Analysis
-
max time kernel
187s -
max time network
191s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
25-06-2022 10:17
Static task
static1
Behavioral task
behavioral1
Sample
3979bd4374308cc1a5a91f04c080b480dc4081dd2612aa2a9d1b504f09b7367c.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3979bd4374308cc1a5a91f04c080b480dc4081dd2612aa2a9d1b504f09b7367c.exe
Resource
win10v2004-20220414-en
General
-
Target
3979bd4374308cc1a5a91f04c080b480dc4081dd2612aa2a9d1b504f09b7367c.exe
-
Size
747KB
-
MD5
3cd2595e3d20f8200d3ddf84b81932de
-
SHA1
c05f5a5fd2e0da7be16621a5482541f3d492891c
-
SHA256
3979bd4374308cc1a5a91f04c080b480dc4081dd2612aa2a9d1b504f09b7367c
-
SHA512
fbc314a53bb2eeba48c0cf5793cc93b1f9361e62aa38de34c941d57bb677b0868e651ed46b783fef939c4b9659048b4a555c3e647201aae7ce1f9e9bf0731670
Malware Config
Extracted
formbook
3.9
cix
stephaniperold.com
sorairo12.com
palumasteknik.com
marketing4proptech.com
iwanttoheargod.com
structured-waters.com
sunvalleyvacations.net
sanketweb.com
tmasco.com
d-valentine.com
engmousavi.com
lithiumtolashes.com
texastramper.com
shoemall.store
beginningguitarbook.com
wonderlustnfairytales.com
bizinabox.store
kmacg.net
cashgold4cash.com
smtpguide.com
mmbl365.net
jmmjds.com
femmesquicomptent.com
izm-realestate.com
ingertona.com
getdge.com
sweeditalyphotography.com
entertainmenttoday.today
nwsouthroad.com
lstjs.com
sullivansandbox.com
adidasstoredk.com
thekalpataruyashodhan.net
illinoislaserengraving.com
wolvesretreats.com
voguestar-auto.com
haodao.ltd
bitsgo.net
ceramicsell.com
eee742.com
gryyt.info
stakeblock.com
ya-coffee.com
presidentialrxhealth.com
constructfed.com
toabetterworld.net
videostigers.com
xn--9swu6mv1h53c550dk8a.com
mushoku40dai.com
supercandylollipop.com
covepointmarineservices.net
salonluckyseven.biz
cameraddns.net
completereco.com
caripenyakitmu.com
enginewarninglights.com
yutaiwang.com
shoulu.info
max-bravely.net
interioriz.com
hongzhou.group
hpcustermercare.com
fitocoolvdwa.com
bigbrain.site
samperd.com
Signatures
-
404 Keylogger
Information stealer and keylogger first seen in 2019.
-
404 Keylogger Main Executable 3 IoCs
resource yara_rule behavioral2/files/0x00060000000231f3-150.dat family_404keylogger behavioral2/files/0x00060000000231f3-152.dat family_404keylogger behavioral2/memory/2752-171-0x0000000000F10000-0x0000000000F2E000-memory.dmp family_404keylogger -
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Formbook Payload 4 IoCs
resource yara_rule behavioral2/memory/4532-162-0x0000000000400000-0x00000000004BE000-memory.dmp formbook behavioral2/memory/4532-163-0x0000000000400000-0x000000000042A000-memory.dmp formbook behavioral2/memory/4524-178-0x0000000000890000-0x00000000008BA000-memory.dmp formbook behavioral2/memory/4524-185-0x0000000000890000-0x00000000008BA000-memory.dmp formbook -
Executes dropped EXE 3 IoCs
pid Process 4488 Coseismic.scr 2752 Payment receipt.exe 4532 Coseismic.scr -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation 3979bd4374308cc1a5a91f04c080b480dc4081dd2612aa2a9d1b504f09b7367c.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Payment receipt.exe Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Payment receipt.exe Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Payment receipt.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce Coseismic.scr Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\plymouthism = "wscript \"C:\\Users\\Admin\\Pinatype\\Coseismic.vbs\"" Coseismic.scr Key created \Registry\Machine\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run raserver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HBI4AN6XCX = "C:\\Program Files (x86)\\Kwxxpofw\\winib9l_r2.exe" raserver.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 45 checkip.dyndns.org -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4532 set thread context of 3168 4532 Coseismic.scr 26 PID 4524 set thread context of 3168 4524 raserver.exe 26 -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Kwxxpofw\winib9l_r2.exe raserver.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\win.ini 3979bd4374308cc1a5a91f04c080b480dc4081dd2612aa2a9d1b504f09b7367c.exe File opened for modification C:\Windows\win.ini 3979bd4374308cc1a5a91f04c080b480dc4081dd2612aa2a9d1b504f09b7367c.exe File opened for modification C:\Windows\win.ini Coseismic.scr File opened for modification C:\Windows\win.ini Coseismic.scr -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \Registry\User\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 raserver.exe -
Suspicious behavior: EnumeratesProcesses 41 IoCs
pid Process 4532 Coseismic.scr 4532 Coseismic.scr 4532 Coseismic.scr 4532 Coseismic.scr 4524 raserver.exe 4524 raserver.exe 4524 raserver.exe 4524 raserver.exe 2752 Payment receipt.exe 4524 raserver.exe 4524 raserver.exe 4524 raserver.exe 4524 raserver.exe 4524 raserver.exe 4524 raserver.exe 4524 raserver.exe 4524 raserver.exe 4524 raserver.exe 4524 raserver.exe 4524 raserver.exe 4524 raserver.exe 4524 raserver.exe 4524 raserver.exe 4524 raserver.exe 4524 raserver.exe 4524 raserver.exe 4524 raserver.exe 4524 raserver.exe 4524 raserver.exe 4524 raserver.exe 4524 raserver.exe 4524 raserver.exe 4524 raserver.exe 4524 raserver.exe 4524 raserver.exe 4524 raserver.exe 4524 raserver.exe 4524 raserver.exe 4524 raserver.exe 4524 raserver.exe 4524 raserver.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3168 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 4532 Coseismic.scr 4532 Coseismic.scr 4532 Coseismic.scr 4524 raserver.exe 4524 raserver.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 4532 Coseismic.scr Token: SeDebugPrivilege 2752 Payment receipt.exe Token: SeDebugPrivilege 4524 raserver.exe Token: SeShutdownPrivilege 3168 Explorer.EXE Token: SeCreatePagefilePrivilege 3168 Explorer.EXE Token: SeShutdownPrivilege 3168 Explorer.EXE Token: SeCreatePagefilePrivilege 3168 Explorer.EXE -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 4976 3979bd4374308cc1a5a91f04c080b480dc4081dd2612aa2a9d1b504f09b7367c.exe 3580 3979bd4374308cc1a5a91f04c080b480dc4081dd2612aa2a9d1b504f09b7367c.exe 4488 Coseismic.scr 4532 Coseismic.scr 2752 Payment receipt.