnologies.com
logiqtrading.com
anti-tfboys.com
aterliercarbon.com
wesovereign.com
wein-quadrat.com
www37118.com
morethanalittlemarley.com
coslogenex.com
bondic-listjournal.com
choicesidownloadnv.com
ys688.xyz
nftrack.xyz
freedomwoofpackcom.com
Signatures
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1884-56-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1884-62-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/860-66-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1204 cmd.exe -
Loads dropped DLL 1 IoCs
Processes:
ROTONDI-NEW ORDER PT004.exepid process 964 ROTONDI-NEW ORDER PT004.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
ROTONDI-NEW ORDER PT004.exeROTONDI-NEW ORDER PT004.exesvchost.exedescription pid process target process PID 964 set thread context of 1884 964 ROTONDI-NEW ORDER PT004.exe ROTONDI-NEW ORDER PT004.exe PID 1884 set thread context of 1360 1884 ROTONDI-NEW ORDER PT004.exe Explorer.EXE PID 1884 set thread context of 1360 1884 ROTONDI-NEW ORDER PT004.exe Explorer.EXE PID 860 set thread context of 1360 860 svchost.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 29 IoCs
Processes:
ROTONDI-NEW ORDER PT004.exesvchost.exepid process 1884 ROTONDI-NEW ORDER PT004.exe 1884 ROTONDI-NEW ORDER PT004.exe 1884 ROTONDI-NEW ORDER PT004.exe 860 svchost.exe 860 svchost.exe 860 svchost.exe 860 svchost.exe 860 svchost.exe 860 svchost.exe 860 svchost.exe 860 svchost.exe 860 svchost.exe 860 svchost.exe 860 svchost.exe 860 svchost.exe 860 svchost.exe 860 svchost.exe 860 svchost.exe 860 svchost.exe 860 svchost.exe 860 svchost.exe 860 svchost.exe 860 svchost.exe 860 svchost.exe 860 svchost.exe 860 svchost.exe 860 svchost.exe 860 svchost.exe 860 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 1360 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
ROTONDI-NEW ORDER PT004.exesvchost.exepid process 1884 ROTONDI-NEW ORDER PT004.exe 1884 ROTONDI-NEW ORDER PT004.exe 1884 ROTONDI-NEW ORDER PT004.exe 1884 ROTONDI-NEW ORDER PT004.exe 860 svchost.exe 860 svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
ROTONDI-NEW ORDER PT004.exesvchost.exedescription pid process Token: SeDebugPrivilege 1884 ROTONDI-NEW ORDER PT004.exe Token: SeDebugPrivilege 860 svchost.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid process 1360 Explorer.EXE 1360 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Explorer.EXEpid process 1360 Explorer.EXE 1360 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
ROTONDI-NEW ORDER PT004.exeExplorer.EXEsvchost.exedescription pid process target process PID 964 wrote to memory of 1884 964 ROTONDI-NEW ORDER PT004.exe ROTONDI-NEW ORDER PT004.exe PID 964 wrote to memory of 1884 964 ROTONDI-NEW ORDER PT004.exe ROTONDI-NEW ORDER PT004.exe PID 964 wrote to memory of 1884 964 ROTONDI-NEW ORDER PT004.exe ROTONDI-NEW ORDER PT004.exe PID 964 wrote to memory of 1884 964 ROTONDI-NEW ORDER PT004.exe ROTONDI-NEW ORDER PT004.exe PID 964 wrote to memory of 1884 964 ROTONDI-NEW ORDER PT004.exe ROTONDI-NEW ORDER PT004.exe PID 964 wrote to memory of 1884 964 ROTONDI-NEW ORDER PT004.exe ROTONDI-NEW ORDER PT004.exe PID 964 wrote to memory of 1884 964 ROTONDI-NEW ORDER PT004.exe ROTONDI-NEW ORDER PT004.exe PID 1360 wrote to memory of 860 1360 Explorer.EXE svchost.exe PID 1360 wrote to memory of 860 1360 Explorer.EXE svchost.exe PID 1360 wrote to memory of 860 1360 Explorer.EXE svchost.exe PID 1360 wrote to memory of 860 1360 Explorer.EXE svchost.exe PID 860 wrote to memory of 1204 860 svchost.exe cmd.exe PID 860 wrote to memory of 1204 860 svchost.exe cmd.exe PID 860 wrote to memory of 1204 860 svchost.exe cmd.exe PID 860 wrote to memory of 1204 860 svchost.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\ROTONDI-NEW ORDER PT004.exe"C:\Users\Admin\AppData\Local\Temp\ROTONDI-NEW ORDER PT004.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\ROTONDI-NEW ORDER PT004.exe"C:\Users\Admin\AppData\Local\Temp\ROTONDI-NEW ORDER PT004.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\ROTONDI-NEW ORDER PT004.exe"3⤵
- Deletes itself
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\nsoCB0.tmp\yeqyi.dllMD5
da0a46c4a9a05d7e1ea5e501acad07ba
SHA1e0ec05e2784b5865b431220f2f4aa0876c50ff5a
SHA2561c446424ac31bf1c943882c8a054ce3ecbf018cca2c7c719eebfb4591f78a11f
SHA5127c17abcca1ae262722abe64cd3b9625264c4585f78667a17fc22f2833bb06d340e93fcd9a9709464a13e53f8ffedede5bdf652771498c955261c975f5a714298
-
memory/860-68-0x00000000005F0000-0x0000000000683000-memory.dmpFilesize
588KB
-
memory/860-67-0x0000000000900000-0x0000000000C03000-memory.dmpFilesize
3.0MB
-
memory/860-66-0x0000000000080000-0x00000000000AF000-memory.dmpFilesize
188KB
-
memory/860-65-0x0000000000760000-0x0000000000768000-memory.dmpFilesize
32KB
-
memory/964-54-0x0000000075D61000-0x0000000075D63000-memory.dmpFilesize
8KB
-
memory/964-57-0x00000000003C0000-0x00000000003C2000-memory.dmpFilesize
8KB
-
memory/1360-64-0x0000000006DF0000-0x0000000006F42000-memory.dmpFilesize
1.3MB
-
memory/1360-61-0x0000000006A10000-0x0000000006B74000-memory.dmpFilesize
1.4MB
-
memory/1360-69-0x0000000004D30000-0x0000000004DE5000-memory.dmpFilesize
724KB
-
memory/1884-63-0x0000000000390000-0x00000000003A4000-memory.dmpFilesize
80KB
-
memory/1884-62-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1884-60-0x00000000002C0000-0x00000000002D4000-memory.dmpFilesize
80KB
-
memory/1884-59-0x0000000000810000-0x0000000000B13000-memory.dmpFilesize
3.0MB
-
memory/1884-56-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB