Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
12-07-2022 00:19
Static task
static1
Behavioral task
behavioral1
Sample
BL# BKKCM3215800.exe
Resource
win7-20220414-en
General
-
Target
BL# BKKCM3215800.exe
-
Size
170KB
-
MD5
2ec6d3e0a7fe0d612b5ae232a01e7d2b
-
SHA1
b1971757c64ccaaaff17d4e5d7c6db4eb0843b2a
-
SHA256
2198c2bb61788ff27d22b8a16ff4ddbfc343d0c3f641ce8c86e42100d338a83b
-
SHA512
540cb081def6eb76c74cc1cd33a9e28d0c41eac808cac4a86fe1ca5280da6e7b40f9a1e52ff2d6149e9531c9ce9d0929f8af26234af114f484ff081bf62fdaf3
Malware Config
Extracted
formbook
4.1
ba17
bearwant.com
sdsguanfang.com
steamcommunityvia.top
sugarplumtreasures.com
koronislakefishing.com
jmae.xyz
xhxnqemkiqe.xyz
playzcrew.com
zatwsbq.com
lankofix.com
sh-zhepeng.com
mibodamisxv.online
butterflyjewelry.store
finestrecitalto-spottoday.info
globomateria.com
royalmdarts.com
d4af10836709.com
shepwill.com
67aldrich.info
trustedmakers.club
burdiezholdings.com
facialcoach.com
hunterous.com
carei.xyz
positivityintheworkplace.com
top1productjapan.online
camperrentnovara.com
nostalgiaz.xyz
prepperandsalt.com
platinum-swallow-nest.com
jmdadoag.com
cornerstonesolarconsulting.com
carmelhasit.com
hospitalaurelia.com
epolystars.com
best5psychicreadingsites.com
cbradleyowens.com
cmshelps.com
leclefsdor.com
male-muscle-slave.cloud
eselinchen.com
statesunitedaction.net
goweet.com
hififurniturehouse.info
alphacapitaltrust.online
hotsellmed.com
sunxueling.com
firstclass-poolservice.com
tuveranopelayo.com
wayangslot.net
joseauto.net
consinko.com
pacificoffshorecharters.com
steemboard.xyz
poollife.info
miraihenokoibumi.net
mfh-sa.com
seontra.xyz
openfaders.com
guardianz.online
purse.gold
affaire-chaba.com
rosency.xyz
somethingform.site
digitalpursuitsonline.com
Signatures
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Formbook payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1120-67-0x000000000041F1E0-mapping.dmp formbook behavioral1/memory/1120-66-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1120-69-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1828-76-0x00000000000D0000-0x00000000000FF000-memory.dmp formbook behavioral1/memory/1828-81-0x00000000000D0000-0x00000000000FF000-memory.dmp formbook -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1140 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
BL# BKKCM3215800.exeBL# BKKCM3215800.exerundll32.exedescription pid process target process PID 2040 set thread context of 1120 2040 BL# BKKCM3215800.exe BL# BKKCM3215800.exe PID 1120 set thread context of 1416 1120 BL# BKKCM3215800.exe Explorer.EXE PID 1828 set thread context of 1416 1828 rundll32.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 25 IoCs
Processes:
powershell.exeBL# BKKCM3215800.exeBL# BKKCM3215800.exerundll32.exepid process 1540 powershell.exe 2040 BL# BKKCM3215800.exe 2040 BL# BKKCM3215800.exe 2040 BL# BKKCM3215800.exe 1120 BL# BKKCM3215800.exe 1120 BL# BKKCM3215800.exe 1828 rundll32.exe 1828 rundll32.exe 1828 rundll32.exe 1828 rundll32.exe 1828 rundll32.exe 1828 rundll32.exe 1828 rundll32.exe 1828 rundll32.exe 1828 rundll32.exe 1828 rundll32.exe 1828 rundll32.exe 1828 rundll32.exe 1828 rundll32.exe 1828 rundll32.exe 1828 rundll32.exe 1828 rundll32.exe 1828 rundll32.exe 1828 rundll32.exe 1828 rundll32.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
BL# BKKCM3215800.exerundll32.exepid process 1120 BL# BKKCM3215800.exe 1120 BL# BKKCM3215800.exe 1120 BL# BKKCM3215800.exe 1828 rundll32.exe 1828 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
BL# BKKCM3215800.exepowershell.exeBL# BKKCM3215800.exerundll32.exedescription pid process Token: SeDebugPrivilege 2040 BL# BKKCM3215800.exe Token: SeDebugPrivilege 1540 powershell.exe Token: SeDebugPrivilege 1120 BL# BKKCM3215800.exe Token: SeDebugPrivilege 1828 rundll32.exe -
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
