Analysis
-
max time kernel
147s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20220331-en -
submitted
14-04-2022 12:40
Static task
static1
Behavioral task
behavioral1
Sample
e2328874b4deb0accd85b76ba1a5f7734dc7e70ff17f4722bf9158d54a0aab96.exe
Resource
win7-20220414-en
General
-
Target
e2328874b4deb0accd85b76ba1a5f7734dc7e70ff17f4722bf9158d54a0aab96.exe
-
Size
747KB
-
MD5
86882908b1bf788112a2da6bfde08a7c
-
SHA1
995c4ab5a4bab535066635f287f87799691f4ff8
-
SHA256
e2328874b4deb0accd85b76ba1a5f7734dc7e70ff17f4722bf9158d54a0aab96
-
SHA512
88af00ef5a33ef12208ea42e51b1892f127bb755b3032beef8bc3d281685d9fb82721cc85bce672740773dca38c2f55a816175effa45a86bec69e20b48783321
Malware Config
Extracted
formbook
4.1
fs8
deanpalm.net
dinu-living.com
setsomegoals.com
craftyfresh.email
cleantons.com
szysjfjx.com
shestakova.info
70skinstore.com
ampletrade.ltd
cmmcwomen.group
michinoeki-taka.com
auntoni.com
huochegw.com
abovekulture.com
gzjige.com
americastandproudagain.com
hobbyhousekennels.com
1020waterviewdrive.com
5927399.com
gabipareras.net
computercodecamp.com
kabu-work.com
haxings.online
protanny.com
yuejiaoxuan.com
chikachinwe.com
candidlyadulting.com
realtoday.net
highlandcelticart.com
airshotsus.com
ilnmdyqgl.icu
thelincolntondentist.net
lashvash.com
cozyhomecrate.com
altamirraonline.com
sgn98.com
bdcamp.com
housingneedanalysis.com
bijasani.com
spectrumtechnos.com
tranquiltouch2020.com
mugenkites.com
danasnjenovosti.com
cryptocurrency.wiki
mavangel.com
wilsonislandretreat.com
jerobelaustegui.com
skillsme.school
jusegalt.com
hpg.computer
ye-ya-jian.com
mackayadventurelodge.com
clevengerproperties.com
optimizedaerialsolutions.com
mohinisystem.com
secretary.store
wrightjusticesolicitors.com
time-to-dive.com
techyde.com
finopscert.com
affluentmentoring.com
fengye8.info
a8cpm.com
muellervieh.net
kumcal.com
Signatures
-
Meta Stealer Stealer
Meta Stealer steals passwords stored in browsers, written in C++.
-
Formbook Payload 2 IoCs
resource yara_rule behavioral2/memory/4068-134-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/1664-141-0x0000000000A60000-0x0000000000A8E000-memory.dmp formbook -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-157025953-3125636059-437143553-1000\Control Panel\International\Geo\Nation e2328874b4deb0accd85b76ba1a5f7734dc7e70ff17f4722bf9158d54a0aab96.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4752 set thread context of 4068 4752 e2328874b4deb0accd85b76ba1a5f7734dc7e70ff17f4722bf9158d54a0aab96.exe 95 PID 4068 set thread context of 764 4068 RegSvcs.exe 35 PID 1664 set thread context of 764 1664 explorer.exe 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 824 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4752 e2328874b4deb0accd85b76ba1a5f7734dc7e70ff17f4722bf9158d54a0aab96.exe 4752 e2328874b4deb0accd85b76ba1a5f7734dc7e70ff17f4722bf9158d54a0aab96.exe 4068 RegSvcs.exe 4068 RegSvcs.exe 4068 RegSvcs.exe 4068 RegSvcs.exe 1664 explorer.exe 1664 explorer.exe 1664 explorer.exe 1664 explorer.exe 1664 explorer.exe 1664 explorer.