Analysis
-
max time kernel
148s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-05-2022 23:23
Static task
static1
Behavioral task
behavioral1
Sample
orden de compra.exe
Resource
win7-20220414-en
General
-
Target
orden de compra.exe
-
Size
423KB
-
MD5
099eb059723bc3e0b11cd0483240e7a8
-
SHA1
d61b35ba4e797cb6568d798bbb59222120f8f33e
-
SHA256
aa4fad19caeb7d4d9abd68155eee268619442c6cfc8a69c2bc337dd4efdf4b4d
-
SHA512
581d078f2dcddb03859456864c716a6053c7af4f0ed06f378304def93fafa928f0deb1edb87206815f98330c8da563b3075c6f38fc5c6f563039296d4c7fbf2f
Malware Config
Extracted
formbook
4.1
kvsz
okashyns.com
sbsgamedaejeon-two.com
drb77.com
top5dating.com
websprings.online
voizers.com
zenith.site
lahistoriade.com
qv85.com
armandonieto.com
priestvedic.com
jessandjeff.net
magic-desktop.com
jitaji.com
ldmeili.com
yuwanqingmy.com
buzhouorg.com
chaiseloungereviews.com
m2g8way.com
freespin-support.com
bocapvang.net
315px.com
eugeniobarros.tech
sif.email
xn--oorv2aj6bj7cds0d6p4b.com
polychips.com
grouptulip.win
landbank.site
bet365c.win
inbonz.com
outofthepark.today
jeaniney.com
weeip.com
dmoneylife.com
rticlubs.com
reisedating.com
marijuanadogbone.com
funippon.com
banknotesync.com
alexandre-boissard.com
valorartetattoo.com
savetheverse.com
specificpcshop.online
h0jt1y.accountant
jiqing3.com
alfaranakle.com
saft-store.com
wanderingcollective.com
santandermobi.online
557023.top
loulancaster.com
vedattelekom.com
jatinangorcity.com
goldencanaries.com
edgaralanbro.com
levelretail.com
taylorsandbek.com
upbeatnewyork.com
motoreselectricoschihuahua.com
hotair.wales
getawomantodoit.com
xiaoxiong365.com
cloudboxsupport.com
vecteur-u-shop.com
fex-tracks.com
Signatures
-
Formbook Payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1072-64-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/1072-65-0x000000000041ECA0-mapping.dmp formbook behavioral1/memory/1072-67-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/1696-78-0x00000000000B0000-0x00000000000DE000-memory.dmp formbook -
Suspicious use of SetThreadContext 4 IoCs
Processes:
orden de compra.exeRegSvcs.exemsiexec.exedescription pid process target process PID 2008 set thread context of 1072 2008 orden de compra.exe RegSvcs.exe PID 1072 set thread context of 1268 1072 RegSvcs.exe Explorer.EXE PID 1072 set thread context of 1268 1072 RegSvcs.exe Explorer.EXE PID 1696 set thread context of 1268 1696 msiexec.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 22 IoCs
Processes:
orden de compra.exeRegSvcs.exemsiexec.exepid process 2008 orden de compra.exe 2008 orden de compra.exe 2008 orden de compra.exe 1072 RegSvcs.exe 1072 RegSvcs.exe 1072 RegSvcs.exe 1696 msiexec.exe 1696 msiexec.exe 1696 msiexec.exe 1696 msiexec.exe 1696 msiexec.exe 1696 msiexec.exe 1696 msiexec.exe 1696 msiexec.exe 1696 msiexec.exe 1696 msiexec.exe 1696 msiexec.exe 1696 msiexec.exe 1696 msiexec.exe 1696 msiexec.exe 1696 msiexec.exe 1696 msiexec.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
RegSvcs.exemsiexec.exepid process 1072 RegSvcs.exe 1072 RegSvcs.exe 1072 RegSvcs.exe 1072 RegSvcs.exe 1696 msiexec.exe 1696 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
orden de compra.exeRegSvcs.exemsiexec.exedescription pid process Token: SeDebugPrivilege 2008 orden de compra.exe Token: SeDebugPrivilege 1072 RegSvcs.exe Token: SeDebugPrivilege 1696 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid process 1268 Explorer.EXE 1268 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Explorer.EXEpid process 1268 Explorer.EXE 1268 Explorer.EXE -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
