Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10_x64 -
resource
win10-20220414-en -
submitted
21-05-2022 08:09
Static task
static1
General
-
Target
ac23d509999ba6aeffbf49a41e104a7e876872740dbf24ccff54f5bc36ee3eb6.exe
-
Size
14KB
-
MD5
9f031a71a8f4dedaff85f360942cd0b7
-
SHA1
337686652fc8aa067691eb88e00734b477ca86e5
-
SHA256
ac23d509999ba6aeffbf49a41e104a7e876872740dbf24ccff54f5bc36ee3eb6
-
SHA512
72ee3d4db1507147eeba417f0e69063a123139d9f1f2216927b006c2aa32f9aa0840ee45d74afb8b6c47b104949a9d7d05117e8a7b88bad478fb45521862b42d
Malware Config
Extracted
formbook
4.1
s4s9
qianyuandianshang.com
bernardklein.com
slhomeservices.com
findasaas.com
janellelancaster.xyz
umkpro.site
nr6949.online
mersquare.club
lanariproperties.com
3rdeyefocused.com
giftexpress8260.xyz
hilleleven.xyz
beajod.com
kosazs.online
ishare.team
mb314.com
xjjinxingda.com
ayekooprojectamazing.com
ballsybanter.com
todayshoppingbd.com
recomdietvl.store
zakladmalarstwa.com
bj-ours.com
hubwealth.com
watchmyreview.com
sallyliddicoat.com
eventiliveitalia.com
worldchannelconference.com
suciptahadi.online
ksht5566.com
topfastcashsystemwebshop.com
eyeiieyetv.com
thewarchannel.net
valorousgamers.com
vip01ytre.xyz
szec.tech
233365.xyz
specialroute.net
eugenachase.com
pikoulas.com
shorter-658423.site
win8856.com
burleyqpersianscom.com
sidetrackedmusic.com
chungketvinhomesspotlight.com
qiange.site
motconsultant.com
yottatic.com
usaprostatecenter.com
putovanjazasve.com
kozykornerpizza.com
hainpore.com
52appmj.com
albanyskylights.com
keropy.xyz
infosecrety.xyz
ethlogo.com
labohack.com
veridiumid.xyz
gaylebong.com
rsmegastore.com
janschlesinger.com
cshong-ya.com
shopevix.com
preciousssllc.net
Signatures
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Formbook Payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/4080-124-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/4080-125-0x000000000041F0E0-mapping.dmp formbook behavioral1/memory/4080-130-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1632-136-0x0000000002FB0000-0x0000000002FDF000-memory.dmp formbook -
Suspicious use of SetThreadContext 4 IoCs
Processes:
ac23d509999ba6aeffbf49a41e104a7e876872740dbf24ccff54f5bc36ee3eb6.exeMSBuild.execolorcpl.exedescription pid process target process PID 3192 set thread context of 4080 3192 ac23d509999ba6aeffbf49a41e104a7e876872740dbf24ccff54f5bc36ee3eb6.exe MSBuild.exe PID 4080 set thread context of 1692 4080 MSBuild.exe Explorer.EXE PID 4080 set thread context of 1692 4080 MSBuild.exe Explorer.EXE PID 1632 set thread context of 1692 1632 colorcpl.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1916 timeout.exe -
Suspicious behavior: EnumeratesProcesses 52 IoCs
Processes:
ac23d509999ba6aeffbf49a41e104a7e876872740dbf24ccff54f5bc36ee3eb6.exeMSBuild.execolorcpl.exepid process 3192 ac23d509999ba6aeffbf49a41e104a7e876872740dbf24ccff54f5bc36ee3eb6.exe 3192 ac23d509999ba6aeffbf49a41e104a7e876872740dbf24ccff54f5bc36ee3eb6.exe 4080 MSBuild.exe 4080 MSBuild.exe 4080 MSBuild.exe 4080 MSBuild.exe 4080 MSBuild.exe 4080 MSBuild.exe 1632 colorcpl.exe 1632 colorcpl.exe 1632 colorcpl.exe 1632 colorcpl.exe 1632 colorcpl.exe 1632 colorcpl.exe 1632 colorcpl.exe 1632 colorcpl.exe 1632 colorcpl.exe 1632 colorcpl.exe 1632 colorcpl.exe 1632 colorcpl.exe 1632 colorcpl.exe 1632 colorcpl.exe 1632 colorcpl.exe 1632 colorcpl.exe 1632 colorcpl.exe 1632 colorcpl.exe 1632 colorcpl.exe 1632 colorcpl.exe 1632 colorcpl.exe 1632 colorcpl.exe 1632 colorcpl.exe 1632 colorcpl.exe 1632 colorcpl.exe 1632 colorcpl.exe 1632 colorcpl.exe 1632 colorcpl.exe 1632 colorcpl.exe 1632 colorcpl.exe 1632 colorcpl.exe 1632 colorcpl.exe 1632 colorcpl.exe 1632 colorcpl.exe 1632 colorcpl.exe 1632 colorcpl.exe 1632 colorcpl.exe 1632 colorcpl.exe 1632 colorcpl.exe 1632 colorcpl.exe 1632 colorcpl.exe 1632 colorcpl.exe 1632 colorcpl.exe 1632 colorcpl.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 1692 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
MSBuild.execolorcpl.exepid process 4080 MSBuild.exe 4080 MSBuild.exe 4080 MSBuild.exe 4080 MSBuild.exe 1632 colorcpl.exe 1632 colorcpl.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
ac23d509999ba6aeffbf49a41e104a7e876872740dbf24ccff54f5bc36ee3eb6.exeMSBuild.execolorcpl.exedescription pid process Token: SeDebugPrivilege 3192 ac23d509999ba6aeffbf49a41e104a7e876872740dbf24ccff54f5bc36ee3eb6.exe Token: SeDebugPrivilege 4080 MSBuild.exe Token: SeDebugPrivilege 1632 colorcpl.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
ac23d509999ba6aeffbf49a41e104a7e876872740dbf24ccff54f5bc36ee3eb6.execmd.exeExplorer.EXEcolorcpl.exedescription pid process target process PID 3192 wrote to memory of 1592 3192 ac23d509999ba6aeffbf49a41e104a7e876872740dbf24ccff54f5bc36ee3eb6.exe cmd.exe PID 3192 wrote to memory of 1592 3192 ac23d509999ba6aeffbf49a41e104a7e876872740dbf24ccff54f5bc36ee3eb6.exe cmd.exe PID 3192 wrote to memory of 1592 3192 ac23d509999ba6aeffbf49a41e104a7e876872740dbf24ccff54f5bc36ee3eb6.exe cmd.exe PID 1592 wrote to memory of 1916 1592 cmd.exe timeout.exe PID 1592 wrote to memory of 1916 1592 cmd.exe timeout.exe PID 1592 wrote to memory of 1916 1592 cmd.exe timeout.exe PID 3192 wrote to memory of 4080 3192 ac23d509999ba6aeffbf49a41e104a7e876872740dbf24ccff54f5bc36ee3eb6.exe MSBuild.exe PID 3192 wrote to memory of 4080 3192 ac23d509999ba6aeffbf49a41e104a7e876872740dbf24ccff54f5bc36ee3eb6.exe MSBuild.exe PID 3192 wrote to memory of 4080 3192 ac23d509999ba6aeffbf49a41e104a7e876872740dbf24ccff54f5bc36ee3eb6.exe MSBuild.exe PID 3192 wrote to memory of 4080 3192 ac23d509999ba6aeffbf49a41e104a7e876872740dbf24ccff54f5bc36ee3eb6.exe MSBuild.exe PID 3192 wrote to memory of 4080 3192 ac23d509999ba6aeffbf49a41e104a7e876872740dbf24ccff54f5bc36ee3eb6.exe MSBuild.exe PID 3192 wrote to memory of 4080 3192 ac23d509999ba6aeffbf49a41e104a7e876872740dbf24ccff54f5bc36ee3eb6.exe MSBuild.exe PID 1692 wrote to memory of 1632 1692 Explorer.EXE colorcpl.exe PID 1692 wrote to memory of 1632 1692 Explorer.EXE colorcpl.exe PID 1692 wrote to memory of 1632 1692 Explorer.EXE colorcpl.exe PID 1632 wrote to memory of 3060 1632 colorcpl.exe cmd.exe PID 1632 wrote to memory of 3060 1632 colorcpl.exe cmd.exe PID 1632 wrote to memory of 3060 1632 colorcpl.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\ac23d509999ba6aeffbf49a41e104a7e876872740dbf24ccff54f5bc36ee3eb6.exe"C:\Users\Admin\AppData\Local\Temp\ac23d509999ba6aeffbf49a41e104a7e876872740dbf24ccff54f5bc36ee3eb6.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 23⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 24⤵
- Delays execution with timeout.exe
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵
-
C:\Windows\SysWOW64\colorcpl.exe"C:\Windows\SysWOW64\colorcpl.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1592-122-0x0000000000000000-mapping.dmp
-
memory/1632-138-0x0000000004D10000-0x0000000004EAB000-memory.dmpFilesize
1.6MB
-
memory/1632-137-0x0000000005050000-0x0000000005370000-memory.dmpFilesize
3.1MB
-
memory/1632-135-0x0000000000D70000-0x0000000000D89000-memory.dmpFilesize
100KB
-
memory/1632-136-0x0000000002FB0000-0x0000000002FDF000-memory.dmpFilesize
188KB
-
memory/1632-133-0x0000000000000000-mapping.dmp
-
memory/1692-129-0x0000000002EC0000-0x0000000002FBC000-memory.dmpFilesize
1008KB
-
memory/1692-139-0x0000000006B20000-0x0000000006C94000-memory.dmpFilesize
1.5MB
-
memory/1692-132-0x0000000005800000-0x000000000595F000-memory.dmpFilesize
1.4MB
-
memory/1916-123-0x0000000000000000-mapping.dmp
-
memory/3060-134-0x0000000000000000-mapping.dmp
-
memory/3192-121-0x00000000094F0000-0x000000000953C000-memory.dmpFilesize
304KB
-
memory/3192-116-0x0000000000BC0000-0x0000000000BC8000-memory.dmpFilesize
32KB
-
memory/3192-120-0x0000000004E20000-0x0000000004E8A000-memory.dmpFilesize
424KB
-
memory/3192-119-0x00000000053F0000-0x00000000053FA000-memory.dmpFilesize
40KB
-
memory/3192-118-0x0000000005430000-0x00000000054C2000-memory.dmpFilesize
584KB
-
memory/3192-117-0x0000000005890000-0x0000000005D8E000-memory.dmpFilesize
5.0MB
-
memory/4080-128-0x0000000001730000-0x00000000018CE000-memory.dmpFilesize
1.6MB
-
memory/4080-130-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/4080-131-0x0000000001730000-0x00000000018CE000-memory.dmpFilesize
1.6MB
-
memory/4080-127-0x00000000018D0000-0x0000000001BF0000-memory.dmpFilesize
3.1MB
-
memory/4080-125-0x000000000041F0E0-mapping.dmp
-
memory/4080-124-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB