Analysis
-
max time kernel
185s -
max time network
191s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
11-05-2022 14:09
Static task
static1
Behavioral task
behavioral1
Sample
315e737738df8faaeeb36c8fb6c692a18179675dcd4648a1dc982678e46f8f7c.exe
Resource
win7-20220414-en
General
-
Target
315e737738df8faaeeb36c8fb6c692a18179675dcd4648a1dc982678e46f8f7c.exe
-
Size
733KB
-
MD5
a2225e6ddb8ca51732c83c66f1af9f6f
-
SHA1
bb49ebe5e22ffb213d5f25f8c4dbafff6487ab66
-
SHA256
315e737738df8faaeeb36c8fb6c692a18179675dcd4648a1dc982678e46f8f7c
-
SHA512
18414dff21d71926cc20148efae5f45b49b1a3550dedaad911f1f5f4dc8e91626f6b2610a9801fd3fca5285a6329277714cae52b9c7cba31a276f0f0fd3b3376
Malware Config
Extracted
formbook
4.1
kvsz
hdlivesonlinetv24.com
illaheehillsseniorliving.com
wihong.com
christopher-cost.com
huayvipee.com
csdroped.xyz
relationsvivantes.com
xmcombohome.com
qingc2.com
sunsetcinemamusic.com
anotherheadache.com
connectlcv.com
unitermi.com
cugetarileunuisarman.com
agakegois.com
burnercouture.com
ambassador-holidays.com
schnarr-design.com
2013lang.com
httattoos.com
cleanhardinquiries.credit
jinduowei.com
despoticat.com
tclongke.com
medknizgka.com
mouowgoah.com
ehswholesale.com
sababa.club
facelift.pink
johnhall2020.com
superbahis62.com
erodea.com
dahaizhaofang.ltd
hiddenlighttattoo.com
michaelpte.com
easytradeoptions.com
jlnclub-hz.com
preciousmetals.supply
xn--9p4b887a.com
bigjbbq.com
twoamys.com
tor-one.com
freenfearlesscoaching.com
playmomknowsbest.com
maasiraq.com
michelon.solutions
shortpocketsmusic.com
pure-sonic.com
marilrealty.com
sillvoice.com
gawahrzinerbne.com
qsshop.net
globalmobilityinsights.com
psm-gen.com
stray-love.com
cjsweettreats.com
ulcforum.com
jlizf.com
guidemining.com
1440windingoakswest.com
mixedrealitycolabs.com
shealetics.com
11700.cloud
chazhentan.com
whealthypeople.com
Signatures
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Formbook Payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1696-64-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/1696-65-0x000000000041ED10-mapping.dmp formbook behavioral1/memory/1696-67-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/1284-74-0x0000000000110000-0x000000000013E000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
Processes:
315e737738df8faaeeb36c8fb6c692a18179675dcd4648a1dc982678e46f8f7c.exeRegSvcs.execontrol.exedescription pid process target process PID 1196 set thread context of 1696 1196 315e737738df8faaeeb36c8fb6c692a18179675dcd4648a1dc982678e46f8f7c.exe RegSvcs.exe PID 1696 set thread context of 1200 1696 RegSvcs.exe Explorer.EXE PID 1284 set thread context of 1200 1284 control.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 15 IoCs
Processes:
315e737738df8faaeeb36c8fb6c692a18179675dcd4648a1dc982678e46f8f7c.exeRegSvcs.execontrol.exepid process 1196 315e737738df8faaeeb36c8fb6c692a18179675dcd4648a1dc982678e46f8f7c.exe 1196 315e737738df8faaeeb36c8fb6c692a18179675dcd4648a1dc982678e46f8f7c.exe 1196 315e737738df8faaeeb36c8fb6c692a18179675dcd4648a1dc982678e46f8f7c.exe 1696 RegSvcs.exe 1696 RegSvcs.exe 1284 control.exe 1284 control.exe 1284 control.exe 1284 control.exe 1284 control.exe 1284 control.exe 1284 control.exe 1284 control.exe 1284 control.exe 1284 control.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
RegSvcs.execontrol.exepid process 1696 RegSvcs.exe 1696 RegSvcs.exe 1696 RegSvcs.exe 1284 control.exe 1284 control.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
315e737738df8faaeeb36c8fb6c692a18179675dcd4648a1dc982678e46f8f7c.exeRegSvcs.execontrol.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 1196 315e737738df8faaeeb36c8fb6c692a18179675dcd4648a1dc982678e46f8f7c.exe Token: SeDebugPrivilege 1696 RegSvcs.exe Token: SeDebugPrivilege 1284 control.exe Token: SeShutdownPrivilege 1200 Explorer.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid process 1200 Explorer.EXE 1200 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Explorer.EXEpid process 1200 Explorer.EXE 1200 Explorer.EXE -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
