Analysis
-
max time kernel
165s -
max time network
164s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
29-01-2022 08:48
Static task
static1
Behavioral task
behavioral1
Sample
Confirmarea platii.Pdf.exe
Resource
win7-en-20211208
General
-
Target
Confirmarea platii.Pdf.exe
-
Size
821KB
-
MD5
c93940644125559a6aa5f89f532066b8
-
SHA1
9e80136c79abe4072b9629fb57f19c2692dc33a8
-
SHA256
b76cdf3f203937fdd5a57710faf9c4d78281f4b893e8caff17a5053bb741bffc
-
SHA512
2c5eee79d2b488cdf1ec10d0fe295dc87fcb3383665bd072174571cdc6feeb7531a329861eaabd9838799fca633203b5dc7d98a535123bd7a4ba458c5f42c0af
Malware Config
Extracted
formbook
4.1
d2g7
inviteonlyme.com
noashopping.com
raysyoutube.com
chicagp.com
brnguatemala.com
speechboutique.com
philippinepodcastdirectory.com
konnecio.com
9q1ng6.icu
treez.info
appleiclou.com
pettras.com
txherz.icu
freearcae.com
mindpetalsoftwaresolutions.com
my-beautiful-switzerland.com
hpzebike.online
fadsekclub.xyz
newcastledhaka.com
varidsk.com
micursodebelleza.com
neoikos.com
dansilhavy.com
tuagenciademarketing.com
lennyjewelry.com
nomorewinters.life
hvmoon.com
showmethemoneyy.com
the180legacy.com
bearberry-extract.com
leophorm.com
designitumudah.com
212mask.com
globalsky.zone
chincoteagueebikerentals.com
yunsfu.com
kellerwilliambenefits.com
klaunster.com
lk5d3.com
wathft.online
stayweightfree.com
pouchseat.com
lebensraum-beratung.com
luokaihao.art
weldtechinstitute.com
howdy.chat
timioscorp.com
clientes-ayuda-numero.site
motorcycleinsuranc.com
hwbuc.icu
divinggarden.com
favorru.com
hospitalbe.com
cencat.net
saos45.com
cardealsherein.com
kelp.email
orderrosysmexicanrestaurant.com
nexxtgencorporation.com
5ghfbdfgerg.com
theannunziatagroup.com
swisshoneybee.com
4799cf.com
kingfisherexperience.com
freshlyhair.com
Signatures
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/600-129-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/600-160-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/2132-205-0x0000000000610000-0x000000000063F000-memory.dmp formbook -
Suspicious use of SetThreadContext 4 IoCs
Processes:
Confirmarea platii.Pdf.exeRegSvcs.exehelp.exedescription pid process target process PID 3052 set thread context of 600 3052 Confirmarea platii.Pdf.exe RegSvcs.exe PID 600 set thread context of 3040 600 RegSvcs.exe Explorer.EXE PID 600 set thread context of 3040 600 RegSvcs.exe Explorer.EXE PID 2132 set thread context of 3040 2132 help.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 46 IoCs
Processes:
Confirmarea platii.Pdf.exepowershell.exeRegSvcs.exehelp.exepid process 3052 Confirmarea platii.Pdf.exe 3052 Confirmarea platii.Pdf.exe 3052 Confirmarea platii.Pdf.exe 3940 powershell.exe 600 RegSvcs.exe 600 RegSvcs.exe 3940 powershell.exe 600 RegSvcs.exe 600 RegSvcs.exe 3940 powershell.exe 600 RegSvcs.exe 600 RegSvcs.exe 2132 help.exe 2132 help.exe 2132 help.exe 2132 help.exe 2132 help.exe 2132 help.exe 2132 help.exe 2132 help.exe 2132 help.exe 2132 help.exe 2132 help.exe 2132 help.exe 2132 help.exe 2132 help.exe 2132 help.exe 2132 help.exe 2132 help.exe 2132 help.exe 2132 help.exe 2132 help.exe 2132 help.exe 2132 help.exe 2132 help.exe 2132 help.exe 2132 help.exe 2132 help.exe 2132 help.exe 2132 help.exe 2132 help.exe 2132 help.exe 2132 help.exe 2132 help.exe 2132 help.exe 2132 help.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3040 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
