Analysis

  • max time kernel
    146s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    27/10/2022, 11:39

General

  • Target

    EKSTRE.exe

  • Size

    214KB

  • MD5

    36089a492ec3710e15a4b5a0261d249b

  • SHA1

    75e9a0c4ca67ddd2c21353e03a2d80881aca3bc4

  • SHA256

    9469fcaa1fdedbca5dea10fbc8908e549bd80111eebeb817b1f74d6355fdff66

  • SHA512

    834192c31bdbfa43ac8cc32df9911e6aa3854b1a14615f6176b3fbe89298a10367d128a2fb0edb0e81bdb4fcd47fb57f7c3e2d8ae1502bb5d201787d2f8cf5b0

  • SSDEEP

    6144:qweEpm/FpVprq8ELucHE4VS08uIaijEeHd:bQzqikTnbiQ8

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

et02

Decoy

floppa.art

mdesign.solutions

rus8.top

pleasantvilleenclave.com

schweitzervacation.rentals

yaolibeautyme.com

the20-sa.com

hifuel.info

meadowsweetwater.com

squamouscellcarcinoma.site

buildingblmt.com

saberfund.online

letyourstorytalk.com

neinagordon.com

turing.buzz

bouldercityhandyman.net

gethub.online

404wellesleycourt.com

squezpop.com

doublesranch.net

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1192
    • C:\Users\Admin\AppData\Local\Temp\EKSTRE.exe
      "C:\Users\Admin\AppData\Local\Temp\EKSTRE.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1436
      • C:\Users\Admin\AppData\Local\Temp\rwwudzwrpr.exe
        "C:\Users\Admin\AppData\Local\Temp\rwwudzwrpr.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:1312
        • C:\Users\Admin\AppData\Local\Temp\rwwudzwrpr.exe
          "C:\Users\Admin\AppData\Local\Temp\rwwudzwrpr.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:388
    • C:\Windows\SysWOW64\chkdsk.exe
      "C:\Windows\SysWOW64\chkdsk.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1684
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\rwwudzwrpr.exe"
        3⤵
          PID:1504

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\inbimjtr.u

      Filesize

      6KB

      MD5

      d2f51ce7e87ae8f5d164f4858bbd6b45

      SHA1

      3110065c1bce9d2ed9683832a8c3652ea4b37739

      SHA256

      9a84491d0cc1b198d79700f089a1b220a844bb80d2e76269d21e4ab609477bdd

      SHA512

      018db15747d60ef85f173d7d1280ff6dda015f71b6be47986f686bb1dbe7e256b250e9e3c13e03e475bf86e64ee2d4482a3d016cac05f52873a098b0fc67ccf1

    • C:\Users\Admin\AppData\Local\Temp\rpicdsugyfp.vz

      Filesize

      185KB

      MD5

      043c8e17bbc12a9f4b5e4616663b0595

      SHA1

      a7af266fa00811ef5d25401e5aa6c15f178debd9

      SHA256

      aab6aab04ff5f6e639dbf39084a338b1332ed3b233fd20bf1c1023b19a6de1c5

      SHA512

      8755c8f6b322144eba2c8016197df1b97e096bd0c1a27e305ba8f5dc7dd44db66474bf8cac11ac6b410b6f41cacdf852eda282beaeb23d0af5ce3415173ebf9e

    • C:\Users\Admin\AppData\Local\Temp\rwwudzwrpr.exe

      Filesize

      5KB

      MD5

      90767bfc8096035406556162057d9cf2

      SHA1

      9826c892953d56ce9cd2f5bd9d9bac04318fa8eb

      SHA256

      4ff7e7524ab6d4ed40e6bb4235f48bec1796e63038c49475b88e572c2b82bf52

      SHA512

      5a76f9fa025ee2457a5b605bdeb0b263dc2842529d5f95a3e4a13d784c1636d1d366136cf96df4ea082ba5e7c5beb85cd20dad886a1395113f657bb15308c41f

    • C:\Users\Admin\AppData\Local\Temp\rwwudzwrpr.exe

      Filesize

      5KB

      MD5

      90767bfc8096035406556162057d9cf2

      SHA1

      9826c892953d56ce9cd2f5bd9d9bac04318fa8eb

      SHA256

      4ff7e7524ab6d4ed40e6bb4235f48bec1796e63038c49475b88e572c2b82bf52

      SHA512

      5a76f9fa025ee2457a5b605bdeb0b263dc2842529d5f95a3e4a13d784c1636d1d366136cf96df4ea082ba5e7c5beb85cd20dad886a1395113f657bb15308c41f

    • C:\Users\Admin\AppData\Local\Temp\rwwudzwrpr.exe

      Filesize

      5KB

      MD5

      90767bfc8096035406556162057d9cf2

      SHA1

      9826c892953d56ce9cd2f5bd9d9bac04318fa8eb

      SHA256

      4ff7e7524ab6d4ed40e6bb4235f48bec1796e63038c49475b88e572c2b82bf52

      SHA512

      5a76f9fa025ee2457a5b605bdeb0b263dc2842529d5f95a3e4a13d784c1636d1d366136cf96df4ea082ba5e7c5beb85cd20dad886a1395113f657bb15308c41f

    • \Users\Admin\AppData\Local\Temp\rwwudzwrpr.exe

      Filesize

      5KB

      MD5

      90767bfc8096035406556162057d9cf2

      SHA1

      9826c892953d56ce9cd2f5bd9d9bac04318fa8eb

      SHA256

      4ff7e7524ab6d4ed40e6bb4235f48bec1796e63038c49475b88e572c2b82bf52

      SHA512

      5a76f9fa025ee2457a5b605bdeb0b263dc2842529d5f95a3e4a13d784c1636d1d366136cf96df4ea082ba5e7c5beb85cd20dad886a1395113f657bb15308c41f

    • \Users\Admin\AppData\Local\Temp\rwwudzwrpr.exe

      Filesize

      5KB

      MD5

      90767bfc8096035406556162057d9cf2

      SHA1

      9826c892953d56ce9cd2f5bd9d9bac04318fa8eb

      SHA256

      4ff7e7524ab6d4ed40e6bb4235f48bec1796e63038c49475b88e572c2b82bf52

      SHA512

      5a76f9fa025ee2457a5b605bdeb0b263dc2842529d5f95a3e4a13d784c1636d1d366136cf96df4ea082ba5e7c5beb85cd20dad886a1395113f657bb15308c41f

    • memory/388-65-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/388-66-0x00000000008C0000-0x0000000000BC3000-memory.dmp

      Filesize

      3.0MB

    • memory/388-67-0x0000000000350000-0x0000000000364000-memory.dmp

      Filesize

      80KB

    • memory/1192-75-0x0000000006ED0000-0x0000000007019000-memory.dmp

      Filesize

      1.3MB

    • memory/1192-68-0x0000000004E80000-0x0000000004FD7000-memory.dmp

      Filesize

      1.3MB

    • memory/1192-77-0x0000000006ED0000-0x0000000007019000-memory.dmp

      Filesize

      1.3MB

    • memory/1436-54-0x0000000075711000-0x0000000075713000-memory.dmp

      Filesize

      8KB

    • memory/1684-73-0x0000000001F00000-0x0000000002203000-memory.dmp

      Filesize

      3.0MB

    • memory/1684-72-0x0000000000080000-0x00000000000AF000-memory.dmp

      Filesize

      188KB

    • memory/1684-74-0x0000000001D60000-0x0000000001DF3000-memory.dmp

      Filesize

      588KB

    • memory/1684-76-0x0000000000080000-0x00000000000AF000-memory.dmp

      Filesize

      188KB

    • memory/1684-71-0x00000000004C0000-0x00000000004C7000-memory.dmp

      Filesize

      28KB