315e737738df8faaeeb36c8fb6c692a18179675dcd4648a1dc982678e46f8f7c.exeExplorer.EXEcontrol.exedescription pid process target process PID 1196 wrote to memory of 1568 1196 315e737738df8faaeeb36c8fb6c692a18179675dcd4648a1dc982678e46f8f7c.exe schtasks.exe PID 1196 wrote to memory of 1568 1196 315e737738df8faaeeb36c8fb6c692a18179675dcd4648a1dc982678e46f8f7c.exe schtasks.exe PID 1196 wrote to memory of 1568 1196 315e737738df8faaeeb36c8fb6c692a18179675dcd4648a1dc982678e46f8f7c.exe schtasks.exe PID 1196 wrote to memory of 1568 1196 315e737738df8faaeeb36c8fb6c692a18179675dcd4648a1dc982678e46f8f7c.exe schtasks.exe PID 1196 wrote to memory of 1696 1196 315e737738df8faaeeb36c8fb6c692a18179675dcd4648a1dc982678e46f8f7c.exe RegSvcs.exe PID 1196 wrote to memory of 1696 1196 315e737738df8faaeeb36c8fb6c692a18179675dcd4648a1dc982678e46f8f7c.exe RegSvcs.exe PID 1196 wrote to memory of 1696 1196 315e737738df8faaeeb36c8fb6c692a18179675dcd4648a1dc982678e46f8f7c.exe RegSvcs.exe PID 1196 wrote to memory of 1696 1196 315e737738df8faaeeb36c8fb6c692a18179675dcd4648a1dc982678e46f8f7c.exe RegSvcs.exe PID 1196 wrote to memory of 1696 1196 315e737738df8faaeeb36c8fb6c692a18179675dcd4648a1dc982678e46f8f7c.exe RegSvcs.exe PID 1196 wrote to memory of 1696 1196 315e737738df8faaeeb36c8fb6c692a18179675dcd4648a1dc982678e46f8f7c.exe RegSvcs.exe PID 1196 wrote to memory of 1696 1196 315e737738df8faaeeb36c8fb6c692a18179675dcd4648a1dc982678e46f8f7c.exe RegSvcs.exe PID 1196 wrote to memory of 1696 1196 315e737738df8faaeeb36c8fb6c692a18179675dcd4648a1dc982678e46f8f7c.exe RegSvcs.exe PID 1196 wrote to memory of 1696 1196 315e737738df8faaeeb36c8fb6c692a18179675dcd4648a1dc982678e46f8f7c.exe RegSvcs.exe PID 1196 wrote to memory of 1696 1196 315e737738df8faaeeb36c8fb6c692a18179675dcd4648a1dc982678e46f8f7c.exe RegSvcs.exe PID 1200 wrote to memory of 1284 1200 Explorer.EXE control.exe PID 1200 wrote to memory of 1284 1200 Explorer.EXE control.exe PID 1200 wrote to memory of 1284 1200 Explorer.EXE control.exe PID 1200 wrote to memory of 1284 1200 Explorer.EXE control.exe PID 1284 wrote to memory of 820 1284 control.exe cmd.exe PID 1284 wrote to memory of 820 1284 control.exe cmd.exe PID 1284 wrote to memory of 820 1284 control.exe cmd.exe PID 1284 wrote to memory of 820 1284 control.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\315e737738df8faaeeb36c8fb6c692a18179675dcd4648a1dc982678e46f8f7c.exe"C:\Users\Admin\AppData\Local\Temp\315e737738df8faaeeb36c8fb6c692a18179675dcd4648a1dc982678e46f8f7c.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TAmIZYH" /XML "C:\Users\Admin\AppData\Local\Temp\tmp6079.tmp"3⤵
- Creates scheduled task(s)
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\control.exe"C:\Windows\SysWOW64\control.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp6079.tmpFilesize
1KB
MD5d6ee9a884dea5ae51c5697c8d0c3da33
SHA1cbf5f5b1e461a1fb1786b5a81b573436002eed17
SHA256eefdc4ec8100ef4a73d7e3ecf0ded0405ca0e5b4f4f1af92715b24fc8e2b7a6c
SHA5121459ec6aa40d7ad592558047fc8797b23cbc39c5fed8cd75bbad9abe4ccee666c13e573acabf0cf5557d01d0e42e9d1d2a65f2e0a0bc0890bdad6d655567f1f9
-
memory/820-75-0x0000000000000000-mapping.dmp
-
memory/1196-57-0x0000000004BC0000-0x0000000004C16000-memory.dmpFilesize
344KB
-
memory/1196-58-0x0000000002220000-0x0000000002256000-memory.dmpFilesize
216KB
-
memory/1196-54-0x0000000000A60000-0x0000000000B20000-memory.dmpFilesize
768KB
-
memory/1196-56-0x00000000004D0000-0x00000000004D8000-memory.dmpFilesize
32KB
-
memory/1196-55-0x00000000009F0000-0x0000000000A46000-memory.dmpFilesize
344KB
-
memory/1200-78-0x0000000006030000-0x0000000006130000-memory.dmpFilesize
1024KB
-
memory/1200-70-0x0000000004210000-0x00000000042E8000-memory.dmpFilesize
864KB
-
memory/1284-71-0x0000000000000000-mapping.dmp
-
memory/1284-77-0x0000000001CA0000-0x0000000001D33000-memory.dmpFilesize
588KB
-
memory/1284-76-0x0000000001DD0000-0x00000000020D3000-memory.dmpFilesize
3.0MB
-
memory/1284-74-0x0000000000110000-0x000000000013E000-memory.dmpFilesize
184KB
-
memory/1284-73-0x0000000000310000-0x000000000032F000-memory.dmpFilesize
124KB
-
memory/1284-72-0x0000000075B71000-0x0000000075B73000-memory.dmpFilesize
8KB
-
memory/1568-59-0x0000000000000000-mapping.dmp
-
memory/1696-69-0x0000000000220000-0x0000000000234000-memory.dmpFilesize
80KB
-
memory/1696-68-0x00000000008A0000-0x0000000000BA3000-memory.dmpFilesize
3.0MB
-
memory/1696-67-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/1696-65-0x000000000041ED10-mapping.dmp
-
memory/1696-64-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/1696-61-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/1696-62-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB