Analysis
-
max time kernel
147s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
26-05-2022 18:51
Static task
static1
Behavioral task
behavioral1
Sample
c6e799eeeba0345de98b4e9a6ac76b82.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
c6e799eeeba0345de98b4e9a6ac76b82.exe
Resource
win10v2004-20220414-en
General
-
Target
c6e799eeeba0345de98b4e9a6ac76b82.exe
-
Size
292KB
-
MD5
c6e799eeeba0345de98b4e9a6ac76b82
-
SHA1
268bafbd996997350d32521a0012602960c5d004
-
SHA256
e17bfb8370c8badf90756f650e1be4794e77a57abb3619c30789364756304759
-
SHA512
b229294931fe70480a7cb0937b33311fa838e5b5f1ac880a1e8fd06b67ddee6c4b691d9a0d93004be86deba5300faf55511cd910fad56f89c4e79b5eead6f681
Malware Config
Extracted
formbook
4.1
nk6l
cbnextra.com
entitysystemsinc.com
55midwoodave.com
ebelizzi.com
khojcity.com
1527brokenoakdrive.site
housinghproperties.com
ratiousa.com
lrcrepresentacoes.net
tocoec.net
khadamatdemnate.com
davidkastner.xyz
gardeniaresort.com
qiantangguoji.com
visaprepaidprocessinq.com
cristinamadara.com
semapisus.xyz
mpwebagency.net
alibabasdeli.com
gigasupplies.com
quantumskillset.com
eajui136.xyz
patsanchezelpaso.com
trined.mobi
amaturz.info
approveprvqsx.xyz
fronterapost.house
clairewashere.site
xn--3jst70hg8f.com
thursdaynightthriller.com
primacykapjlt.xyz
vaginette.site
olitusd.com
paypal-caseid521.com
preose.xyz
ferbsqlv28.club
iffiliatefreedom.com
okdahotel.com
cochuzyan.xyz
hotyachts.net
diamond-beauties.com
storyofsol.com
xianshucai.net
venusmedicalarts.com
energiaorgonu.com
savannah.biz
poeticdaily.com
wilddalmatian.com
kdydkyqksqucyuyen.com
meanmod.xyz
kaka.digital
viewcision.com
wowzerbackupandrestore-us.com
hydrogendatapower.com
427521.com
ponto-bras.space
chevalsk.com
hnftdl.com
nanasyhogar.com
createacarepack.com
wildkraeuter-wochenende.com
uchihomedeco.com
quintongiang.com
mnbvending.com
rthearts.com
Signatures
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Formbook Payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1004-63-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1004-64-0x000000000041F0F0-mapping.dmp formbook behavioral1/memory/1004-67-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1796-75-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Executes dropped EXE 2 IoCs
Processes:
dvukljmnr.exedvukljmnr.exepid process 1988 dvukljmnr.exe 1004 dvukljmnr.exe -
Loads dropped DLL 2 IoCs
Processes:
c6e799eeeba0345de98b4e9a6ac76b82.exedvukljmnr.exepid process 1784 c6e799eeeba0345de98b4e9a6ac76b82.exe 1988 dvukljmnr.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
dvukljmnr.exedvukljmnr.exeexplorer.exedescription pid process target process PID 1988 set thread context of 1004 1988 dvukljmnr.exe dvukljmnr.exe PID 1004 set thread context of 1212 1004 dvukljmnr.exe Explorer.EXE PID 1796 set thread context of 1212 1796 explorer.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 27 IoCs
Processes:
dvukljmnr.exeexplorer.exepid process 1004 dvukljmnr.exe 1004 dvukljmnr.exe 1796 explorer.exe 1796 explorer.exe 1796 explorer.exe 1796 explorer.exe 1796 explorer.exe 1796 explorer.exe 1796 explorer.exe 1796 explorer.exe 1796 explorer.exe 1796 explorer.exe 1796 explorer.exe 1796 explorer.exe 1796 explorer.exe 1796 explorer.exe 1796 explorer.exe 1796 explorer.exe 1796 explorer.exe 1796 explorer.exe 1796 explorer.exe 1796 explorer.exe 1796 explorer.exe 1796 explorer.exe 1796 explorer.exe 1796 explorer.exe 1796 explorer.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
dvukljmnr.exeexplorer.exepid process 1004 dvukljmnr.exe 1004 dvukljmnr.exe 1004 dvukljmnr.exe 1796 explorer.exe 1796 explorer.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
dvukljmnr.exeexplorer.exedescription pid process Token: SeDebugPrivilege 1004 dvukljmnr.exe Token: SeDebugPrivilege 1796 explorer.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid process 1212 Explorer.EXE 1212 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Explorer.EXEpid process 1212 Explorer.EXE 1212 Explorer.EXE -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
