Analysis
-
max time kernel
150s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20220331-en -
submitted
14-04-2022 12:39
Static task
static1
Behavioral task
behavioral1
Sample
e2cb7aaa6bdd1a9029dd1db1ac0107556641d03608b8e8d520229e216462d779.exe
Resource
win7-20220331-en
General
-
Target
e2cb7aaa6bdd1a9029dd1db1ac0107556641d03608b8e8d520229e216462d779.exe
-
Size
753KB
-
MD5
194e6e2cb1b914c33e5d0ea233f7a813
-
SHA1
82eb016de527bdee7cc391219e1e6cdcdb64ad3d
-
SHA256
e2cb7aaa6bdd1a9029dd1db1ac0107556641d03608b8e8d520229e216462d779
-
SHA512
4cf030e4d43791e0c2006dffb7619e2a1f2b8ca596db01d8e3091b99f04b1d93a5ef36c21fda3189837e4901cc750f0c8c6a9ead93af67c5148c6b663242681b
Malware Config
Extracted
formbook
4.1
fs8
deanpalm.net
dinu-living.com
setsomegoals.com
craftyfresh.email
cleantons.com
szysjfjx.com
shestakova.info
70skinstore.com
ampletrade.ltd
cmmcwomen.group
michinoeki-taka.com
auntoni.com
huochegw.com
abovekulture.com
gzjige.com
americastandproudagain.com
hobbyhousekennels.com
1020waterviewdrive.com
5927399.com
gabipareras.net
computercodecamp.com
kabu-work.com
haxings.online
protanny.com
yuejiaoxuan.com
chikachinwe.com
candidlyadulting.com
realtoday.net
highlandcelticart.com
airshotsus.com
ilnmdyqgl.icu
thelincolntondentist.net
lashvash.com
cozyhomecrate.com
altamirraonline.com
sgn98.com
bdcamp.com
housingneedanalysis.com
bijasani.com
spectrumtechnos.com
tranquiltouch2020.com
mugenkites.com
danasnjenovosti.com
cryptocurrency.wiki
mavangel.com
wilsonislandretreat.com
jerobelaustegui.com
skillsme.school
jusegalt.com
hpg.computer
ye-ya-jian.com
mackayadventurelodge.com
clevengerproperties.com
optimizedaerialsolutions.com
mohinisystem.com
secretary.store
wrightjusticesolicitors.com
time-to-dive.com
techyde.com
finopscert.com
affluentmentoring.com
fengye8.info
a8cpm.com
muellervieh.net
kumcal.com
Signatures
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Formbook Payload 4 IoCs
resource yara_rule behavioral1/memory/600-64-0x000000000041ECD0-mapping.dmp formbook behavioral1/memory/600-63-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/600-66-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/564-73-0x00000000000D0000-0x00000000000FE000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 456 set thread context of 600 456 e2cb7aaa6bdd1a9029dd1db1ac0107556641d03608b8e8d520229e216462d779.exe 30 PID 600 set thread context of 1260 600 RegSvcs.exe 18 PID 564 set thread context of 1260 564 wininit.exe 18 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1280 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 600 RegSvcs.exe 600 RegSvcs.exe 564 wininit.exe 564 wininit.exe 564 wininit.exe 564 wininit.exe 564 wininit.exe 564 wininit.exe 564 wininit.exe 564 wininit.exe 564 wininit.exe 564 wininit.exe 564 wininit.exe 564 wininit.exe 564 wininit.exe 564 wininit.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 600 RegSvcs.exe 600 RegSvcs.exe 600 RegSvcs.exe 564 wininit.exe 564 wininit.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 456 e2cb7aaa6bdd1a9029dd1db1ac0107556641d03608b8e8d520229e216462d779.exe Token: SeDebugPrivilege 600 RegSvcs.exe Token: SeDebugPrivilege 564 wininit.