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4976 wrote to memory of 3580 4976 3979bd4374308cc1a5a91f04c080b480dc4081dd2612aa2a9d1b504f09b7367c.exe 81 PID 4976 wrote to memory of 3580 4976 3979bd4374308cc1a5a91f04c080b480dc4081dd2612aa2a9d1b504f09b7367c.exe 81 PID 4976 wrote to memory of 3580 4976 3979bd4374308cc1a5a91f04c080b480dc4081dd2612aa2a9d1b504f09b7367c.exe 81 PID 3580 wrote to memory of 4488 3580 3979bd4374308cc1a5a91f04c080b480dc4081dd2612aa2a9d1b504f09b7367c.exe 82 PID 3580 wrote to memory of 4488 3580 3979bd4374308cc1a5a91f04c080b480dc4081dd2612aa2a9d1b504f09b7367c.exe 82 PID 3580 wrote to memory of 4488 3580 3979bd4374308cc1a5a91f04c080b480dc4081dd2612aa2a9d1b504f09b7367c.exe 82 PID 3580 wrote to memory of 2752 3580 3979bd4374308cc1a5a91f04c080b480dc4081dd2612aa2a9d1b504f09b7367c.exe 83 PID 3580 wrote to memory of 2752 3580 3979bd4374308cc1a5a91f04c080b480dc4081dd2612aa2a9d1b504f09b7367c.exe 83 PID 3580 wrote to memory of 2752 3580 3979bd4374308cc1a5a91f04c080b480dc4081dd2612aa2a9d1b504f09b7367c.exe 83 PID 4488 wrote to memory of 4532 4488 Coseismic.scr 84 PID 4488 wrote to memory of 4532 4488 Coseismic.scr 84 PID 4488 wrote to memory of 4532 4488 Coseismic.scr 84 PID 3168 wrote to memory of 4524 3168 Explorer.EXE 85 PID 3168 wrote to memory of 4524 3168 Explorer.EXE 85 PID 3168 wrote to memory of 4524 3168 Explorer.EXE 85 PID 4524 wrote to memory of 2388 4524 raserver.exe 86 PID 4524 wrote to memory of 2388 4524 raserver.exe 86 PID 4524 wrote to memory of 2388 4524 raserver.exe 86 PID 4524 wrote to memory of 4420 4524 raserver.exe 90 PID 4524 wrote to memory of 4420 4524 raserver.exe 90 PID 4524 wrote to memory of 4420 4524 raserver.exe 90 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Payment receipt.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Payment receipt.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Users\Admin\AppData\Local\Temp\3979bd4374308cc1a5a91f04c080b480dc4081dd2612aa2a9d1b504f09b7367c.exe"C:\Users\Admin\AppData\Local\Temp\3979bd4374308cc1a5a91f04c080b480dc4081dd2612aa2a9d1b504f09b7367c.exe"2⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Users\Admin\AppData\Local\Temp\3979bd4374308cc1a5a91f04c080b480dc4081dd2612aa2a9d1b504f09b7367c.exe"C:\Users\Admin\AppData\Local\Temp\3979bd4374308cc1a5a91f04c080b480dc4081dd2612aa2a9d1b504f09b7367c.exe"3⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Users\Admin\Pinatype\Coseismic.scr"C:\Users\Admin\Pinatype\Coseismic.scr" /S4⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Users\Admin\Pinatype\Coseismic.scr"C:\Users\Admin\Pinatype\Coseismic.scr" /S5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4532
-
-
-
C:\Users\Admin\Payment receipt.exe"C:\Users\Admin\Payment receipt.exe"4⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:2752
-
-
-
-
C:\Windows\SysWOW64\raserver.exe"C:\Windows\SysWOW64\raserver.exe"2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\Pinatype\Coseismic.scr"3⤵PID:2388
-
-
C:\Windows\SysWOW64\cmd.exe/c copy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\Admin\AppData\Local\Temp\DB1" /V3⤵PID:4420
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD5b608d407fc15adea97c26936bc6f03f6
SHA1953e7420801c76393902c0d6bb56148947e41571
SHA256b281ce54125d4250a80f48fcc02a8eea53f2c35c3b726e2512c3d493da0013bf
SHA512cc96ddf4bf90d6aaa9d86803cb2aa30cd8e9b295aee1bd5544b88aeab63dc60bb1d4641e846c9771bab51aabbfbcd984c6d3ee83b96f5b65d09c0841d464b9e4
-
Filesize
79KB
MD5dbf920ee36eac7dab3ba462b4c9d25ea
SHA1405f760f2f64e68a1e92e31fd85282a94eb1e701
SHA256dffc56bf06f08a517b24c17c9c4767f22ab7f55c80fa62393353f47787641e36
SHA512e04e338f025e2a9eee7879dae969f1e00fbdb67db9ceedc4e7b6ed74467d2786c3cdc0eafb57373d9f7bf7c25483730d113ba87f11fed65c25e73eda27484567
-
Filesize
38B
MD54aadf49fed30e4c9b3fe4a3dd6445ebe
SHA11e332822167c6f351b99615eada2c30a538ff037
SHA25675034beb7bded9aeab5748f4592b9e1419256caec474065d43e531ec5cc21c56
SHA512eb5b3908d5e7b43ba02165e092f05578f45f15a148b4c3769036aa542c23a0f7cd2bc2770cf4119a7e437de3f681d9e398511f69f66824c516d9b451bb95f945
-
Filesize
40B
MD5d63a82e5d81e02e399090af26db0b9cb
SHA191d0014c8f54743bba141fd60c9d963f869d76c9
SHA256eaece2eba6310253249603033c744dd5914089b0bb26bde6685ec9813611baae
SHA51238afb05016d8f3c69d246321573997aaac8a51c34e61749a02bf5e8b2b56b94d9544d65801511044e1495906a86dc2100f2e20ff4fcbed09e01904cc780fdbad
-
Filesize
872B
MD5bbc41c78bae6c71e63cb544a6a284d94
SHA133f2c1d9fa0e9c99b80bc2500621e95af38b1f9a
SHA256ee83c6bcea9353c74bfc0a7e739f3c4a765ace894470e09cdcdebba700b8d4cb
SHA5120aea424b57adae3e14ad6491cab585f554b4dffe601b5a17bad6ee6177d2f0f995e419cde576e2d1782b9bddc0661aada11a2c9f1454ae625d9e3223635ec9f4
-
Filesize
98KB
MD5f064015d967ac5fbedbe21c01689f388
SHA14f2044ea34938b045c5e62c389f3c62c44cb5392
SHA256980563afc8a4af6029ef7266392765e4ed9cf23eb242078701b65f5d9078b0af
SHA5122bf694bbada5bc84ec2e68b4b8e4a6c3b747c14e5e4f5aae0d25c5c94a44ed3df16b2384a966da9ce1d405441eb2727af22868204cca0a2b157a7ae0efedd67f
-
Filesize
98KB
MD5f064015d967ac5fbedbe21c01689f388
SHA14f2044ea34938b045c5e62c389f3c62c44cb5392
SHA256980563afc8a4af6029ef7266392765e4ed9cf23eb242078701b65f5d9078b0af
SHA5122bf694bbada5bc84ec2e68b4b8e4a6c3b747c14e5e4f5aae0d25c5c94a44ed3df16b2384a966da9ce1d405441eb2727af22868204cca0a2b157a7ae0efedd67f
-
Filesize
747KB
MD53cd2595e3d20f8200d3ddf84b81932de
SHA1c05f5a5fd2e0da7be16621a5482541f3d492891c
SHA2563979bd4374308cc1a5a91f04c080b480dc4081dd2612aa2a9d1b504f09b7367c
SHA512fbc314a53bb2eeba48c0cf5793cc93b1f9361e62aa38de34c941d57bb677b0868e651ed46b783fef939c4b9659048b4a555c3e647201aae7ce1f9e9bf0731670
-
Filesize
747KB
MD53cd2595e3d20f8200d3ddf84b81932de
SHA1c05f5a5fd2e0da7be16621a5482541f3d492891c
SHA2563979bd4374308cc1a5a91f04c080b480dc4081dd2612aa2a9d1b504f09b7367c
SHA512fbc314a53bb2eeba48c0cf5793cc93b1f9361e62aa38de34c941d57bb677b0868e651ed46b783fef939c4b9659048b4a555c3e647201aae7ce1f9e9bf0731670
-
Filesize
747KB
MD53cd2595e3d20f8200d3ddf84b81932de
SHA1c05f5a5fd2e0da7be16621a5482541f3d492891c
SHA2563979bd4374308cc1a5a91f04c080b480dc4081dd2612aa2a9d1b504f09b7367c
SHA512fbc314a53bb2eeba48c0cf5793cc93b1f9361e62aa38de34c941d57bb677b0868e651ed46b783fef939c4b9659048b4a555c3e647201aae7ce1f9e9bf0731670
-
Filesize
123B
MD56bf517432f65eb7f0d18d574bf14124c
SHA15b9f37c1dd1318ebbec3bd2f07c109eb9d22c727
SHA2566e2b70dfccabf3cc651545676a3a566c9cfae03f15f772886646abce1da35b46
SHA5127b0cb8c20034585ec8bf4b45eda5eda5993a56e24931a7426dc5a9f081ec1f82545f3e26a48a4df885c8691fc6e8026d0808aebe3cc3358ba85ddca08ac4cb06
-
Filesize
123B
MD56bf517432f65eb7f0d18d574bf14124c
SHA15b9f37c1dd1318ebbec3bd2f07c109eb9d22c727
SHA2566e2b70dfccabf3cc651545676a3a566c9cfae03f15f772886646abce1da35b46
SHA5127b0cb8c20034585ec8bf4b45eda5eda5993a56e24931a7426dc5a9f081ec1f82545f3e26a48a4df885c8691fc6e8026d0808aebe3cc3358ba85ddca08ac4cb06
-
Filesize
123B
MD56bf517432f65eb7f0d18d574bf14124c
SHA15b9f37c1dd1318ebbec3bd2f07c109eb9d22c727
SHA2566e2b70dfccabf3cc651545676a3a566c9cfae03f15f772886646abce1da35b46
SHA5127b0cb8c20034585ec8bf4b45eda5eda5993a56e24931a7426dc5a9f081ec1f82545f3e26a48a4df885c8691fc6e8026d0808aebe3cc3358ba85ddca08ac4cb06