Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
11-05-2022 14:09
Static task
static1
Behavioral task
behavioral1
Sample
315e737738df8faaeeb36c8fb6c692a18179675dcd4648a1dc982678e46f8f7c.exe
Resource
win7-20220414-en
General
-
Target
315e737738df8faaeeb36c8fb6c692a18179675dcd4648a1dc982678e46f8f7c.exe
-
Size
733KB
-
MD5
a2225e6ddb8ca51732c83c66f1af9f6f
-
SHA1
bb49ebe5e22ffb213d5f25f8c4dbafff6487ab66
-
SHA256
315e737738df8faaeeb36c8fb6c692a18179675dcd4648a1dc982678e46f8f7c
-
SHA512
18414dff21d71926cc20148efae5f45b49b1a3550dedaad911f1f5f4dc8e91626f6b2610a9801fd3fca5285a6329277714cae52b9c7cba31a276f0f0fd3b3376
Malware Config
Extracted
formbook
4.1
kvsz
hdlivesonlinetv24.com
illaheehillsseniorliving.com
wihong.com
christopher-cost.com
huayvipee.com
csdroped.xyz
relationsvivantes.com
xmcombohome.com
qingc2.com
sunsetcinemamusic.com
anotherheadache.com
connectlcv.com
unitermi.com
cugetarileunuisarman.com
agakegois.com
burnercouture.com
ambassador-holidays.com
schnarr-design.com
2013lang.com
httattoos.com
cleanhardinquiries.credit
jinduowei.com
despoticat.com
tclongke.com
medknizgka.com
mouowgoah.com
ehswholesale.com
sababa.club
facelift.pink
johnhall2020.com
superbahis62.com
erodea.com
dahaizhaofang.ltd
hiddenlighttattoo.com
michaelpte.com
easytradeoptions.com
jlnclub-hz.com
preciousmetals.supply
xn--9p4b887a.com
bigjbbq.com
twoamys.com
tor-one.com
freenfearlesscoaching.com
playmomknowsbest.com
maasiraq.com
michelon.solutions
shortpocketsmusic.com
pure-sonic.com
marilrealty.com
sillvoice.com
gawahrzinerbne.com
qsshop.net
globalmobilityinsights.com
psm-gen.com
stray-love.com
cjsweettreats.com
ulcforum.com
jlizf.com
guidemining.com
1440windingoakswest.com
mixedrealitycolabs.com
shealetics.com
11700.cloud
chazhentan.com
whealthypeople.com
Signatures
-
Formbook Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/2304-139-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/688-146-0x0000000000F60000-0x0000000000F8E000-memory.dmp formbook -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
315e737738df8faaeeb36c8fb6c692a18179675dcd4648a1dc982678e46f8f7c.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation 315e737738df8faaeeb36c8fb6c692a18179675dcd4648a1dc982678e46f8f7c.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
315e737738df8faaeeb36c8fb6c692a18179675dcd4648a1dc982678e46f8f7c.exeRegSvcs.execmd.exedescription pid process target process PID 1496 set thread context of 2304 1496 315e737738df8faaeeb36c8fb6c692a18179675dcd4648a1dc982678e46f8f7c.exe RegSvcs.exe PID 2304 set thread context of 3148 2304 RegSvcs.exe Explorer.EXE PID 688 set thread context of 3148 688 cmd.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 38 IoCs
Processes:
315e737738df8faaeeb36c8fb6c692a18179675dcd4648a1dc982678e46f8f7c.exeRegSvcs.execmd.exepid process 1496 315e737738df8faaeeb36c8fb6c692a18179675dcd4648a1dc982678e46f8f7c.exe 1496 315e737738df8faaeeb36c8fb6c692a18179675dcd4648a1dc982678e46f8f7c.exe 1496 315e737738df8faaeeb36c8fb6c692a18179675dcd4648a1dc982678e46f8f7c.exe 1496 315e737738df8faaeeb36c8fb6c692a18179675dcd4648a1dc982678e46f8f7c.exe 1496 315e737738df8faaeeb36c8fb6c692a18179675dcd4648a1dc982678e46f8f7c.exe 1496 315e737738df8faaeeb36c8fb6c692a18179675dcd4648a1dc982678e46f8f7c.exe 2304 RegSvcs.exe 2304 RegSvcs.exe 2304 RegSvcs.exe 2304 RegSvcs.exe 688 cmd.exe 688 cmd.exe 688 cmd.exe 688 cmd.exe 688 cmd.exe 688 cmd.exe 688 cmd.exe 688 cmd.exe 688 cmd.exe 688 cmd.exe 688 cmd.exe 688 cmd.exe 688 cmd.exe 688 cmd.exe 688 cmd.exe 688 cmd.exe 688 cmd.exe 688 cmd.exe 688 cmd.exe 688 cmd.exe 688 cmd.exe 688 cmd.exe 688 cmd.exe 688 cmd.exe 688 cmd.exe 688 cmd.exe 688 cmd.exe 688 cmd.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3148 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
RegSvcs.execmd.exepid process 2304 RegSvcs.exe 2304 RegSvcs.exe 2304 RegSvcs.exe 688 cmd.exe 688 cmd.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
