Overview
overview
10Static
static
10files/1.exe
windows7-x64
1files/1.exe
windows10-2004-x64
1files/10.exe
windows7-x64
7files/10.exe
windows10-2004-x64
7files/11.exe
windows7-x64
10files/11.exe
windows10-2004-x64
10files/12.exe
windows7-x64
8files/12.exe
windows10-2004-x64
8files/13.exe
windows7-x64
10files/13.exe
windows10-2004-x64
10files/14.exe
windows7-x64
10files/14.exe
windows10-2004-x64
10files/15.exe
windows7-x64
10files/15.exe
windows10-2004-x64
10files/2.exe
windows7-x64
10files/2.exe
windows10-2004-x64
10files/3.exe
windows7-x64
10files/3.exe
windows10-2004-x64
10files/4.exe
windows7-x64
10files/4.exe
windows10-2004-x64
10files/5.exe
windows7-x64
10files/5.exe
windows10-2004-x64
10files/6.exe
windows7-x64
6files/6.exe
windows10-2004-x64
6files/7.exe
windows7-x64
10files/7.exe
windows10-2004-x64
10files/8.exe
windows7-x64
10files/8.exe
windows10-2004-x64
10files/9.exe
windows7-x64
10files/9.exe
windows10-2004-x64
10Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
25-07-2022 05:57
Behavioral task
behavioral1
Sample
files/1.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
files/1.exe
Resource
win10v2004-20220721-en
Behavioral task
behavioral3
Sample
files/10.exe
Resource
win7-20220715-en
Behavioral task
behavioral4
Sample
files/10.exe
Resource
win10v2004-20220721-en
Behavioral task
behavioral5
Sample
files/11.exe
Resource
win7-20220715-en
Behavioral task
behavioral6
Sample
files/11.exe
Resource
win10v2004-20220721-en
Behavioral task
behavioral7
Sample
files/12.exe
Resource
win7-20220715-en
Behavioral task
behavioral8
Sample
files/12.exe
Resource
win10v2004-20220721-en
Behavioral task
behavioral9
Sample
files/13.exe
Resource
win7-20220715-en
Behavioral task
behavioral10
Sample
files/13.exe
Resource
win10v2004-20220722-en
Behavioral task
behavioral11
Sample
files/14.exe
Resource
win7-20220715-en
Behavioral task
behavioral12
Sample
files/14.exe
Resource
win10v2004-20220721-en
Behavioral task
behavioral13
Sample
files/15.exe
Resource
win7-20220715-en
Behavioral task
behavioral14
Sample
files/15.exe
Resource
win10v2004-20220721-en
Behavioral task
behavioral15
Sample
files/2.exe
Resource
win7-20220718-en
Behavioral task
behavioral16
Sample
files/2.exe
Resource
win10v2004-20220721-en
Behavioral task
behavioral17
Sample
files/3.exe
Resource
win7-20220715-en
Behavioral task
behavioral18
Sample
files/3.exe
Resource
win10v2004-20220721-en
Behavioral task
behavioral19
Sample
files/4.exe
Resource
win7-20220718-en
Behavioral task
behavioral20
Sample
files/4.exe
Resource
win10v2004-20220721-en
Behavioral task
behavioral21
Sample
files/5.exe
Resource
win7-20220718-en
Behavioral task
behavioral22
Sample
files/5.exe
Resource
win10v2004-20220721-en
Behavioral task
behavioral23
Sample
files/6.exe
Resource
win7-20220715-en
Behavioral task
behavioral24
Sample
files/6.exe
Resource
win10v2004-20220722-en
Behavioral task
behavioral25
Sample
files/7.exe
Resource
win7-20220718-en
Behavioral task
behavioral26
Sample
files/7.exe
Resource
win10v2004-20220722-en
Behavioral task
behavioral27
Sample
files/8.exe
Resource
win7-20220718-en
Behavioral task
behavioral28
Sample
files/8.exe
Resource
win10v2004-20220721-en
Behavioral task
behavioral29
Sample
files/9.exe
Resource
win7-20220718-en
General
-
Target
files/3.exe
-
Size
636KB
-
MD5
5e1e0f573490a4d5e3daed2b4ef597cf
-
SHA1
14a3833a1a3788f9869cfec18bf0f5e96fd6582b
-
SHA256
c6cc9eb1d60c3e355950bdd5e54f87f2d3536d6e36a6283d83fb218ef30c1801
-
SHA512
1e0193f1d422f1c6c85f0830221cebead9cffeb602ce91f4731d47ea84255c1cd6c2974d2c0f0d49d16fc77d2b9466a12e8d20bdd562c9cd99f9980662a604bd
Malware Config
Extracted
formbook
3.8
st0
link23.info
perfecto-intl.com
550194.top
ceoes.com
pill-sure.com
wakasan.info
momweed.biz
dmcee.com
lcltravels.com
onlinexhibition.com
lmdbshow.com
totamedia.com
unitedobth.com
twfitzone.com
whiteandbluemusic.com
businessbuh.site
mihalstkeowntrodquimp.win
jbcmarrakech.com
bbab1.com
realtec-project.com
baidumedical.com
radiojoaogoulartneto.com
gilbertiesherbs.net
scuttletrap.com
pandoralivecams.com
0q6tenuser.men
0pe352.com
casinoperlaonline.com
teenfindom.com
