Analysis
-
max time kernel
148s -
max time network
145s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
28-01-2022 14:44
Static task
static1
Behavioral task
behavioral1
Sample
Quotation-pdf.exe
Resource
win7-en-20211208
General
-
Target
Quotation-pdf.exe
-
Size
573KB
-
MD5
43be7a6cfb1c2fae6ad5c9e0440be4f8
-
SHA1
af4be0100e8c2b00ec1d821d72d15174ab2197e4
-
SHA256
0337d7784d4021b8467b2652f8c6ca9703732a0f132a1aebcafae37673db026d
-
SHA512
18a88af955dda3fbfc44a44ee72f8dcd32aefcc1d998316980bb235b485de6b6fee09b1322a5bd863cab5036c6b9b16c6a8aaf30c918ba5862c5b83b29406643
Malware Config
Extracted
formbook
4.1
m17y
dental-implants-us-prices.site
eolegends.online
drskinstudio.com
miamivideomapping.com
cqytwater.com
fesfe.net
dlautostore.com
wwwpledge.com
trynutiliti.com
551milesoak.com
jemmetalfab.com
teamtrinitysellsncarolina.com
injurypersonallawyer.com
r3qcf2.xyz
djellaba-boutique.com
t6fwagd.xyz
lm-upto100.com
shyashijz.com
classicbasilicata.com
exactias.com
veocap.xyz
jf-cap.com
oldtraditionstattooparlor.com
egyptshipping.xyz
bdcuhg.com
stecmedia.com
pornvideohall.com
3scy.com
ltmyj.com
supercarniceriasgonvi.com
sdjiahengjixie.com
silvertiaras.com
sedahet.com
peinturefleuri.com
rainfall3d.com
warezhq.com
hsdayp.com
ukhtanytm.com
womensboxing.club
cathayspacific.com
4442tv.com
mekanoshos.com
nomihhealth.com
j3gscd.xyz
kamagranorx.com
hillsidefirm.com
basebastill.com
pureoemo.com
indebtednotable.xyz
odrowiwad.xyz
thenatlali.com
tradeonlink.com
illinimidgets.com
dvtrskgsn.com
efcapcongress.com
girlbest.store
langcustomhomes.net
oncehua.com
corendonnorway.com
streetport.info
3696666.com
ivmmo.biz
doctorfinder.icu
deliriumvery.com
dty191.com
Signatures
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Formbook Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/1128-127-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/912-148-0x0000000000FD0000-0x0000000000FFF000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
Processes:
Quotation-pdf.exeQuotation-pdf.exesvchost.exedescription pid process target process PID 2580 set thread context of 1128 2580 Quotation-pdf.exe Quotation-pdf.exe PID 1128 set thread context of 3040 1128 Quotation-pdf.exe Explorer.EXE PID 912 set thread context of 3040 912 svchost.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 51 IoCs
Processes:
Quotation-pdf.exepowershell.exeQuotation-pdf.exesvchost.exepid process 2580 Quotation-pdf.exe 2580 Quotation-pdf.exe 2580 Quotation-pdf.exe 2580 Quotation-pdf.exe 1508 powershell.exe 1128 Quotation-pdf.exe 1128 Quotation-pdf.exe 1128 Quotation-pdf.exe 1128 Quotation-pdf.exe 1508 powershell.exe 1508 powershell.exe 912 svchost.exe 912 svchost.exe 912 svchost.exe 912 svchost.exe 912 svchost.exe 912 svchost.exe 912 svchost.exe 912 svchost.exe 912 svchost.exe 912 svchost.exe 912 svchost.exe 912 svchost.exe 912 svchost.exe 912 svchost.exe 912 svchost.exe 912 svchost.exe 912 svchost.exe 912 svchost.exe 912 svchost.exe 912 svchost.exe 912 svchost.exe 912 svchost.exe 912 svchost.exe 912 svchost.exe 912 svchost.exe 912 svchost.exe 912 svchost.exe 912 svchost.exe 912 svchost.exe 912 svchost.exe 912 svchost.exe 912 svchost.exe 912 svchost.exe 912 svchost.exe 912 svchost.exe 912 svchost.exe 912 svchost.exe 912 svchost.exe 912 svchost.exe 912 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3040 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