BL# BKKCM3215800.exeExplorer.EXErundll32.exedescription pid process target process PID 2040 wrote to memory of 1540 2040 BL# BKKCM3215800.exe powershell.exe PID 2040 wrote to memory of 1540 2040 BL# BKKCM3215800.exe powershell.exe PID 2040 wrote to memory of 1540 2040 BL# BKKCM3215800.exe powershell.exe PID 2040 wrote to memory of 1540 2040 BL# BKKCM3215800.exe powershell.exe PID 2040 wrote to memory of 592 2040 BL# BKKCM3215800.exe BL# BKKCM3215800.exe PID 2040 wrote to memory of 592 2040 BL# BKKCM3215800.exe BL# BKKCM3215800.exe PID 2040 wrote to memory of 592 2040 BL# BKKCM3215800.exe BL# BKKCM3215800.exe PID 2040 wrote to memory of 592 2040 BL# BKKCM3215800.exe BL# BKKCM3215800.exe PID 2040 wrote to memory of 1120 2040 BL# BKKCM3215800.exe BL# BKKCM3215800.exe PID 2040 wrote to memory of 1120 2040 BL# BKKCM3215800.exe BL# BKKCM3215800.exe PID 2040 wrote to memory of 1120 2040 BL# BKKCM3215800.exe BL# BKKCM3215800.exe PID 2040 wrote to memory of 1120 2040 BL# BKKCM3215800.exe BL# BKKCM3215800.exe PID 2040 wrote to memory of 1120 2040 BL# BKKCM3215800.exe BL# BKKCM3215800.exe PID 2040 wrote to memory of 1120 2040 BL# BKKCM3215800.exe BL# BKKCM3215800.exe PID 2040 wrote to memory of 1120 2040 BL# BKKCM3215800.exe BL# BKKCM3215800.exe PID 1416 wrote to memory of 1828 1416 Explorer.EXE rundll32.exe PID 1416 wrote to memory of 1828 1416 Explorer.EXE rundll32.exe PID 1416 wrote to memory of 1828 1416 Explorer.EXE rundll32.exe PID 1416 wrote to memory of 1828 1416 Explorer.EXE rundll32.exe PID 1416 wrote to memory of 1828 1416 Explorer.EXE rundll32.exe PID 1416 wrote to memory of 1828 1416 Explorer.EXE rundll32.exe PID 1416 wrote to memory of 1828 1416 Explorer.EXE rundll32.exe PID 1828 wrote to memory of 1140 1828 rundll32.exe cmd.exe PID 1828 wrote to memory of 1140 1828 rundll32.exe cmd.exe PID 1828 wrote to memory of 1140 1828 rundll32.exe cmd.exe PID 1828 wrote to memory of 1140 1828 rundll32.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\BL# BKKCM3215800.exe"C:\Users\Admin\AppData\Local\Temp\BL# BKKCM3215800.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMgAwAA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\BL# BKKCM3215800.exe"C:\Users\Admin\AppData\Local\Temp\BL# BKKCM3215800.exe"3⤵
-
C:\Users\Admin\AppData\Local\Temp\BL# BKKCM3215800.exe"C:\Users\Admin\AppData\Local\Temp\BL# BKKCM3215800.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\BL# BKKCM3215800.exe"3⤵
- Deletes itself
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1120-66-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1120-71-0x0000000000240000-0x0000000000255000-memory.dmpFilesize
84KB
-
memory/1120-70-0x0000000000800000-0x0000000000B03000-memory.dmpFilesize
3.0MB
-
memory/1120-69-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1120-64-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1120-63-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1120-67-0x000000000041F1E0-mapping.dmp
-
memory/1140-77-0x0000000000000000-mapping.dmp
-
memory/1416-82-0x00000000048B0000-0x0000000004965000-memory.dmpFilesize
724KB
-
memory/1416-80-0x00000000048B0000-0x0000000004965000-memory.dmpFilesize
724KB
-
memory/1416-72-0x0000000006CD0000-0x0000000006DA7000-memory.dmpFilesize
860KB
-
memory/1540-61-0x000000006F9E0000-0x000000006FF8B000-memory.dmpFilesize
5.7MB
-
memory/1540-58-0x0000000000000000-mapping.dmp
-
memory/1540-62-0x000000006F9E0000-0x000000006FF8B000-memory.dmpFilesize
5.7MB
-
memory/1540-60-0x000000006F9E0000-0x000000006FF8B000-memory.dmpFilesize
5.7MB
-
memory/1828-76-0x00000000000D0000-0x00000000000FF000-memory.dmpFilesize
188KB
-
memory/1828-73-0x0000000000000000-mapping.dmp
-
memory/1828-75-0x00000000007A0000-0x00000000007AE000-memory.dmpFilesize
56KB
-
memory/1828-78-0x0000000001EC0000-0x00000000021C3000-memory.dmpFilesize
3.0MB
-
memory/1828-79-0x0000000001E20000-0x0000000001EB4000-memory.dmpFilesize
592KB
-
memory/1828-81-0x00000000000D0000-0x00000000000FF000-memory.dmpFilesize
188KB
-
memory/2040-54-0x0000000000190000-0x00000000001C0000-memory.dmpFilesize
192KB
-
memory/2040-57-0x0000000004D10000-0x0000000004D5C000-memory.dmpFilesize
304KB
-
memory/2040-56-0x00000000052A0000-0x000000000530E000-memory.dmpFilesize
440KB
-
memory/2040-55-0x0000000075FE1000-0x0000000075FE3000-memory.dmpFilesize
8KB