Analysis
-
max time kernel
146s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
27/10/2022, 11:39
Static task
static1
Behavioral task
behavioral1
Sample
EKSTRE.exe
Resource
win7-20220901-en
General
-
Target
EKSTRE.exe
-
Size
214KB
-
MD5
36089a492ec3710e15a4b5a0261d249b
-
SHA1
75e9a0c4ca67ddd2c21353e03a2d80881aca3bc4
-
SHA256
9469fcaa1fdedbca5dea10fbc8908e549bd80111eebeb817b1f74d6355fdff66
-
SHA512
834192c31bdbfa43ac8cc32df9911e6aa3854b1a14615f6176b3fbe89298a10367d128a2fb0edb0e81bdb4fcd47fb57f7c3e2d8ae1502bb5d201787d2f8cf5b0
-
SSDEEP
6144:qweEpm/FpVprq8ELucHE4VS08uIaijEeHd:bQzqikTnbiQ8
Malware Config
Extracted
formbook
4.1
et02
floppa.art
mdesign.solutions
rus8.top
pleasantvilleenclave.com
schweitzervacation.rentals
yaolibeautyme.com
the20-sa.com
hifuel.info
meadowsweetwater.com
squamouscellcarcinoma.site
buildingblmt.com
saberfund.online
letyourstorytalk.com
neinagordon.com
turing.buzz
bouldercityhandyman.net
gethub.online
404wellesleycourt.com
squezpop.com
doublesranch.net
lighttheshadows.com
ky7229.com
1316rolfelane.com
cybercops.store
apachemasonry.com
texaspolling.online
zuiakon.xyz
gfak-consult.store
sharkcodersspain.com
greinerproperties.net
ren111.top
questgg.com
giuila.site
groupable.net
rebirth0527.xyz
bradentonroofingcontractors.com
aroma24.top
alexxgold.com
trabzonozalit.online
muslimsufi.com
highroadgrants.site
mrnoche.space
salutaris-store.com
takarpine.online
highenergyquiz.com
fvqk.net
buldanplajelbiseleri.site
birkenstock.biz
colourstattoo.online
dolarslot88.quest
gqimw.click
emaginproject.info
heyspend.com
surveillancecolorado.com
ipko-biznes.net
ky1341.com
schmocker.tech
highroadcoin.site
resetdog.com
swiperrclean.store
castonguay.info
htzqlt.club
abcgpdfsdfsdfs.website
iifydf.click
hzllaw.com
Signatures
-
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/388-65-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1684-72-0x0000000000080000-0x00000000000AF000-memory.dmp formbook behavioral1/memory/1684-76-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Executes dropped EXE 2 IoCs
pid Process 1312 rwwudzwrpr.exe 388 rwwudzwrpr.exe -
Loads dropped DLL 2 IoCs
pid Process 1436 EKSTRE.exe 1312 rwwudzwrpr.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1312 set thread context of 388 1312 rwwudzwrpr.exe 28 PID 388 set thread context of 1192 388 rwwudzwrpr.exe 13 PID 1684 set thread context of 1192 1684 chkdsk.exe 13 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier chkdsk.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 388 rwwudzwrpr.exe 388 rwwudzwrpr.exe 1684 chkdsk.exe 1684 chkdsk.exe 1684 chkdsk.exe 1684 chkdsk.exe 1684 chkdsk.exe 1684 chkdsk.exe 1684 chkdsk.exe 1684 chkdsk.exe 1684 chkdsk.exe 1684 chkdsk.exe 1684 chkdsk.exe 1684 chkdsk.exe 1684 chkdsk.exe 1684 chkdsk.exe 1684 chkdsk.exe 1684 chkdsk.exe 1684 chkdsk.exe 1684 chkdsk.exe 1684 chkdsk.exe 1684 chkdsk.exe 1684 chkdsk.exe 1684 chkdsk.exe 1684 chkdsk.exe 1684 chkdsk.exe 1684 chkdsk.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1192 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 1312 rwwudzwrpr.exe 388 rwwudzwrpr.exe 388 rwwudzwrpr.exe 388 rwwudzwrpr.exe 1684 chkdsk.exe 1684 chkdsk.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 388 rwwudzwrpr.exe Token: SeDebugPrivilege 1684 chkdsk.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1192 Explorer.EXE 1192 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1192 Explorer.EXE 1192 Explorer.