Quotation-pdf.exesvchost.exepid process 1128 Quotation-pdf.exe 1128 Quotation-pdf.exe 1128 Quotation-pdf.exe 912 svchost.exe 912 svchost.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
Quotation-pdf.exepowershell.exeQuotation-pdf.exesvchost.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 2580 Quotation-pdf.exe Token: SeDebugPrivilege 1508 powershell.exe Token: SeDebugPrivilege 1128 Quotation-pdf.exe Token: SeDebugPrivilege 912 svchost.exe Token: SeShutdownPrivilege 3040 Explorer.EXE Token: SeCreatePagefilePrivilege 3040 Explorer.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
Quotation-pdf.exeExplorer.EXEsvchost.exedescription pid process target process PID 2580 wrote to memory of 1508 2580 Quotation-pdf.exe powershell.exe PID 2580 wrote to memory of 1508 2580 Quotation-pdf.exe powershell.exe PID 2580 wrote to memory of 1508 2580 Quotation-pdf.exe powershell.exe PID 2580 wrote to memory of 1952 2580 Quotation-pdf.exe schtasks.exe PID 2580 wrote to memory of 1952 2580 Quotation-pdf.exe schtasks.exe PID 2580 wrote to memory of 1952 2580 Quotation-pdf.exe schtasks.exe PID 2580 wrote to memory of 3268 2580 Quotation-pdf.exe Quotation-pdf.exe PID 2580 wrote to memory of 3268 2580 Quotation-pdf.exe Quotation-pdf.exe PID 2580 wrote to memory of 3268 2580 Quotation-pdf.exe Quotation-pdf.exe PID 2580 wrote to memory of 1348 2580 Quotation-pdf.exe Quotation-pdf.exe PID 2580 wrote to memory of 1348 2580 Quotation-pdf.exe Quotation-pdf.exe PID 2580 wrote to memory of 1348 2580 Quotation-pdf.exe Quotation-pdf.exe PID 2580 wrote to memory of 1128 2580 Quotation-pdf.exe Quotation-pdf.exe PID 2580 wrote to memory of 1128 2580 Quotation-pdf.exe Quotation-pdf.exe PID 2580 wrote to memory of 1128 2580 Quotation-pdf.exe Quotation-pdf.exe PID 2580 wrote to memory of 1128 2580 Quotation-pdf.exe Quotation-pdf.exe PID 2580 wrote to memory of 1128 2580 Quotation-pdf.exe Quotation-pdf.exe PID 2580 wrote to memory of 1128 2580 Quotation-pdf.exe Quotation-pdf.exe PID 3040 wrote to memory of 912 3040 Explorer.EXE svchost.exe PID 3040 wrote to memory of 912 3040 Explorer.EXE svchost.exe PID 3040 wrote to memory of 912 3040 Explorer.EXE svchost.exe PID 912 wrote to memory of 2972 912 svchost.exe cmd.exe PID 912 wrote to memory of 2972 912 svchost.exe cmd.exe PID 912 wrote to memory of 2972 912 svchost.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Quotation-pdf.exe"C:\Users\Admin\AppData\Local\Temp\Quotation-pdf.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\IfvVzYPE.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IfvVzYPE" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4003.tmp"3⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\Quotation-pdf.exe"C:\Users\Admin\AppData\Local\Temp\Quotation-pdf.exe"3⤵
-
C:\Users\Admin\AppData\Local\Temp\Quotation-pdf.exe"C:\Users\Admin\AppData\Local\Temp\Quotation-pdf.exe"3⤵
-
C:\Users\Admin\AppData\Local\Temp\Quotation-pdf.exe"C:\Users\Admin\AppData\Local\Temp\Quotation-pdf.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Quotation-pdf.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp4003.tmpMD5
