Analysis
-
max time kernel
147s -
max time network
139s -
platform
windows10_x64 -
resource
win10-20220414-en -
submitted
05-05-2022 07:25
Static task
static1
General
-
Target
b86196be9611b795234dff0f3d10d7d59678288391944190b189ad6fad017882.exe
-
Size
214KB
-
MD5
a3aee41648e9fa62d3bfd4db586d97ea
-
SHA1
ea6d36b400e9566964bca70e1edeeb0f096059e4
-
SHA256
b86196be9611b795234dff0f3d10d7d59678288391944190b189ad6fad017882
-
SHA512
52f6fcb224a71d0fa6aa0ab207e61b8e694f2f6c1c30d89900235e22f7f84f6ce97f675853c7eb2e5fabf7fc76a13cf030df28cb9b7cb3f10d1f85b2a071088c
Malware Config
Extracted
formbook
4.1
fw02
payer-breakers.com
thesiscoper.com
rental-villa.com
scovikinnovations.com
hydh33.com
allmyshit.rest
lovejaclyn.com
vanessaruizwriting.com
dufonddelaclasse.com
kiddee168.com
monumentalmarketsllc.com
musclegainfatloss.com
avida.info
cosmo-wellness.net
dandelionfusedigital.com
oversizeloadbanners.com
konstelle.store
sdjnsbd.com
czoqg.xyz
5p6xljjse1lq.xyz
10936.loan
primeiropasso.website
salarydetector.net
the6figureshow.com
ritzluxurytransportation.com
5145.design
web3ido.xyz
starweaverdesigns.com
cbdtz.com
sunwall.xyz
ornitv.com
curateddesignsconsulting.com
businesshairways.biz
willacloud.com
accusecures.com
hl243.com
coffellc.icu
eddrugs2018.com
lidakang.xyz
salesstorecolombia.com
ilina.xyz
partieslikethese.com
peymantasnimi.com
datthocu.xyz
cybertechsolutions.xyz
findy.guru
trybes.space
arulinks.com
yuriookinoart.com
largestjerseysstore.com
fortitude-tech.com
ywfjp.com
b1v097f2avze.xyz
abdullahnazhim.com
zhaoav111.info
cegrowing.com
llaveselmuerto.com
7477e.xyz
chabusinessloans.com
ht-brain.com
app-compound.finance
0085208.com
wewinaccidents.com
ztzfirst.xyz
shishlomarket24.biz
Signatures
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Formbook Payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/3164-119-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/3164-120-0x000000000041F150-mapping.dmp formbook behavioral1/memory/3164-123-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/3164-125-0x00000000007F0000-0x0000000000985000-memory.dmp formbook behavioral1/memory/3916-129-0x0000000000CF0000-0x0000000000D1F000-memory.dmp formbook -
Executes dropped EXE 2 IoCs
Processes:
vnpqm.exevnpqm.exepid process 2808 vnpqm.exe 3164 vnpqm.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
vnpqm.exevnpqm.exemstsc.exedescription pid process target process PID 2808 set thread context of 3164 2808 vnpqm.exe vnpqm.exe PID 3164 set thread context of 3152 3164 vnpqm.exe Explorer.EXE PID 3916 set thread context of 3152 3916 mstsc.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 60 IoCs
Processes:
vnpqm.exemstsc.exepid process 3164 vnpqm.exe 3164 vnpqm.exe 3164 vnpqm.exe 3164 vnpqm.exe 3916 mstsc.exe 3916 mstsc.exe 3916 mstsc.exe 3916 mstsc.exe 3916 mstsc.exe 3916 mstsc.exe 3916 mstsc.exe 3916 mstsc.exe 3916 mstsc.exe 3916 mstsc.exe 3916 mstsc.exe 3916 mstsc.exe 3916 mstsc.exe 3916 mstsc.exe 3916 mstsc.exe 3916 mstsc.exe 3916 mstsc.exe 3916 mstsc.exe 3916 mstsc.exe 3916 mstsc.exe 3916 mstsc.exe 3916 mstsc.exe 3916 mstsc.exe 3916 mstsc.exe 3916 mstsc.exe 3916 mstsc.exe 3916 mstsc.exe 3916 mstsc.exe 3916 mstsc.exe 3916 mstsc.exe 3916 mstsc.exe 3916 mstsc.exe 3916 mstsc.exe 3916 mstsc.exe 3916 mstsc.exe 3916 mstsc.exe 3916 mstsc.exe 3916 mstsc.exe 3916 mstsc.exe 3916 mstsc.exe 3916 mstsc.exe 3916 mstsc.exe 3916 mstsc.exe 3916 mstsc.exe 3916 mstsc.exe 3916 mstsc.exe 3916 mstsc.exe 3916 mstsc.exe 3916 mstsc.exe 3916 mstsc.exe 3916 mstsc.exe 3916 mstsc.exe 3916 mstsc.exe 3916 mstsc.exe 3916 mstsc.exe 3916 mstsc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3152 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
vnpqm.exemstsc.exepid process 3164 vnpqm.exe 3164 vnpqm.exe 3164 vnpqm.exe 3916 mstsc.exe 3916 mstsc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
vnpqm.exemstsc.exedescription pid process Token: SeDebugPrivilege 3164 vnpqm.exe Token: SeDebugPrivilege 3916 mstsc.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
b86196be9611b795234dff0f3d10d7d59678288391944190b189ad6fad017882.exevnpqm.exeExplorer.EXEmstsc.exedescription pid process target process PID 2776 wrote to memory of 2808 2776 b86196be9611b795234dff0f3d10d7d59678288391944190b189ad6fad017882.exe vnpqm.exe PID 2776 wrote to memory of 2808 2776 b86196be9611b795234dff0f3d10d7d59678288391944190b189ad6fad017882.exe vnpqm.exe PID 2776 wrote to memory of 2808 2776 b86196be9611b795234dff0f3d10d7d59678288391944190b189ad6fad017882.exe vnpqm.exe PID 2808 wrote to memory of 3164 2808 vnpqm.exe vnpqm.exe PID 2808 wrote to memory of 3164 2808 vnpqm.exe vnpqm.exe PID 2808 wrote to memory of 3164 2808 vnpqm.exe vnpqm.exe PID 2808 wrote to memory of 3164 2808 vnpqm.exe vnpqm.exe PID 2808 wrote to memory of 3164 2808 vnpqm.exe vnpqm.exe PID 2808 wrote to memory of 3164 2808 vnpqm.exe vnpqm.exe PID 3152 wrote to memory of 3916 3152 Explorer.EXE mstsc.exe PID 3152 wrote to memory of 3916 3152 Explorer.EXE mstsc.exe PID 3152 wrote to memory of 3916 3152 Explorer.EXE mstsc.exe PID 3916 wrote to memory of 4216 3916 mstsc.exe cmd.exe PID 3916 wrote to memory of 4216 3916 mstsc.exe cmd.exe PID 3916 wrote to memory of 4216 3916 mstsc.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\b86196be9611b795234dff0f3d10d7d59678288391944190b189ad6fad017882.exe"C:\Users\Admin\AppData\Local\Temp\b86196be9611b795234dff0f3d10d7d59678288391944190b189ad6fad017882.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\vnpqm.exeC:\Users\Admin\AppData\Local\Temp\vnpqm.exe C:\Users\Admin\AppData\Local\Temp\nwlle3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\vnpqm.exeC:\Users\Admin\AppData\Local\Temp\vnpqm.exe C:\Users\Admin\AppData\Local\Temp\nwlle4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\mstsc.exe"C:\Windows\SysWOW64\mstsc.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\vnpqm.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\nwlleFilesize