RegSvcs.exehelp.exepid process 600 RegSvcs.exe 600 RegSvcs.exe 600 RegSvcs.exe 600 RegSvcs.exe 2132 help.exe 2132 help.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
Confirmarea platii.Pdf.exepowershell.exeRegSvcs.exehelp.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 3052 Confirmarea platii.Pdf.exe Token: SeDebugPrivilege 3940 powershell.exe Token: SeDebugPrivilege 600 RegSvcs.exe Token: SeDebugPrivilege 2132 help.exe Token: SeShutdownPrivilege 3040 Explorer.EXE Token: SeCreatePagefilePrivilege 3040 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
Confirmarea platii.Pdf.exeExplorer.EXEhelp.exedescription pid process target process PID 3052 wrote to memory of 3940 3052 Confirmarea platii.Pdf.exe powershell.exe PID 3052 wrote to memory of 3940 3052 Confirmarea platii.Pdf.exe powershell.exe PID 3052 wrote to memory of 3940 3052 Confirmarea platii.Pdf.exe powershell.exe PID 3052 wrote to memory of 3276 3052 Confirmarea platii.Pdf.exe schtasks.exe PID 3052 wrote to memory of 3276 3052 Confirmarea platii.Pdf.exe schtasks.exe PID 3052 wrote to memory of 3276 3052 Confirmarea platii.Pdf.exe schtasks.exe PID 3052 wrote to memory of 600 3052 Confirmarea platii.Pdf.exe RegSvcs.exe PID 3052 wrote to memory of 600 3052 Confirmarea platii.Pdf.exe RegSvcs.exe PID 3052 wrote to memory of 600 3052 Confirmarea platii.Pdf.exe RegSvcs.exe PID 3052 wrote to memory of 600 3052 Confirmarea platii.Pdf.exe RegSvcs.exe PID 3052 wrote to memory of 600 3052 Confirmarea platii.Pdf.exe RegSvcs.exe PID 3052 wrote to memory of 600 3052 Confirmarea platii.Pdf.exe RegSvcs.exe PID 3040 wrote to memory of 2132 3040 Explorer.EXE help.exe PID 3040 wrote to memory of 2132 3040 Explorer.EXE help.exe PID 3040 wrote to memory of 2132 3040 Explorer.EXE help.exe PID 2132 wrote to memory of 1528 2132 help.exe cmd.exe PID 2132 wrote to memory of 1528 2132 help.exe cmd.exe PID 2132 wrote to memory of 1528 2132 help.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Confirmarea platii.Pdf.exe"C:\Users\Admin\AppData\Local\Temp\Confirmarea platii.Pdf.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\ClmeTculHDsCcc.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ClmeTculHDsCcc" /XML "C:\Users\Admin\AppData\Local\Temp\tmpC80F.tmp"3⤵
- Creates scheduled task(s)
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\help.exe"C:\Windows\SysWOW64\help.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmpC80F.tmpMD5
9ca0b58b568853c3200eaddb63bb700f
SHA1e9225bd23adffd1ae32f55bd6dad0e4ee393884e
SHA25615e6d47925ac34e305a875abbdecce49c54e494b2da13f870e48fcfa37910a99
SHA512d35f516b57408a8d68b1bc011f63f58b2747cf258787c707d24aeab2a085bbccf350de0440aef8e2b399b3cce783814c13b598fe6242e12da9dcdb2cc6b9ed61
-
memory/600-140-0x0000000001650000-0x0000000001970000-memory.dmpFilesize
3.1MB
-
memory/600-129-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/600-161-0x00000000014B0000-0x000000000164C000-memory.dmpFilesize
1.6MB
-
memory/600-160-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/600-141-0x00000000014B0000-0x000000000164C000-memory.dmpFilesize
1.6MB
-
memory/2132-205-0x0000000000610000-0x000000000063F000-memory.dmpFilesize
188KB
-
memory/2132-203-0x0000000000D20000-0x0000000000D27000-memory.dmpFilesize
28KB
-
memory/2132-379-0x0000000000AA0000-0x0000000000C30000-memory.dmpFilesize
1.6MB
-
memory/2132-207-0x0000000002D30000-0x0000000003050000-memory.dmpFilesize
3.1MB
-
memory/3040-380-0x0000000005440000-0x000000000554E000-memory.dmpFilesize
1.1MB
-
memory/3040-162-0x00000000068F0000-0x0000000006A3C000-memory.dmpFilesize
1.3MB
-
memory/3040-142-0x0000000005C00000-0x0000000005D4F000-memory.dmpFilesize
1.3MB
-
memory/3052-123-0x00000000080F0000-0x000000000818C000-memory.dmpFilesize
624KB
-
memory/3052-117-0x0000000000CC0000-0x0000000000D94000-memory.dmpFilesize
848KB
-
memory/3052-122-0x0000000007DC0000-0x0000000007DCC000-memory.dmpFilesize
48KB
-
memory/3052-120-0x00000000057E0000-0x0000000005CDE000-memory.dmpFilesize
5.0MB
-
memory/3052-121-0x0000000005710000-0x000000000571A000-memory.dmpFilesize
40KB
-
memory/3052-124-0x00000000082A0000-0x0000000008306000-memory.dmpFilesize
408KB
-
memory/3052-118-0x0000000005CE0000-0x00000000061DE000-memory.dmpFilesize
5.0MB
-
memory/3052-119-0x00000000057E0000-0x0000000005872000-memory.dmpFilesize
584KB
-
memory/3940-143-0x00000000086F0000-0x0000000008766000-memory.dmpFilesize
472KB
-
memory/3940-134-0x0000000004BC0000-0x0000000004BC1000-memory.dmpFilesize
4KB
-
memory/3940-138-0x0000000008420000-0x000000000843C000-memory.dmpFilesize
112KB
-
memory/3940-152-0x000000007F590000-0x000000007F591000-memory.dmpFilesize
4KB
-
memory/3940-153-0x0000000009620000-0x0000000009653000-memory.dmpFilesize
204KB
-
memory/3940-154-0x00000000095E0000-0x00000000095FE000-memory.dmpFilesize
120KB
-
memory/3940-159-0x0000000009950000-0x00000000099F5000-memory.dmpFilesize
660KB
-
memory/3940-136-0x00000000080D0000-0x0000000008420000-memory.dmpFilesize
3.3MB
-
memory/3940-135-0x0000000004BC2000-0x0000000004BC3000-memory.dmpFilesize
4KB
-
memory/3940-133-0x0000000007FA0000-0x0000000008006000-memory.dmpFilesize
408KB
-
memory/3940-163-0x0000000004BC3000-0x0000000004BC4000-memory.dmpFilesize
4KB
-
memory/3940-164-0x0000000009AB0000-0x0000000009B44000-memory.dmpFilesize
592KB
-
memory/3940-132-0x0000000007D50000-0x0000000007DB6000-memory.dmpFilesize
408KB
-
memory/3940-131-0x0000000007CB0000-0x0000000007CD2000-memory.dmpFilesize
136KB
-
memory/3940-130-0x0000000007610000-0x0000000007C38000-memory.dmpFilesize
6.2MB
-
memory/3940-360-0x0000000009A30000-0x0000000009A4A000-memory.dmpFilesize
104KB
-
memory/3940-365-0x0000000009A10000-0x0000000009A18000-memory.dmpFilesize
32KB
-
memory/3940-139-0x0000000008440000-0x000000000848B000-memory.dmpFilesize
300KB
-
memory/3940-128-0x0000000006FA0000-0x0000000006FD6000-memory.dmpFilesize
216KB