Analysis
-
max time kernel
152s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20220331-en -
submitted
04-04-2022 03:31
Static task
static1
Behavioral task
behavioral1
Sample
jay.exe
Resource
win7-20220331-en
General
-
Target
jay.exe
-
Size
264KB
-
MD5
38f7e0b6fe905626e34446af373a7a14
-
SHA1
0fb7d32aa3da0ce81bd47acf3f85571ad78a2821
-
SHA256
b45ff8555c636c41fcf21d1c755229682de05208da77ba4a6c3cc321fd342af8
-
SHA512
eb3de471218197032eadcf7c2f2cab3b785fe93eb881378a876536e393e1e93d2ee8aadac4168bfc606cbda0bc47880543c4905a186aad46f6111d924666a310
Malware Config
Extracted
formbook
4.1
jy0b
lamejorimagen.com
mykabukibrush.com
modgon.com
barefoottherapeutics.com
shimpeg.net
trade-sniper.com
chiangkhancityhotel.com
joblessmoni.club
stespritsubways.com
chico-group.com
nni8.xyz
searchtypically.online
jobsyork.com
bestsales-crypto.com
iqmarketing.info
bullcityphotobooths.com
fwssc.icu
1oc87s.icu
usdiesel.xyz
secrets2optimumnutrition.com
charlotte-s-creations.com
homenetmidrand.com
sytypij.xyz
tapehitsscriptsparty.com
adelenashville.com
greendylife.com
agbqs.com
lilcrox.xyz
thepersonalevolutionmaven.com
graciasmiangel.com
heidisgifts.com
flchimneyspecialists.com
yorkrehabclinic.com
cent-pour-centsons.com
marcoislandsupsurf.net
expressdiagnostics.info
surferjackproductions.com
duscopy.store
uekra.tech
campaigncupgunplant.xyz
cheetahadvance.com
blickosinski.icu
laketacostahoe.com
drippysupplyco.com
isomassagegun.com
clarition.com
andrew-pillar.com
truthbudgeting.com
cloudfixr.com
cfasministries.com
compliant-now-beta.com
kssc17.icu
plewabuilders.com
uslugi-email.site
167hours.com
sodo6697.com
voyagesify.com
ranodalei.com
culturao.com
littlepotato-id.com
integtiryhvacsanmateo.com
neatmounts.com
reddictnflstream.com
digistore-maya.com
filecrev.com
Signatures
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/2532-126-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/2532-131-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/1152-139-0x0000000000BC0000-0x0000000000BEF000-memory.dmp formbook -
Loads dropped DLL 1 IoCs
Processes:
jay.exepid process 4504 jay.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
jay.exejay.execscript.exedescription pid process target process PID 4504 set thread context of 2532 4504 jay.exe jay.exe PID 2532 set thread context of 500 2532 jay.exe Explorer.EXE PID 2532 set thread context of 500 2532 jay.exe Explorer.EXE PID 1152 set thread context of 500 1152 cscript.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 60 IoCs
Processes:
jay.execscript.exepid process 2532 jay.exe 2532 jay.exe 2532 jay.exe 2532 jay.exe 2532 jay.exe 2532 jay.exe 1152 cscript.exe 1152 cscript.exe 1152 cscript.exe 1152 cscript.exe 1152 cscript.exe 1152 cscript.exe 1152 cscript.exe 1152 cscript.exe 1152 cscript.exe 1152 cscript.exe 1152 cscript.exe 1152 cscript.exe 1152 cscript.exe 1152 cscript.exe 1152 cscript.exe 1152 cscript.exe 1152 cscript.exe 1152 cscript.exe 1152 cscript.exe 1152 cscript.exe 1152 cscript.exe 1152 cscript.exe 1152 cscript.exe 1152 cscript.exe 1152 cscript.exe 1152 cscript.exe 1152 cscript.exe 1152 cscript.exe 1152 cscript.exe 1152 cscript.exe 1152 cscript.exe 1152 cscript.exe 1152 cscript.exe 1152 cscript.exe 1152 cscript.exe 1152 cscript.exe 1152 cscript.exe 1152 cscript.exe 1152 cscript.exe 1152 cscript.exe 1152 cscript.exe 1152 cscript.exe 1152 cscript.exe 1152 cscript.exe 1152 cscript.exe 1152 cscript.exe 1152 cscript.exe 1152 cscript.exe 1152 cscript.exe 1152 cscript.exe 1152 cscript.exe 1152 cscript.exe 1152 cscript.exe 1152 cscript.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 500 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
jay.execscript.exepid process 2532 jay.exe 2532 jay.exe 2532 jay.exe 2532 jay.exe 1152 cscript.exe 1152 cscript.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jay.execscript.exedescription pid process Token: SeDebugPrivilege 2532 jay.exe Token: SeDebugPrivilege 1152 cscript.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
jay.exeExplorer.EXEcscript.exedescription pid process target process PID 4504 wrote to memory of 2532 4504 jay.exe jay.exe PID 4504 wrote to memory of 2532 4504 jay.exe jay.exe PID 4504 wrote to memory of 2532 4504 jay.exe jay.exe PID 4504 wrote to memory of 2532 4504 jay.exe jay.exe PID 4504 wrote to memory of 2532 4504 jay.exe jay.exe PID 4504 wrote to memory of 2532 4504 jay.exe jay.exe PID 500 wrote to memory of 1152 500 Explorer.EXE cscript.exe PID 500 wrote to memory of 1152 500 Explorer.EXE cscript.exe PID 500 wrote to memory of 1152 500 Explorer.EXE cscript.exe PID 1152 wrote to memory of 5116 1152 cscript.exe cmd.exe PID 1152 wrote to memory of 5116 1152 cscript.exe cmd.exe PID 1152 wrote to memory of 5116 1152 cscript.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\jay.exe"C:\Users\Admin\AppData\Local\Temp\jay.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\jay.exe"C:\Users\Admin\AppData\Local\Temp\jay.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cscript.exe"C:\Windows\SysWOW64\cscript.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\jay.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\nshA7DE.tmp\wzlnr.dllFilesize
43KB
MD5234c2ab51d3099688f0a00151ae35651
SHA1b6b29ea47b650b412c8e6b49695699db5aa24b9c
SHA25630bece4f9e1dcfe6cf9cc063f4a53e229d272dc0be84e51ce3050844b1644a48
SHA51212970f770ef2538929c2ea9e26a2ba8b2c4c0e73084828628f5a71a1d2d378f9f3aa3f93644053154b445211cbfce9eadf420edbe6601fb3a608564ea4cb932f
-
memory/500-135-0x0000000008580000-0x00000000086B5000-memory.dmpFilesize
1.2MB
-
memory/500-142-0x00000000087D0000-0x00000000088C1000-memory.dmpFilesize
964KB
-
memory/500-130-0x00000000073C0000-0x0000000007488000-memory.dmpFilesize
800KB
-
memory/1152-141-0x0000000002D50000-0x0000000002DE3000-memory.dmpFilesize
588KB
-
memory/1152-140-0x0000000002EE0000-0x000000000322A000-memory.dmpFilesize
3.3MB
-
memory/1152-139-0x0000000000BC0000-0x0000000000BEF000-memory.dmpFilesize
188KB
-
memory/1152-138-0x00000000005D0000-0x00000000005F7000-memory.dmpFilesize
156KB
-
memory/1152-136-0x0000000000000000-mapping.dmp
-
memory/2532-129-0x0000000000B50000-0x0000000000E9A000-memory.dmpFilesize
3.3MB
-
memory/2532-134-0x0000000000A40000-0x0000000000A54000-memory.dmpFilesize
80KB
-
memory/2532-131-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/2532-132-0x00000000009E0000-0x00000000009F4000-memory.dmpFilesize
80KB
-
memory/2532-126-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/2532-125-0x0000000000000000-mapping.dmp
-
memory/4504-127-0x0000000074C70000-0x0000000074C80000-memory.dmpFilesize
64KB
-
memory/5116-137-0x0000000000000000-mapping.dmp