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1436 wrote to memory of 1312 1436 EKSTRE.exe 27 PID 1436 wrote to memory of 1312 1436 EKSTRE.exe 27 PID 1436 wrote to memory of 1312 1436 EKSTRE.exe 27 PID 1436 wrote to memory of 1312 1436 EKSTRE.exe 27 PID 1312 wrote to memory of 388 1312 rwwudzwrpr.exe 28 PID 1312 wrote to memory of 388 1312 rwwudzwrpr.exe 28 PID 1312 wrote to memory of 388 1312 rwwudzwrpr.exe 28 PID 1312 wrote to memory of 388 1312 rwwudzwrpr.exe 28 PID 1312 wrote to memory of 388 1312 rwwudzwrpr.exe 28 PID 1192 wrote to memory of 1684 1192 Explorer.EXE 29 PID 1192 wrote to memory of 1684 1192 Explorer.EXE 29 PID 1192 wrote to memory of 1684 1192 Explorer.EXE 29 PID 1192 wrote to memory of 1684 1192 Explorer.EXE 29 PID 1684 wrote to memory of 1504 1684 chkdsk.exe 30 PID 1684 wrote to memory of 1504 1684 chkdsk.exe 30 PID 1684 wrote to memory of 1504 1684 chkdsk.exe 30 PID 1684 wrote to memory of 1504 1684 chkdsk.exe 30
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\EKSTRE.exe"C:\Users\Admin\AppData\Local\Temp\EKSTRE.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\rwwudzwrpr.exe"C:\Users\Admin\AppData\Local\Temp\rwwudzwrpr.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Users\Admin\AppData\Local\Temp\rwwudzwrpr.exe"C:\Users\Admin\AppData\Local\Temp\rwwudzwrpr.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:388
-
-
-
-
C:\Windows\SysWOW64\chkdsk.exe"C:\Windows\SysWOW64\chkdsk.exe"2⤵
- Suspicious use of SetThreadContext
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\rwwudzwrpr.exe"3⤵PID:1504
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5d2f51ce7e87ae8f5d164f4858bbd6b45
SHA13110065c1bce9d2ed9683832a8c3652ea4b37739
SHA2569a84491d0cc1b198d79700f089a1b220a844bb80d2e76269d21e4ab609477bdd
SHA512018db15747d60ef85f173d7d1280ff6dda015f71b6be47986f686bb1dbe7e256b250e9e3c13e03e475bf86e64ee2d4482a3d016cac05f52873a098b0fc67ccf1
-
Filesize
185KB
MD5043c8e17bbc12a9f4b5e4616663b0595
SHA1a7af266fa00811ef5d25401e5aa6c15f178debd9
SHA256aab6aab04ff5f6e639dbf39084a338b1332ed3b233fd20bf1c1023b19a6de1c5
SHA5128755c8f6b322144eba2c8016197df1b97e096bd0c1a27e305ba8f5dc7dd44db66474bf8cac11ac6b410b6f41cacdf852eda282beaeb23d0af5ce3415173ebf9e
-
Filesize
5KB
MD590767bfc8096035406556162057d9cf2
SHA19826c892953d56ce9cd2f5bd9d9bac04318fa8eb
SHA2564ff7e7524ab6d4ed40e6bb4235f48bec1796e63038c49475b88e572c2b82bf52
SHA5125a76f9fa025ee2457a5b605bdeb0b263dc2842529d5f95a3e4a13d784c1636d1d366136cf96df4ea082ba5e7c5beb85cd20dad886a1395113f657bb15308c41f
-
Filesize
5KB
MD590767bfc8096035406556162057d9cf2
SHA19826c892953d56ce9cd2f5bd9d9bac04318fa8eb
SHA2564ff7e7524ab6d4ed40e6bb4235f48bec1796e63038c49475b88e572c2b82bf52
SHA5125a76f9fa025ee2457a5b605bdeb0b263dc2842529d5f95a3e4a13d784c1636d1d366136cf96df4ea082ba5e7c5beb85cd20dad886a1395113f657bb15308c41f
-
Filesize
5KB
MD590767bfc8096035406556162057d9cf2
SHA19826c892953d56ce9cd2f5bd9d9bac04318fa8eb
SHA2564ff7e7524ab6d4ed40e6bb4235f48bec1796e63038c49475b88e572c2b82bf52
SHA5125a76f9fa025ee2457a5b605bdeb0b263dc2842529d5f95a3e4a13d784c1636d1d366136cf96df4ea082ba5e7c5beb85cd20dad886a1395113f657bb15308c41f
-
Filesize
5KB
MD590767bfc8096035406556162057d9cf2
SHA19826c892953d56ce9cd2f5bd9d9bac04318fa8eb
SHA2564ff7e7524ab6d4ed40e6bb4235f48bec1796e63038c49475b88e572c2b82bf52
SHA5125a76f9fa025ee2457a5b605bdeb0b263dc2842529d5f95a3e4a13d784c1636d1d366136cf96df4ea082ba5e7c5beb85cd20dad886a1395113f657bb15308c41f
-
Filesize
5KB
MD590767bfc8096035406556162057d9cf2
SHA19826c892953d56ce9cd2f5bd9d9bac04318fa8eb
SHA2564ff7e7524ab6d4ed40e6bb4235f48bec1796e63038c49475b88e572c2b82bf52
SHA5125a76f9fa025ee2457a5b605bdeb0b263dc2842529d5f95a3e4a13d784c1636d1d366136cf96df4ea082ba5e7c5beb85cd20dad886a1395113f657bb15308c41f