c6e799eeeba0345de98b4e9a6ac76b82.exedvukljmnr.exeExplorer.EXEexplorer.exedescription pid process target process PID 1784 wrote to memory of 1988 1784 c6e799eeeba0345de98b4e9a6ac76b82.exe dvukljmnr.exe PID 1784 wrote to memory of 1988 1784 c6e799eeeba0345de98b4e9a6ac76b82.exe dvukljmnr.exe PID 1784 wrote to memory of 1988 1784 c6e799eeeba0345de98b4e9a6ac76b82.exe dvukljmnr.exe PID 1784 wrote to memory of 1988 1784 c6e799eeeba0345de98b4e9a6ac76b82.exe dvukljmnr.exe PID 1988 wrote to memory of 1004 1988 dvukljmnr.exe dvukljmnr.exe PID 1988 wrote to memory of 1004 1988 dvukljmnr.exe dvukljmnr.exe PID 1988 wrote to memory of 1004 1988 dvukljmnr.exe dvukljmnr.exe PID 1988 wrote to memory of 1004 1988 dvukljmnr.exe dvukljmnr.exe PID 1988 wrote to memory of 1004 1988 dvukljmnr.exe dvukljmnr.exe PID 1988 wrote to memory of 1004 1988 dvukljmnr.exe dvukljmnr.exe PID 1988 wrote to memory of 1004 1988 dvukljmnr.exe dvukljmnr.exe PID 1212 wrote to memory of 1796 1212 Explorer.EXE explorer.exe PID 1212 wrote to memory of 1796 1212 Explorer.EXE explorer.exe PID 1212 wrote to memory of 1796 1212 Explorer.EXE explorer.exe PID 1212 wrote to memory of 1796 1212 Explorer.EXE explorer.exe PID 1796 wrote to memory of 1316 1796 explorer.exe cmd.exe PID 1796 wrote to memory of 1316 1796 explorer.exe cmd.exe PID 1796 wrote to memory of 1316 1796 explorer.exe cmd.exe PID 1796 wrote to memory of 1316 1796 explorer.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\c6e799eeeba0345de98b4e9a6ac76b82.exe"C:\Users\Admin\AppData\Local\Temp\c6e799eeeba0345de98b4e9a6ac76b82.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Users\Admin\AppData\Local\Temp\dvukljmnr.exeC:\Users\Admin\AppData\Local\Temp\dvukljmnr.exe C:\Users\Admin\AppData\Local\Temp\xxsjdcnfw3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\dvukljmnr.exeC:\Users\Admin\AppData\Local\Temp\dvukljmnr.exe C:\Users\Admin\AppData\Local\Temp\xxsjdcnfw4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1004
-
-
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\dvukljmnr.exe"3⤵PID:1316
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD517179b4032c3411541c24ca24c8c9aae
SHA113f54b0c026b6c7e53aa94df8f73fa24ecaa0393
SHA256b82ca9a52d0ac42aeb246ed7fa0fd7f95c6248f6684b1ab8e6d973ee934ce0b9
SHA5126127e76eec4d121be3ee8a45da44220a33ac57924255738f80edab3b92a7fd7d8f002779fa0f3296f3b795671767853e49dd2642eb43419e373284bfbd8b0201
-
Filesize
187KB
MD59cecb9e88c1ff3d7a4ffc8bfeb27c2e1
SHA163223ba95bfa3bf5c33b2fa08376afc90b35465e
SHA25678c9548a33abd68ed553bb2a48166afd21041b9d868a0373e4a11b93409db049
SHA512be4365f78f9da5d3ab920100debf9a23f94101c5482db6fbb8708913006483df0a6dc882baac4d11eb942b464e548ac4f31a044f13fe6670b68da1b95a2fdaae
-
Filesize
187KB
MD59cecb9e88c1ff3d7a4ffc8bfeb27c2e1
SHA163223ba95bfa3bf5c33b2fa08376afc90b35465e
SHA25678c9548a33abd68ed553bb2a48166afd21041b9d868a0373e4a11b93409db049
SHA512be4365f78f9da5d3ab920100debf9a23f94101c5482db6fbb8708913006483df0a6dc882baac4d11eb942b464e548ac4f31a044f13fe6670b68da1b95a2fdaae
-
Filesize
187KB
MD59cecb9e88c1ff3d7a4ffc8bfeb27c2e1
SHA163223ba95bfa3bf5c33b2fa08376afc90b35465e
SHA25678c9548a33abd68ed553bb2a48166afd21041b9d868a0373e4a11b93409db049
SHA512be4365f78f9da5d3ab920100debf9a23f94101c5482db6fbb8708913006483df0a6dc882baac4d11eb942b464e548ac4f31a044f13fe6670b68da1b95a2fdaae
-
Filesize
4KB
MD5498c16613e82cebca0fc1541214be952
SHA123e7da2aa1b3ef5f3aec1ae51f797da4f421efc5
SHA2567f40da6288c8e939afea7a6512e518933d1802f6b822817b21e3b457af445ce8
SHA512ba6b040c01b60827f893f918de5478e83b53da511ef62d0b10b2a12ec17f64c2ff64bd50dc1be814809153ae90c913370010bacf22636fbd4820b409e6183a7b
-
Filesize
187KB
MD59cecb9e88c1ff3d7a4ffc8bfeb27c2e1
SHA163223ba95bfa3bf5c33b2fa08376afc90b35465e
SHA25678c9548a33abd68ed553bb2a48166afd21041b9d868a0373e4a11b93409db049
SHA512be4365f78f9da5d3ab920100debf9a23f94101c5482db6fbb8708913006483df0a6dc882baac4d11eb942b464e548ac4f31a044f13fe6670b68da1b95a2fdaae
-
Filesize
187KB
MD59cecb9e88c1ff3d7a4ffc8bfeb27c2e1
SHA163223ba95bfa3bf5c33b2fa08376afc90b35465e
SHA25678c9548a33abd68ed553bb2a48166afd21041b9d868a0373e4a11b93409db049
SHA512be4365f78f9da5d3ab920100debf9a23f94101c5482db6fbb8708913006483df0a6dc882baac4d11eb942b464e548ac4f31a044f13fe6670b68da1b95a2fdaae