orden de compra.exeExplorer.EXEmsiexec.exedescription pid process target process PID 2008 wrote to memory of 1372 2008 orden de compra.exe schtasks.exe PID 2008 wrote to memory of 1372 2008 orden de compra.exe schtasks.exe PID 2008 wrote to memory of 1372 2008 orden de compra.exe schtasks.exe PID 2008 wrote to memory of 1372 2008 orden de compra.exe schtasks.exe PID 2008 wrote to memory of 1072 2008 orden de compra.exe RegSvcs.exe PID 2008 wrote to memory of 1072 2008 orden de compra.exe RegSvcs.exe PID 2008 wrote to memory of 1072 2008 orden de compra.exe RegSvcs.exe PID 2008 wrote to memory of 1072 2008 orden de compra.exe RegSvcs.exe PID 2008 wrote to memory of 1072 2008 orden de compra.exe RegSvcs.exe PID 2008 wrote to memory of 1072 2008 orden de compra.exe RegSvcs.exe PID 2008 wrote to memory of 1072 2008 orden de compra.exe RegSvcs.exe PID 2008 wrote to memory of 1072 2008 orden de compra.exe RegSvcs.exe PID 2008 wrote to memory of 1072 2008 orden de compra.exe RegSvcs.exe PID 2008 wrote to memory of 1072 2008 orden de compra.exe RegSvcs.exe PID 1268 wrote to memory of 1696 1268 Explorer.EXE msiexec.exe PID 1268 wrote to memory of 1696 1268 Explorer.EXE msiexec.exe PID 1268 wrote to memory of 1696 1268 Explorer.EXE msiexec.exe PID 1268 wrote to memory of 1696 1268 Explorer.EXE msiexec.exe PID 1268 wrote to memory of 1696 1268 Explorer.EXE msiexec.exe PID 1268 wrote to memory of 1696 1268 Explorer.EXE msiexec.exe PID 1268 wrote to memory of 1696 1268 Explorer.EXE msiexec.exe PID 1696 wrote to memory of 908 1696 msiexec.exe cmd.exe PID 1696 wrote to memory of 908 1696 msiexec.exe cmd.exe PID 1696 wrote to memory of 908 1696 msiexec.exe cmd.exe PID 1696 wrote to memory of 908 1696 msiexec.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\orden de compra.exe"C:\Users\Admin\AppData\Local\Temp\orden de compra.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\xconClO" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB452.tmp"3⤵
- Creates scheduled task(s)
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmpB452.tmpFilesize
1KB
MD59c266a4b43ca4b33f544c90d2d591cbc
SHA1575eeeca3f575a6e82c7b404f83155faf6ffa4de
SHA2560c3646314df4664d5fa22958ec2848b549bc772faf04cb772a19311b9739946d
SHA5129ad833719d387cb616de95d9b30549741232e9d7da2f3b77cf8f1dbcae74789b8e693c8c9fadac2693e06039adff39e3e5a65236057c72d3170986d8b94c5092
-
memory/908-76-0x0000000000000000-mapping.dmp
-
memory/1072-69-0x0000000000230000-0x0000000000244000-memory.dmpFilesize
80KB
-
memory/1072-67-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/1072-68-0x00000000008A0000-0x0000000000BA3000-memory.dmpFilesize
3.0MB
-
memory/1072-72-0x00000000003C0000-0x00000000003D4000-memory.dmpFilesize
80KB
-
memory/1072-65-0x000000000041ECA0-mapping.dmp
-
memory/1072-61-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/1072-62-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/1072-64-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/1268-81-0x0000000006AF0000-0x0000000006C28000-memory.dmpFilesize
1.2MB
-
memory/1268-70-0x0000000004E40000-0x0000000004F1F000-memory.dmpFilesize
892KB
-
memory/1268-73-0x0000000006970000-0x0000000006AED000-memory.dmpFilesize
1.5MB
-
memory/1372-59-0x0000000000000000-mapping.dmp
-
memory/1696-74-0x0000000000000000-mapping.dmp
-
memory/1696-77-0x0000000000040000-0x0000000000054000-memory.dmpFilesize
80KB
-
memory/1696-78-0x00000000000B0000-0x00000000000DE000-memory.dmpFilesize
184KB
-
memory/1696-79-0x0000000002110000-0x0000000002413000-memory.dmpFilesize
3.0MB
-
memory/1696-80-0x0000000001F80000-0x0000000002013000-memory.dmpFilesize
588KB
-
memory/2008-55-0x0000000075DB1000-0x0000000075DB3000-memory.dmpFilesize
8KB
-
memory/2008-56-0x0000000000290000-0x00000000002A0000-memory.dmpFilesize
64KB
-
memory/2008-57-0x0000000004C30000-0x0000000004C8A000-memory.dmpFilesize
360KB
-
memory/2008-54-0x0000000001320000-0x0000000001390000-memory.dmpFilesize
448KB
-
memory/2008-58-0x00000000006E0000-0x0000000000714000-memory.dmpFilesize
208KB