whittleinc.com
monarchgc.com
traditionallebaneserecipes.com
oxfordisland.info
louzanboutique.net
phukienphaidep.com
theallonbys.com
myhardyhandyman.com
bjdbty.com
theasbestosband.com
munchiesatbay.com
advantageattorneycloud.com
xn--48s96u4kgu8z.com
turkfloyd.com
rbcuo.com
celebikahve.com
cryptocurrenciestrade.com
aayushiagate.com
connectinglimaonlinestore.com
ianfennellyart.com
onsebalade.com
groupemultiligne.com
addressfinder-switzerland.com
mymovieblog.com
bbqboon.men
boyioutdoor.com
demolishyourdemons.com
disasterdispatchteam.com
bedsalemattress.review
gafu.ltd
munichair.com
bestyinghuo.com
cetione.com
dwellmagic.company
xietuwen.com
0075544.info
Signatures
-
Formbook payload 5 IoCs
resource yara_rule behavioral18/memory/4308-133-0x0000000000000000-mapping.dmp formbook behavioral18/memory/4308-135-0x0000000000400000-0x000000000042A000-memory.dmp formbook behavioral18/memory/4308-141-0x0000000000400000-0x000000000042A000-memory.dmp formbook behavioral18/memory/4452-143-0x0000000000380000-0x00000000003AA000-memory.dmp formbook behavioral18/memory/4452-148-0x0000000000380000-0x00000000003AA000-memory.dmp formbook -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4308 set thread context of 2372 4308 3.exe 36 PID 4452 set thread context of 2372 4452 colorcpl.exe 36 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 56 IoCs
pid Process 4308 3.exe 4308 3.exe 4308 3.exe 4308 3.exe 4452 colorcpl.exe 4452 colorcpl.exe 4452 colorcpl.exe 4452 colorcpl.exe 4452 colorcpl.exe 4452 colorcpl.exe 4452 colorcpl.exe 4452 colorcpl.exe 4452 colorcpl.exe 4452 colorcpl.exe 4452 colorcpl.exe 4452 colorcpl.exe 4452 colorcpl.exe 4452 colorcpl.exe 4452 colorcpl.exe 4452 colorcpl.exe 4452 colorcpl.exe 4452 colorcpl.exe 4452 colorcpl.exe 4452 colorcpl.exe 4452 colorcpl.exe 4452 colorcpl.exe 4452 colorcpl.exe 4452 colorcpl.exe 4452 colorcpl.exe 4452 colorcpl.exe 4452 colorcpl.exe 4452 colorcpl.exe 4452 colorcpl.exe 4452 colorcpl.exe 4452 colorcpl.exe 4452 colorcpl.exe 4452 colorcpl.exe 4452 colorcpl.exe 4452 colorcpl.exe 4452 colorcpl.exe 4452 colorcpl.exe 4452 colorcpl.exe 4452 colorcpl.exe 4452 colorcpl.exe 4452 colorcpl.exe 4452 colorcpl.exe 4452 colorcpl.exe 4452 colorcpl.exe 4452 colorcpl.exe 4452 colorcpl.exe 4452 colorcpl.exe 4452 colorcpl.exe 4452 colorcpl.exe 4452 colorcpl.exe 4452 colorcpl.exe 4452 colorcpl.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2372 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 4308 3.exe 4308 3.exe 4308 3.exe 4452 colorcpl.exe 4452 colorcpl.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4308 3.exe Token: SeDebugPrivilege 4452 colorcpl.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3196 3.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3196 wrote to memory of 4308 3196 3.exe 81 PID 3196 wrote to memory of 4308 3196 3.exe 81 PID 3196 wrote to memory of 4308 3196 3.exe 81 PID 3196 wrote to memory of 4308 3196 3.exe 81 PID 3196 wrote to memory of 4308 3196 3.exe 81 PID 3196 wrote to memory of 4308 3196 3.exe 81 PID 3196 wrote to memory of 4308 3196 3.exe 81 PID 3196 wrote to memory of 4308 3196 3.exe 81 PID 3196 wrote to memory of 4308 3196 3.exe 81 PID 3196 wrote to memory of 4308 3196 3.exe 81 PID 3196 wrote to memory of 4308 3196 3.exe 81 PID 3196 wrote to memory of 4308 3196 3.exe 81 PID 2372 wrote to memory of 4452 2372 Explorer.EXE 82 PID 2372 wrote to memory of 4452 2372 Explorer.EXE 82 PID 2372 wrote to memory of 4452 2372 Explorer.EXE 82 PID 4452 wrote to memory of 1016 4452 colorcpl.exe 83 PID 4452 wrote to memory of 1016 4452 colorcpl.exe 83 PID 4452 wrote to memory of 1016 4452 colorcpl.exe 83
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\files\3.exe"C:\Users\Admin\AppData\Local\Temp\files\3.exe"2⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Users\Admin\AppData\Local\Temp\files\3.exe"C:\Users\Admin\AppData\Local\Temp\files\3.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4308
-
-
-
C:\Windows\SysWOW64\colorcpl.exe"C:\Windows\SysWOW64\colorcpl.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\files\3.exe"3⤵PID:1016
-
-