ab029c5bffd0705519c6a2ff1db6069e
SHA1b67716c948d7b871a5fe4cb14dd089a4bfe593a1
SHA256e9003bd46a9fcbf66ba9a566796b3261a19969cdd9ab8f2ffb31e435b1412542
SHA512e747d64872beb9c85226e402420078950f130fc459cb8556e963379418b20909b6cf20fcffcaa2af3d454372f729fc56f1ece82c7251faf39a9e739bc29cdc82
-
memory/912-369-0x0000000003990000-0x0000000003B20000-memory.dmpFilesize
1.6MB
-
memory/912-148-0x0000000000FD0000-0x0000000000FFF000-memory.dmpFilesize
188KB
-
memory/912-147-0x0000000003B20000-0x0000000003E40000-memory.dmpFilesize
3.1MB
-
memory/912-146-0x0000000001150000-0x000000000115C000-memory.dmpFilesize
48KB
-
memory/1128-137-0x0000000001300000-0x00000000013AE000-memory.dmpFilesize
696KB
-
memory/1128-136-0x0000000001590000-0x0000000001CE0000-memory.dmpFilesize
7.3MB
-
memory/1128-127-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1508-126-0x00000000069E0000-0x0000000006A16000-memory.dmpFilesize
216KB
-
memory/1508-141-0x0000000008180000-0x00000000081F6000-memory.dmpFilesize
472KB
-
memory/1508-360-0x0000000007EE0000-0x0000000007EE8000-memory.dmpFilesize
32KB
-
memory/1508-128-0x0000000007120000-0x0000000007748000-memory.dmpFilesize
6.2MB
-
memory/1508-129-0x0000000006AE0000-0x0000000006AE1000-memory.dmpFilesize
4KB
-
memory/1508-130-0x0000000006AE2000-0x0000000006AE3000-memory.dmpFilesize
4KB
-
memory/1508-131-0x0000000006ED0000-0x0000000006EF2000-memory.dmpFilesize
136KB
-
memory/1508-132-0x0000000006F70000-0x0000000006FD6000-memory.dmpFilesize
408KB
-
memory/1508-133-0x0000000006FE0000-0x0000000007046000-memory.dmpFilesize
408KB
-
memory/1508-134-0x0000000007A00000-0x0000000007D50000-memory.dmpFilesize
3.3MB
-
memory/1508-355-0x0000000008270000-0x000000000828A000-memory.dmpFilesize
104KB
-
memory/1508-162-0x0000000009560000-0x00000000095F4000-memory.dmpFilesize
592KB
-
memory/1508-161-0x0000000006AE3000-0x0000000006AE4000-memory.dmpFilesize
4KB
-
memory/1508-139-0x0000000006D20000-0x0000000006D3C000-memory.dmpFilesize
112KB
-
memory/1508-140-0x0000000008470000-0x00000000084BB000-memory.dmpFilesize
300KB
-
memory/1508-160-0x000000007F510000-0x000000007F511000-memory.dmpFilesize
4KB
-
memory/1508-159-0x0000000009190000-0x0000000009235000-memory.dmpFilesize
660KB
-
memory/1508-154-0x0000000009030000-0x000000000904E000-memory.dmpFilesize
120KB
-
memory/1508-153-0x0000000009050000-0x0000000009083000-memory.dmpFilesize
204KB
-
memory/2580-117-0x0000000005A30000-0x0000000005AC2000-memory.dmpFilesize
584KB
-
memory/2580-118-0x00000000059F0000-0x00000000059FA000-memory.dmpFilesize
40KB
-
memory/2580-119-0x0000000005A30000-0x0000000005F2E000-memory.dmpFilesize
5.0MB
-
memory/2580-115-0x0000000000FD0000-0x0000000001066000-memory.dmpFilesize
600KB
-
memory/2580-120-0x0000000005DA0000-0x0000000005DAC000-memory.dmpFilesize
48KB
-
memory/2580-121-0x0000000008150000-0x00000000081EC000-memory.dmpFilesize
624KB
-
memory/2580-122-0x0000000008410000-0x000000000847A000-memory.dmpFilesize
424KB
-
memory/2580-116-0x0000000005F30000-0x000000000642E000-memory.dmpFilesize
5.0MB
-
memory/3040-138-0x00000000020E0000-0x00000000021C0000-memory.dmpFilesize
896KB
-
memory/3040-375-0x0000000005F10000-0x0000000006086000-memory.dmpFilesize
1.5MB