Analysis
-
max time kernel
148s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
26-05-2022 18:52
Static task
static1
Behavioral task
behavioral1
Sample
c6e799eeeba0345de98b4e9a6ac76b82.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
c6e799eeeba0345de98b4e9a6ac76b82.exe
Resource
win10v2004-20220414-en
General
-
Target
c6e799eeeba0345de98b4e9a6ac76b82.exe
-
Size
292KB
-
MD5
c6e799eeeba0345de98b4e9a6ac76b82
-
SHA1
268bafbd996997350d32521a0012602960c5d004
-
SHA256
e17bfb8370c8badf90756f650e1be4794e77a57abb3619c30789364756304759
-
SHA512
b229294931fe70480a7cb0937b33311fa838e5b5f1ac880a1e8fd06b67ddee6c4b691d9a0d93004be86deba5300faf55511cd910fad56f89c4e79b5eead6f681
Malware Config
Extracted
formbook
4.1
nk6l
cbnextra.com
entitysystemsinc.com
55midwoodave.com
ebelizzi.com
khojcity.com
1527brokenoakdrive.site
housinghproperties.com
ratiousa.com
lrcrepresentacoes.net
tocoec.net
khadamatdemnate.com
davidkastner.xyz
gardeniaresort.com
qiantangguoji.com
visaprepaidprocessinq.com
cristinamadara.com
semapisus.xyz
mpwebagency.net
alibabasdeli.com
gigasupplies.com
quantumskillset.com
eajui136.xyz
patsanchezelpaso.com
trined.mobi
amaturz.info
approveprvqsx.xyz
fronterapost.house
clairewashere.site
xn--3jst70hg8f.com
thursdaynightthriller.com
primacykapjlt.xyz
vaginette.site
olitusd.com
paypal-caseid521.com
preose.xyz
ferbsqlv28.club
iffiliatefreedom.com
okdahotel.com
cochuzyan.xyz
hotyachts.net
diamond-beauties.com
storyofsol.com
xianshucai.net
venusmedicalarts.com
energiaorgonu.com
savannah.biz
poeticdaily.com
wilddalmatian.com
kdydkyqksqucyuyen.com
meanmod.xyz
kaka.digital
viewcision.com
wowzerbackupandrestore-us.com
hydrogendatapower.com
427521.com
ponto-bras.space
chevalsk.com
hnftdl.com
nanasyhogar.com
createacarepack.com
wildkraeuter-wochenende.com
uchihomedeco.com
quintongiang.com
mnbvending.com
rthearts.com
Signatures
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Formbook Payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1072-63-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1072-64-0x000000000041F0F0-mapping.dmp formbook behavioral1/memory/1072-67-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1348-75-0x00000000000C0000-0x00000000000EF000-memory.dmp formbook -
Executes dropped EXE 2 IoCs
Processes:
dvukljmnr.exedvukljmnr.exepid process 848 dvukljmnr.exe 1072 dvukljmnr.exe -
Loads dropped DLL 2 IoCs
Processes:
c6e799eeeba0345de98b4e9a6ac76b82.exedvukljmnr.exepid process 1996 c6e799eeeba0345de98b4e9a6ac76b82.exe 848 dvukljmnr.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
dvukljmnr.exedvukljmnr.exeipconfig.exedescription pid process target process PID 848 set thread context of 1072 848 dvukljmnr.exe dvukljmnr.exe PID 1072 set thread context of 1240 1072 dvukljmnr.exe Explorer.EXE PID 1348 set thread context of 1240 1348 ipconfig.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exepid process 1348 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
Processes:
dvukljmnr.exeipconfig.exepid process 1072 dvukljmnr.exe 1072 dvukljmnr.exe 1348 ipconfig.exe 1348 ipconfig.exe 1348 ipconfig.exe 1348 ipconfig.exe 1348 ipconfig.exe 1348 ipconfig.exe 1348 ipconfig.exe 1348 ipconfig.exe 1348 ipconfig.exe 1348 ipconfig.exe 1348 ipconfig.exe 1348 ipconfig.exe 1348 ipconfig.exe 1348 ipconfig.exe 1348 ipconfig.exe 1348 ipconfig.exe 1348 ipconfig.exe 1348 ipconfig.exe 1348 ipconfig.exe 1348 ipconfig.exe 1348 ipconfig.exe 1348 ipconfig.exe 1348 ipconfig.exe 1348 ipconfig.exe 1348 ipconfig.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
dvukljmnr.exeipconfig.exepid process 1072 dvukljmnr.exe 1072 dvukljmnr.exe 1072 dvukljmnr.exe 1348 ipconfig.exe 1348 ipconfig.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
dvukljmnr.exeipconfig.exedescription pid process Token: SeDebugPrivilege 1072 dvukljmnr.exe Token: SeDebugPrivilege 1348 ipconfig.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid process 1240 Explorer.EXE 1240 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Explorer.EXEpid process 1240 Explorer.EXE 1240 Explorer.EXE -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
c6e799eeeba0345de98b4e9a6ac76b82.exedvukljmnr.exeExplorer.EXEipconfig.exedescription pid process target process PID 1996 wrote to memory of 848 1996 c6e799eeeba0345de98b4e9a6ac76b82.exe dvukljmnr.exe PID 1996 wrote to memory of 848 1996 c6e799eeeba0345de98b4e9a6ac76b82.exe dvukljmnr.exe PID 1996 wrote to memory of 848 1996 c6e799eeeba0345de98b4e9a6ac76b82.exe dvukljmnr.exe PID 1996 wrote to memory of 848 1996 c6e799eeeba0345de98b4e9a6ac76b82.exe dvukljmnr.exe PID 848 wrote to memory of 1072 848 dvukljmnr.exe dvukljmnr.exe PID 848 wrote to memory of 1072 848 dvukljmnr.exe dvukljmnr.exe PID 848 wrote to memory of 1072 848 dvukljmnr.exe dvukljmnr.exe PID 848 wrote to memory of 1072 848 dvukljmnr.exe dvukljmnr.exe PID 848 wrote to memory of 1072 848 dvukljmnr.exe dvukljmnr.exe PID 848 wrote to memory of 1072 848 dvukljmnr.exe dvukljmnr.exe PID 848 wrote to memory of 1072 848 dvukljmnr.exe dvukljmnr.exe PID 1240 wrote to memory of 1348 1240 Explorer.EXE ipconfig.exe PID 1240 wrote to memory of 1348 1240 Explorer.EXE ipconfig.exe PID 1240 wrote to memory of 1348 1240 Explorer.EXE ipconfig.exe PID 1240 wrote to memory of 1348 1240 Explorer.EXE ipconfig.exe PID 1348 wrote to memory of 1548 1348 ipconfig.exe cmd.exe PID 1348 wrote to memory of 1548 1348 ipconfig.exe cmd.exe PID 1348 wrote to memory of 1548 1348 ipconfig.exe cmd.exe PID 1348 wrote to memory of 1548 1348 ipconfig.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\c6e799eeeba0345de98b4e9a6ac76b82.exe"C:\Users\Admin\AppData\Local\Temp\c6e799eeeba0345de98b4e9a6ac76b82.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\dvukljmnr.exeC:\Users\Admin\AppData\Local\Temp\dvukljmnr.exe C:\Users\Admin\AppData\Local\Temp\xxsjdcnfw3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\dvukljmnr.exeC:\Users\Admin\AppData\Local\Temp\dvukljmnr.exe C:\Users\Admin\AppData\Local\Temp\xxsjdcnfw4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\SysWOW64\ipconfig.exe"2⤵
- Suspicious use of SetThreadContext
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\dvukljmnr.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\4qh31ayyhk84s8sjtofnFilesize
184KB
MD517179b4032c3411541c24ca24c8c9aae
SHA113f54b0c026b6c7e53aa94df8f73fa24ecaa0393
SHA256b82ca9a52d0ac42aeb246ed7fa0fd7f95c6248f6684b1ab8e6d973ee934ce0b9
SHA5126127e76eec4d121be3ee8a45da44220a33ac57924255738f80edab3b92a7fd7d8f002779fa0f3296f3b795671767853e49dd2642eb43419e373284bfbd8b0201
-
C:\Users\Admin\AppData\Local\Temp\dvukljmnr.exeFilesize
187KB
MD59cecb9e88c1ff3d7a4ffc8bfeb27c2e1
SHA163223ba95bfa3bf5c33b2fa08376afc90b35465e
SHA25678c9548a33abd68ed553bb2a48166afd21041b9d868a0373e4a11b93409db049
SHA512be4365f78f9da5d3ab920100debf9a23f94101c5482db6fbb8708913006483df0a6dc882baac4d11eb942b464e548ac4f31a044f13fe6670b68da1b95a2fdaae
-
C:\Users\Admin\AppData\Local\Temp\dvukljmnr.exeFilesize
187KB
MD59cecb9e88c1ff3d7a4ffc8bfeb27c2e1
SHA163223ba95bfa3bf5c33b2fa08376afc90b35465e
SHA25678c9548a33abd68ed553bb2a48166afd21041b9d868a0373e4a11b93409db049
SHA512be4365f78f9da5d3ab920100debf9a23f94101c5482db6fbb8708913006483df0a6dc882baac4d11eb942b464e548ac4f31a044f13fe6670b68da1b95a2fdaae
-
C:\Users\Admin\AppData\Local\Temp\dvukljmnr.exeFilesize
187KB
MD59cecb9e88c1ff3d7a4ffc8bfeb27c2e1
SHA163223ba95bfa3bf5c33b2fa08376afc90b35465e
SHA25678c9548a33abd68ed553bb2a48166afd21041b9d868a0373e4a11b93409db049
SHA512be4365f78f9da5d3ab920100debf9a23f94101c5482db6fbb8708913006483df0a6dc882baac4d11eb942b464e548ac4f31a044f13fe6670b68da1b95a2fdaae
-
C:\Users\Admin\AppData\Local\Temp\xxsjdcnfwFilesize
4KB
MD5498c16613e82cebca0fc1541214be952
SHA123e7da2aa1b3ef5f3aec1ae51f797da4f421efc5
SHA2567f40da6288c8e939afea7a6512e518933d1802f6b822817b21e3b457af445ce8
SHA512ba6b040c01b60827f893f918de5478e83b53da511ef62d0b10b2a12ec17f64c2ff64bd50dc1be814809153ae90c913370010bacf22636fbd4820b409e6183a7b
-
\Users\Admin\AppData\Local\Temp\dvukljmnr.exeFilesize
187KB
MD59cecb9e88c1ff3d7a4ffc8bfeb27c2e1
SHA163223ba95bfa3bf5c33b2fa08376afc90b35465e
SHA25678c9548a33abd68ed553bb2a48166afd21041b9d868a0373e4a11b93409db049
SHA512be4365f78f9da5d3ab920100debf9a23f94101c5482db6fbb8708913006483df0a6dc882baac4d11eb942b464e548ac4f31a044f13fe6670b68da1b95a2fdaae
-
\Users\Admin\AppData\Local\Temp\dvukljmnr.exeFilesize
187KB
MD59cecb9e88c1ff3d7a4ffc8bfeb27c2e1
SHA163223ba95bfa3bf5c33b2fa08376afc90b35465e
SHA25678c9548a33abd68ed553bb2a48166afd21041b9d868a0373e4a11b93409db049
SHA512be4365f78f9da5d3ab920100debf9a23f94101c5482db6fbb8708913006483df0a6dc882baac4d11eb942b464e548ac4f31a044f13fe6670b68da1b95a2fdaae
-
memory/848-56-0x0000000000000000-mapping.dmp
-
memory/1072-64-0x000000000041F0F0-mapping.dmp
-
memory/1072-63-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1072-67-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1072-68-0x00000000009C0000-0x0000000000CC3000-memory.dmpFilesize
3.0MB
-
memory/1072-69-0x0000000000290000-0x00000000002A4000-memory.dmpFilesize
80KB
-
memory/1240-78-0x0000000004B40000-0x0000000004BFA000-memory.dmpFilesize
744KB
-
memory/1240-70-0x0000000004360000-0x0000000004424000-memory.dmpFilesize
784KB
-
memory/1348-71-0x0000000000000000-mapping.dmp
-
memory/1348-74-0x0000000000E60000-0x0000000000E6A000-memory.dmpFilesize
40KB
-
memory/1348-75-0x00000000000C0000-0x00000000000EF000-memory.dmpFilesize
188KB
-
memory/1348-76-0x0000000002270000-0x0000000002573000-memory.dmpFilesize
3.0MB
-
memory/1348-77-0x0000000000A10000-0x0000000000AA3000-memory.dmpFilesize
588KB
-
memory/1548-73-0x0000000000000000-mapping.dmp
-
memory/1996-54-0x0000000075221000-0x0000000075223000-memory.dmpFilesize
8KB