315e737738df8faaeeb36c8fb6c692a18179675dcd4648a1dc982678e46f8f7c.exeRegSvcs.execmd.exedescription pid process Token: SeDebugPrivilege 1496 315e737738df8faaeeb36c8fb6c692a18179675dcd4648a1dc982678e46f8f7c.exe Token: SeDebugPrivilege 2304 RegSvcs.exe Token: SeDebugPrivilege 688 cmd.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
315e737738df8faaeeb36c8fb6c692a18179675dcd4648a1dc982678e46f8f7c.exeExplorer.EXEcmd.exedescription pid process target process PID 1496 wrote to memory of 3912 1496 315e737738df8faaeeb36c8fb6c692a18179675dcd4648a1dc982678e46f8f7c.exe schtasks.exe PID 1496 wrote to memory of 3912 1496 315e737738df8faaeeb36c8fb6c692a18179675dcd4648a1dc982678e46f8f7c.exe schtasks.exe PID 1496 wrote to memory of 3912 1496 315e737738df8faaeeb36c8fb6c692a18179675dcd4648a1dc982678e46f8f7c.exe schtasks.exe PID 1496 wrote to memory of 2304 1496 315e737738df8faaeeb36c8fb6c692a18179675dcd4648a1dc982678e46f8f7c.exe RegSvcs.exe PID 1496 wrote to memory of 2304 1496 315e737738df8faaeeb36c8fb6c692a18179675dcd4648a1dc982678e46f8f7c.exe RegSvcs.exe PID 1496 wrote to memory of 2304 1496 315e737738df8faaeeb36c8fb6c692a18179675dcd4648a1dc982678e46f8f7c.exe RegSvcs.exe PID 1496 wrote to memory of 2304 1496 315e737738df8faaeeb36c8fb6c692a18179675dcd4648a1dc982678e46f8f7c.exe RegSvcs.exe PID 1496 wrote to memory of 2304 1496 315e737738df8faaeeb36c8fb6c692a18179675dcd4648a1dc982678e46f8f7c.exe RegSvcs.exe PID 1496 wrote to memory of 2304 1496 315e737738df8faaeeb36c8fb6c692a18179675dcd4648a1dc982678e46f8f7c.exe RegSvcs.exe PID 3148 wrote to memory of 688 3148 Explorer.EXE cmd.exe PID 3148 wrote to memory of 688 3148 Explorer.EXE cmd.exe PID 3148 wrote to memory of 688 3148 Explorer.EXE cmd.exe PID 688 wrote to memory of 1296 688 cmd.exe cmd.exe PID 688 wrote to memory of 1296 688 cmd.exe cmd.exe PID 688 wrote to memory of 1296 688 cmd.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\315e737738df8faaeeb36c8fb6c692a18179675dcd4648a1dc982678e46f8f7c.exe"C:\Users\Admin\AppData\Local\Temp\315e737738df8faaeeb36c8fb6c692a18179675dcd4648a1dc982678e46f8f7c.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TAmIZYH" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4F0A.tmp"3⤵
- Creates scheduled task(s)
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp4F0A.tmpFilesize
1KB
MD51312483e21d545bbe82a0d1fa83fe023
SHA1cc8f8317e52c32a0030163a5c94bbb7d56bac166
SHA256add5279c3f85f7e9eff2d3925b69f112b43c628137ab065b6fe7aa1fb59c42bf
SHA512cb8d312267d41bb06ffbdf675553502130de8840868e3aaf18a0666086c14ac54dccb465467beec3eaa11b30595f1a9ae94a9c9e37a6a8f4496549f0a003f200
-
memory/688-149-0x0000000001880000-0x0000000001913000-memory.dmpFilesize
588KB
-
memory/688-147-0x0000000001AE0000-0x0000000001E2A000-memory.dmpFilesize
3.3MB
-
memory/688-146-0x0000000000F60000-0x0000000000F8E000-memory.dmpFilesize
184KB
-
memory/688-145-0x0000000000010000-0x000000000006A000-memory.dmpFilesize
360KB
-
memory/688-144-0x0000000000000000-mapping.dmp
-
memory/1296-148-0x0000000000000000-mapping.dmp
-
memory/1496-135-0x00000000061C0000-0x0000000006216000-memory.dmpFilesize
344KB
-
memory/1496-130-0x0000000000FD0000-0x0000000001090000-memory.dmpFilesize
768KB
-
memory/1496-134-0x0000000005AC0000-0x0000000005ACA000-memory.dmpFilesize
40KB
-
memory/1496-133-0x0000000006030000-0x00000000060C2000-memory.dmpFilesize
584KB
-
memory/1496-132-0x0000000006540000-0x0000000006AE4000-memory.dmpFilesize
5.6MB
-
memory/1496-131-0x0000000005EF0000-0x0000000005F8C000-memory.dmpFilesize
624KB
-
memory/2304-138-0x0000000000000000-mapping.dmp
-
memory/2304-139-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/2304-141-0x00000000018C0000-0x0000000001C0A000-memory.dmpFilesize
3.3MB
-
memory/2304-142-0x0000000001C40000-0x0000000001C54000-memory.dmpFilesize
80KB
-
memory/3148-143-0x0000000002720000-0x0000000002881000-memory.dmpFilesize
1.4MB
-
memory/3148-150-0x0000000002B70000-0x0000000002C0F000-memory.dmpFilesize
636KB
-
memory/3912-136-0x0000000000000000-mapping.dmp