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1260 Explorer.EXE 1260 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1260 Explorer.EXE 1260 Explorer.EXE -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 456 wrote to memory of 1280 456 e2cb7aaa6bdd1a9029dd1db1ac0107556641d03608b8e8d520229e216462d779.exe 28 PID 456 wrote to memory of 1280 456 e2cb7aaa6bdd1a9029dd1db1ac0107556641d03608b8e8d520229e216462d779.exe 28 PID 456 wrote to memory of 1280 456 e2cb7aaa6bdd1a9029dd1db1ac0107556641d03608b8e8d520229e216462d779.exe 28 PID 456 wrote to memory of 1280 456 e2cb7aaa6bdd1a9029dd1db1ac0107556641d03608b8e8d520229e216462d779.exe 28 PID 456 wrote to memory of 600 456 e2cb7aaa6bdd1a9029dd1db1ac0107556641d03608b8e8d520229e216462d779.exe 30 PID 456 wrote to memory of 600 456 e2cb7aaa6bdd1a9029dd1db1ac0107556641d03608b8e8d520229e216462d779.exe 30 PID 456 wrote to memory of 600 456 e2cb7aaa6bdd1a9029dd1db1ac0107556641d03608b8e8d520229e216462d779.exe 30 PID 456 wrote to memory of 600 456 e2cb7aaa6bdd1a9029dd1db1ac0107556641d03608b8e8d520229e216462d779.exe 30 PID 456 wrote to memory of 600 456 e2cb7aaa6bdd1a9029dd1db1ac0107556641d03608b8e8d520229e216462d779.exe 30 PID 456 wrote to memory of 600 456 e2cb7aaa6bdd1a9029dd1db1ac0107556641d03608b8e8d520229e216462d779.exe 30 PID 456 wrote to memory of 600 456 e2cb7aaa6bdd1a9029dd1db1ac0107556641d03608b8e8d520229e216462d779.exe 30 PID 456 wrote to memory of 600 456 e2cb7aaa6bdd1a9029dd1db1ac0107556641d03608b8e8d520229e216462d779.exe 30 PID 456 wrote to memory of 600 456 e2cb7aaa6bdd1a9029dd1db1ac0107556641d03608b8e8d520229e216462d779.exe 30 PID 456 wrote to memory of 600 456 e2cb7aaa6bdd1a9029dd1db1ac0107556641d03608b8e8d520229e216462d779.exe 30 PID 1260 wrote to memory of 564 1260 Explorer.EXE 31 PID 1260 wrote to memory of 564 1260 Explorer.EXE 31 PID 1260 wrote to memory of 564 1260 Explorer.EXE 31 PID 1260 wrote to memory of 564 1260 Explorer.EXE 31 PID 564 wrote to memory of 1556 564 wininit.exe 32 PID 564 wrote to memory of 1556 564 wininit.exe 32 PID 564 wrote to memory of 1556 564 wininit.exe 32 PID 564 wrote to memory of 1556 564 wininit.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Users\Admin\AppData\Local\Temp\e2cb7aaa6bdd1a9029dd1db1ac0107556641d03608b8e8d520229e216462d779.exe"C:\Users\Admin\AppData\Local\Temp\e2cb7aaa6bdd1a9029dd1db1ac0107556641d03608b8e8d520229e216462d779.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\kiAbIarP" /XML "C:\Users\Admin\AppData\Local\Temp\tmpC534.tmp"3⤵
- Creates scheduled task(s)
PID:1280
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:600
-
-
-
C:\Windows\SysWOW64\wininit.exe"C:\Windows\SysWOW64\wininit.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵PID:1556
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD55b5e95434dda65d091e56de094c42a7e
SHA1dbb09a94bbe1468bc6cd017b5e33f05c54bb48f0
SHA25656930acbe02cfc6113bdd4de785df6927309aae90821f66c8a5fd8d9fedebc25
SHA51215667334252aee6cd60545ca0cff544dca74d59eefb4e43921880fdd36f00e0c631a83a575cdf8f0bf10ab6928c87ecde155326a13b8da1fa58abfb7eae8bc96