Analysis
-
max time kernel
40s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
12-07-2022 14:42
Static task
static1
Behavioral task
behavioral1
Sample
4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe
Resource
win7-20220414-en
General
-
Target
4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe
-
Size
272KB
-
MD5
a746979db57e815f500128d266546e66
-
SHA1
5eb6615875b85e4cb8227bd6fd9542f3c826ceb6
-
SHA256
4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94
-
SHA512
d6b36a19e7cf2e7a28f9649149fc63cf487c4b511b4151c02fa2d01d03b8fb47923b232c22f4eac3e42151bec34e49db24d0fcca11b1fd2d25c4be485692be53
Malware Config
Extracted
formbook
3.8
ch73
cti-id.net
thewholesomewhore.info
cnhuin.com
heartfueled.life
honeyberryapiary.com
hmolettingsmaidstone.com
cashzingo.com
seltaebs.net
avanti.media
pennyarcadsettlement.com
chatchat3.com
iamtheweekender.com
marniecolette.net
yedaoxing.com
lincout.com
deevonne.com
aliyougou.com
wholistichealthawakening.com
signal.solar
111972.info
edgewoodpharm.com
cosford.net
shopondemandproducts.com
donaldtrumpvstheglobalists.com
biggscustoms.com
bk00ldesign.com
en-applverifynow.com
emilave.com
hnmysg.com
gswelive.com
cundhi.net
cadeaux-pro.com
artgi.info
aria-fe.com
communitygotv.info
michelletucciphotography.com
turnkeytechnicalsolutions.com
ericabright.com
izmirlitur.com
athletes4houston.com
nonsololivo.com
fnqlyj.com
amigodonoivo.com
dingjunhong.net
insoluciones.com
cybersecuritybaseline.com
vegasattractionspass.com
bimojilessonspecial.com
milostefan.com
plumonster.net
7hne2t.info
skinkrecords.com
capitolrecordsus.com
blueoceanleaders.com
hammertreellc.com
shamrockidiomas.net
obitel.domains
worldcleansing.com
doaheartratemonitoringfed.live
capellicabinetry.com
raffiariefakbar.info
poil.ltd
sulvw.info
healthworkerequipment.com
maglodak.com
Signatures
-
Formbook payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1220-62-0x000000000041B650-mapping.dmp formbook behavioral1/memory/1220-61-0x0000000000400000-0x000000000042A000-memory.dmp formbook -
Loads dropped DLL 2 IoCs
Processes:
4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exepid process 1944 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe 1944 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exedescription pid process target process PID 1944 set thread context of 1220 1944 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exepid process 1944 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe 1944 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe 1944 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe 1944 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe 1944 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe 1944 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe 1944 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe 1944 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe 1944 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe 1944 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe 1944 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe 1944 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe 1944 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe 1944 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe 1944 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe 1944 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe 1944 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe 1944 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe 1944 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe 1944 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe 1944 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe 1944 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe 1944 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe 1944 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe 1944 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe 1944 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe 1944 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe 1944 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe 1944 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe 1944 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe 1944 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe 1944 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe 1944 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe 1944 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe 1944 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe 1944 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe 1944 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe 1944 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe 1944 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe 1944 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe 1944 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe 1944 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe 1944 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe 1944 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe 1944 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe 1944 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe 1944 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe 1944 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe 1944 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe 1944 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe 1944 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe 1944 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe 1944 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe 1944 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe 1944 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe 1944 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe 1944 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe 1944 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe 1944 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe 1944 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe 1944 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe 1944 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe 1944 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe 1944 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exedescription pid process target process PID 1944 wrote to memory of 1220 1944 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe PID 1944 wrote to memory of 1220 1944 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe PID 1944 wrote to memory of 1220 1944 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe PID 1944 wrote to memory of 1220 1944 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe PID 1944 wrote to memory of 1220 1944 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe PID 1944 wrote to memory of 1220 1944 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe PID 1944 wrote to memory of 1220 1944 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe 4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe"C:\Users\Admin\AppData\Local\Temp\4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe"C:\Users\Admin\AppData\Local\Temp\4a11341c29c890e791758277f1f3de80a69246fab76aec526680b9075ad6ee94.exe"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\nsd1A46.tmp\System.dllFilesize
11KB
MD575ed96254fbf894e42058062b4b4f0d1
SHA1996503f1383b49021eb3427bc28d13b5bbd11977
SHA256a632d74332b3f08f834c732a103dafeb09a540823a2217ca7f49159755e8f1d7
SHA51258174896db81d481947b8745dafe3a02c150f3938bb4543256e8cce1145154e016d481df9fe68dac6d48407c62cbe20753320ebd5fe5e84806d07ce78e0eb0c4
-
\Users\Admin\AppData\Local\Temp\postmillennialist.dllFilesize
70KB
MD5b274c1ed9903070c97864eaa917bf273
SHA1685e7d1ad7f272cebb4561c5044bb2af227894bc
SHA256ff9077e745e9b2e8f75793280efadd1dd3b921e79fc21311440d79ec4cd7795a
SHA512d075d5c75d98f5b298f329b8f3bd93d38737b24105519b5fee2463122f423c1e9f77b6acf9aa71d5bf2d5fb94b9f36cee12905389a1372498857bcdb5f20e3e7
-
memory/1220-58-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/1220-59-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/1220-62-0x000000000041B650-mapping.dmp
-
memory/1220-61-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/1220-63-0x0000000000890000-0x0000000000B93000-memory.dmpFilesize
3.0MB
-
memory/1944-54-0x0000000075DE1000-0x0000000075DE3000-memory.dmpFilesize
8KB
-
memory/1944-57-0x0000000000500000-0x0000000000516000-memory.dmpFilesize
88KB