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 4068 RegSvcs.exe 4068 RegSvcs.exe 4068 RegSvcs.exe 1664 explorer.exe 1664 explorer.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4752 e2328874b4deb0accd85b76ba1a5f7734dc7e70ff17f4722bf9158d54a0aab96.exe Token: SeDebugPrivilege 4068 RegSvcs.exe Token: SeDebugPrivilege 1664 explorer.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 764 Explorer.EXE 764 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4752 wrote to memory of 824 4752 e2328874b4deb0accd85b76ba1a5f7734dc7e70ff17f4722bf9158d54a0aab96.exe 92 PID 4752 wrote to memory of 824 4752 e2328874b4deb0accd85b76ba1a5f7734dc7e70ff17f4722bf9158d54a0aab96.exe 92 PID 4752 wrote to memory of 824 4752 e2328874b4deb0accd85b76ba1a5f7734dc7e70ff17f4722bf9158d54a0aab96.exe 92 PID 4752 wrote to memory of 2940 4752 e2328874b4deb0accd85b76ba1a5f7734dc7e70ff17f4722bf9158d54a0aab96.exe 94 PID 4752 wrote to memory of 2940 4752 e2328874b4deb0accd85b76ba1a5f7734dc7e70ff17f4722bf9158d54a0aab96.exe 94 PID 4752 wrote to memory of 2940 4752 e2328874b4deb0accd85b76ba1a5f7734dc7e70ff17f4722bf9158d54a0aab96.exe 94 PID 4752 wrote to memory of 4068 4752 e2328874b4deb0accd85b76ba1a5f7734dc7e70ff17f4722bf9158d54a0aab96.exe 95 PID 4752 wrote to memory of 4068 4752 e2328874b4deb0accd85b76ba1a5f7734dc7e70ff17f4722bf9158d54a0aab96.exe 95 PID 4752 wrote to memory of 4068 4752 e2328874b4deb0accd85b76ba1a5f7734dc7e70ff17f4722bf9158d54a0aab96.exe 95 PID 4752 wrote to memory of 4068 4752 e2328874b4deb0accd85b76ba1a5f7734dc7e70ff17f4722bf9158d54a0aab96.exe 95 PID 4752 wrote to memory of 4068 4752 e2328874b4deb0accd85b76ba1a5f7734dc7e70ff17f4722bf9158d54a0aab96.exe 95 PID 4752 wrote to memory of 4068 4752 e2328874b4deb0accd85b76ba1a5f7734dc7e70ff17f4722bf9158d54a0aab96.exe 95 PID 764 wrote to memory of 1664 764 Explorer.EXE 96 PID 764 wrote to memory of 1664 764 Explorer.EXE 96 PID 764 wrote to memory of 1664 764 Explorer.EXE 96 PID 1664 wrote to memory of 4116 1664 explorer.exe 97 PID 1664 wrote to memory of 4116 1664 explorer.exe 97 PID 1664 wrote to memory of 4116 1664 explorer.exe 97
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Users\Admin\AppData\Local\Temp\e2328874b4deb0accd85b76ba1a5f7734dc7e70ff17f4722bf9158d54a0aab96.exe"C:\Users\Admin\AppData\Local\Temp\e2328874b4deb0accd85b76ba1a5f7734dc7e70ff17f4722bf9158d54a0aab96.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\atPWLmI" /XML "C:\Users\Admin\AppData\Local\Temp\tmp28E5.tmp"3⤵
- Creates scheduled task(s)
PID:824
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"3⤵PID:2940
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4068
-
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵PID:4116
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e85de933c16e13b66a1c5e6630b9511d
SHA1f94a4a60a461429e8441941d6b01576e82dbfbb3
SHA256823cc84ebeb177ec7149ed9f2a22b8e2048d61a279b7724e503281fd7feb639b
SHA512b464d79d84a866001330c611b2a1c131ed7fa22510e537267f33540b7af6954ad4f34af1c32e49bfb6b4a14c8318aa3459a0b0ace56dfc5952c430ff1faac193