Analysis
-
max time kernel
23s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
12-06-2022 05:49
Static task
static1
Behavioral task
behavioral1
Sample
22456acfdcb04fab3ca55ee4767c57b1a117697c6696a117573d892843122900.exe
Resource
win7-20220414-en
General
-
Target
22456acfdcb04fab3ca55ee4767c57b1a117697c6696a117573d892843122900.exe
-
Size
740KB
-
MD5
0015796b2a88979a2d99752004891750
-
SHA1
d2e1b419e9081f79ac8005e7d9ef719705efcff8
-
SHA256
22456acfdcb04fab3ca55ee4767c57b1a117697c6696a117573d892843122900
-
SHA512
e8b2cad37e22f15b8650fa24812164c7c1e964852e7aabf706f445dc9c96d85368e2b5b3e74b041b0785d9005f56f573f0889c1d8aa737facba85f19237e563c
Malware Config
Extracted
formbook
3.8
h27
2017shoe.store
my-heart.info
bienesenmetros.com
imdanielleberry.com
francescoserio.com
brooklynbeverage.net
mailclickitautoandrv.com
saoliankeji.com
culturo.biz
xsqsb.com
punctuated.media
adhdpicturelab.com
socialsteep.com
enepalgunj.com
accommodation.deals
nishmithapatla.com
mitt.email
eshopworkshop.com
gomesenterprises.com
ooll4v.info
datamop.cloud
news3027.photos
sadelwatterson.com
scubarabbit.com
dmtoam.net
easoop.com
ecoteam.biz
statnook.com
smokesandjokesusa.com
tixdu.com
youngwealthclothing.com
komodomo.com
check-challenge-appeal.help
shakerlaker.com
calipokea.com
buguoye.com
norfolkshabbos.com
halszsgs.com
okyuer.com
liuattorney.com
shoopingenlignetoday.com
bdmcvh.info
tubemp3script.com
thecryptocurrencyreport.com
trav.tools
no-ice.com
christianvideoradio.com
garrettschultz.com
bigskyeffects.net
danielequaresima.online
ocppi3.biz
syruifengzb.com
refinancemiamico.com
d3318.com
akdayyayinlari.com
tiedia.com
arecopdtreatmentsok.live
ventureacademy.info
highplainsponderosadairy.com
mondosconti.com
natura-pure.com
onlinechaslog.site
afreeky.com
getalhub.net
available2.info
Signatures
-
Formbook Payload 2 IoCs
resource yara_rule behavioral1/memory/1380-58-0x0000000000000000-mapping.dmp formbook behavioral1/memory/1380-60-0x0000000000400000-0x000000000042A000-memory.dmp formbook -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1380 22456acfdcb04fab3ca55ee4767c57b1a117697c6696a117573d892843122900.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1120 22456acfdcb04fab3ca55ee4767c57b1a117697c6696a117573d892843122900.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1120 wrote to memory of 1380 1120 22456acfdcb04fab3ca55ee4767c57b1a117697c6696a117573d892843122900.exe 28 PID 1120 wrote to memory of 1380 1120 22456acfdcb04fab3ca55ee4767c57b1a117697c6696a117573d892843122900.exe 28 PID 1120 wrote to memory of 1380 1120 22456acfdcb04fab3ca55ee4767c57b1a117697c6696a117573d892843122900.exe 28 PID 1120 wrote to memory of 1380 1120 22456acfdcb04fab3ca55ee4767c57b1a117697c6696a117573d892843122900.exe 28 PID 1120 wrote to memory of 1380 1120 22456acfdcb04fab3ca55ee4767c57b1a117697c6696a117573d892843122900.exe 28 PID 1120 wrote to memory of 1380 1120 22456acfdcb04fab3ca55ee4767c57b1a117697c6696a117573d892843122900.exe 28 PID 1120 wrote to memory of 1380 1120 22456acfdcb04fab3ca55ee4767c57b1a117697c6696a117573d892843122900.exe 28 PID 1120 wrote to memory of 1380 1120 22456acfdcb04fab3ca55ee4767c57b1a117697c6696a117573d892843122900.exe 28 PID 1120 wrote to memory of 1380 1120 22456acfdcb04fab3ca55ee4767c57b1a117697c6696a117573d892843122900.exe 28 PID 1120 wrote to memory of 1380 1120 22456acfdcb04fab3ca55ee4767c57b1a117697c6696a117573d892843122900.exe 28 PID 1120 wrote to memory of 1380 1120 22456acfdcb04fab3ca55ee4767c57b1a117697c6696a117573d892843122900.exe 28 PID 1120 wrote to memory of 1380 1120 22456acfdcb04fab3ca55ee4767c57b1a117697c6696a117573d892843122900.exe 28 PID 1120 wrote to memory of 1380 1120 22456acfdcb04fab3ca55ee4767c57b1a117697c6696a117573d892843122900.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\22456acfdcb04fab3ca55ee4767c57b1a117697c6696a117573d892843122900.exe"C:\Users\Admin\AppData\Local\Temp\22456acfdcb04fab3ca55ee4767c57b1a117697c6696a117573d892843122900.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Users\Admin\AppData\Local\Temp\22456acfdcb04fab3ca55ee4767c57b1a117697c6696a117573d892843122900.exe"C:\Users\Admin\AppData\Local\Temp\22456acfdcb04fab3ca55ee4767c57b1a117697c6696a117573d892843122900.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1380
-