4KB
MD53e5540295ef17624a84b738370990263
SHA1f31211168ba1fcabecf9b8ac8788157dcfc38abd
SHA25602b8e56a9555ff71d4bf8e767208e615acc1c070988529f074825fdc785299a7
SHA512834769ee8cd0aa6b4d115158d48c15a004a09b7957acdcc6316f75a0ffbaa44661599c4cef240e98e777a010f5c69b639d30642e84d5f2db78c0e4d3d610efc3
-
C:\Users\Admin\AppData\Local\Temp\pbacyw3t6xt285evxFilesize
184KB
MD5aebd6f7d4b9548b673dcdb3348180a7b
SHA19862bccc5b8bf3fe627dd2554088ac931eee50de
SHA25618e8497ced0059d1a231c09d748ba06b018452f5a7605cdd0612790ca8e899ff
SHA512a18d461cbc15d2f4d7023175d4a55983d2697f723bb616638a15d00c7f37457e466e670f98ff9a5ef8cff0e83a8350e134b6ad5e72b039e4b432315805b6f3a9
-
C:\Users\Admin\AppData\Local\Temp\vnpqm.exeFilesize
5KB
MD57f9a530257f6539adf6cfb0150ecb306
SHA15d2b049fca18b2cf9706dfc716bdc58654408b36
SHA256a28bead116296db46ac6437684a5368451b0a999e1c9822a045bf09a1c48f713
SHA5122905c1a51211712e4c6adfd10cab6f03de00f8386c79f1a2a76d57c8a9d9358c7674fc49f3a939246f6d73db2b4b514cf3fcf60a297dfcc3b2cc684c0f15612c
-
C:\Users\Admin\AppData\Local\Temp\vnpqm.exeFilesize
5KB
MD57f9a530257f6539adf6cfb0150ecb306
SHA15d2b049fca18b2cf9706dfc716bdc58654408b36
SHA256a28bead116296db46ac6437684a5368451b0a999e1c9822a045bf09a1c48f713
SHA5122905c1a51211712e4c6adfd10cab6f03de00f8386c79f1a2a76d57c8a9d9358c7674fc49f3a939246f6d73db2b4b514cf3fcf60a297dfcc3b2cc684c0f15612c
-
C:\Users\Admin\AppData\Local\Temp\vnpqm.exeFilesize
5KB
MD57f9a530257f6539adf6cfb0150ecb306
SHA15d2b049fca18b2cf9706dfc716bdc58654408b36
SHA256a28bead116296db46ac6437684a5368451b0a999e1c9822a045bf09a1c48f713
SHA5122905c1a51211712e4c6adfd10cab6f03de00f8386c79f1a2a76d57c8a9d9358c7674fc49f3a939246f6d73db2b4b514cf3fcf60a297dfcc3b2cc684c0f15612c
-
memory/2808-114-0x0000000000000000-mapping.dmp
-
memory/3152-133-0x00000000066F0000-0x000000000684C000-memory.dmpFilesize
1.4MB
-
memory/3152-126-0x0000000006BF0000-0x0000000006D7D000-memory.dmpFilesize
1.6MB
-
memory/3164-123-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/3164-124-0x0000000000990000-0x0000000000CB0000-memory.dmpFilesize
3.1MB
-
memory/3164-125-0x00000000007F0000-0x0000000000985000-memory.dmpFilesize
1.6MB
-
memory/3164-120-0x000000000041F150-mapping.dmp
-
memory/3164-119-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/3916-127-0x0000000000000000-mapping.dmp
-
memory/3916-128-0x0000000001240000-0x000000000153C000-memory.dmpFilesize
3.0MB
-
memory/3916-129-0x0000000000CF0000-0x0000000000D1F000-memory.dmpFilesize
188KB
-
memory/3916-131-0x0000000005010000-0x0000000005330000-memory.dmpFilesize
3.1MB
-
memory/3916-132-0x0000000004CE0000-0x0000000004E6D000-memory.dmpFilesize
1.6MB
-
memory/4216-130-0x0000000000000000-mapping.dmp