Analysis

  • max time kernel
    150s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/10/2022, 11:39

General

  • Target

    EKSTRE.exe

  • Size

    214KB

  • MD5

    36089a492ec3710e15a4b5a0261d249b

  • SHA1

    75e9a0c4ca67ddd2c21353e03a2d80881aca3bc4

  • SHA256

    9469fcaa1fdedbca5dea10fbc8908e549bd80111eebeb817b1f74d6355fdff66

  • SHA512

    834192c31bdbfa43ac8cc32df9911e6aa3854b1a14615f6176b3fbe89298a10367d128a2fb0edb0e81bdb4fcd47fb57f7c3e2d8ae1502bb5d201787d2f8cf5b0

  • SSDEEP

    6144:qweEpm/FpVprq8ELucHE4VS08uIaijEeHd:bQzqikTnbiQ8

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

et02

Decoy

floppa.art

mdesign.solutions

rus8.top

pleasantvilleenclave.com

schweitzervacation.rentals

yaolibeautyme.com

the20-sa.com

hifuel.info

meadowsweetwater.com

squamouscellcarcinoma.site

buildingblmt.com

saberfund.online

letyourstorytalk.com

neinagordon.com

turing.buzz

bouldercityhandyman.net

gethub.online

404wellesleycourt.com

squezpop.com

doublesranch.net

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 4 IoCs
  • Executes dropped EXE 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Suspicious behavior: EnumeratesProcesses 62 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\EKSTRE.exe
    "C:\Users\Admin\AppData\Local\Temp\EKSTRE.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1016
    • C:\Users\Admin\AppData\Local\Temp\rwwudzwrpr.exe
      "C:\Users\Admin\AppData\Local\Temp\rwwudzwrpr.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:2380
      • C:\Users\Admin\AppData\Local\Temp\rwwudzwrpr.exe
        "C:\Users\Admin\AppData\Local\Temp\rwwudzwrpr.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:4916
  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:2560
    • C:\Windows\SysWOW64\ipconfig.exe
      "C:\Windows\SysWOW64\ipconfig.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Gathers network information
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:648
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\rwwudzwrpr.exe"
        3⤵
          PID:4556

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\inbimjtr.u

      Filesize

      6KB

      MD5

      d2f51ce7e87ae8f5d164f4858bbd6b45

      SHA1

      3110065c1bce9d2ed9683832a8c3652ea4b37739

      SHA256

      9a84491d0cc1b198d79700f089a1b220a844bb80d2e76269d21e4ab609477bdd

      SHA512

      018db15747d60ef85f173d7d1280ff6dda015f71b6be47986f686bb1dbe7e256b250e9e3c13e03e475bf86e64ee2d4482a3d016cac05f52873a098b0fc67ccf1

    • C:\Users\Admin\AppData\Local\Temp\rpicdsugyfp.vz

      Filesize

      185KB

      MD5

      043c8e17bbc12a9f4b5e4616663b0595

      SHA1

      a7af266fa00811ef5d25401e5aa6c15f178debd9

      SHA256

      aab6aab04ff5f6e639dbf39084a338b1332ed3b233fd20bf1c1023b19a6de1c5

      SHA512

      8755c8f6b322144eba2c8016197df1b97e096bd0c1a27e305ba8f5dc7dd44db66474bf8cac11ac6b410b6f41cacdf852eda282beaeb23d0af5ce3415173ebf9e

    • C:\Users\Admin\AppData\Local\Temp\rwwudzwrpr.exe

      Filesize

      5KB

      MD5

      90767bfc8096035406556162057d9cf2

      SHA1

      9826c892953d56ce9cd2f5bd9d9bac04318fa8eb

      SHA256

      4ff7e7524ab6d4ed40e6bb4235f48bec1796e63038c49475b88e572c2b82bf52

      SHA512

      5a76f9fa025ee2457a5b605bdeb0b263dc2842529d5f95a3e4a13d784c1636d1d366136cf96df4ea082ba5e7c5beb85cd20dad886a1395113f657bb15308c41f

    • C:\Users\Admin\AppData\Local\Temp\rwwudzwrpr.exe

      Filesize

      5KB

      MD5

      90767bfc8096035406556162057d9cf2

      SHA1

      9826c892953d56ce9cd2f5bd9d9bac04318fa8eb

      SHA256

      4ff7e7524ab6d4ed40e6bb4235f48bec1796e63038c49475b88e572c2b82bf52

      SHA512

      5a76f9fa025ee2457a5b605bdeb0b263dc2842529d5f95a3e4a13d784c1636d1d366136cf96df4ea082ba5e7c5beb85cd20dad886a1395113f657bb15308c41f

    • C:\Users\Admin\AppData\Local\Temp\rwwudzwrpr.exe

      Filesize

      5KB

      MD5

      90767bfc8096035406556162057d9cf2

      SHA1

      9826c892953d56ce9cd2f5bd9d9bac04318fa8eb

      SHA256

      4ff7e7524ab6d4ed40e6bb4235f48bec1796e63038c49475b88e572c2b82bf52

      SHA512

      5a76f9fa025ee2457a5b605bdeb0b263dc2842529d5f95a3e4a13d784c1636d1d366136cf96df4ea082ba5e7c5beb85cd20dad886a1395113f657bb15308c41f

    • memory/648-147-0x0000000000320000-0x000000000034F000-memory.dmp

      Filesize

      188KB

    • memory/648-151-0x0000000000320000-0x000000000034F000-memory.dmp

      Filesize

      188KB

    • memory/648-149-0x0000000000B40000-0x0000000000BD3000-memory.dmp

      Filesize

      588KB

    • memory/648-148-0x0000000000CD0000-0x000000000101A000-memory.dmp

      Filesize

      3.3MB

    • memory/648-146-0x00000000000F0000-0x00000000000FB000-memory.dmp

      Filesize

      44KB

    • memory/2560-142-0x00000000080E0000-0x000000000822E000-memory.dmp

      Filesize

      1.3MB

    • memory/2560-150-0x0000000008850000-0x0000000008975000-memory.dmp

      Filesize

      1.1MB

    • memory/2560-152-0x0000000008850000-0x0000000008975000-memory.dmp

      Filesize

      1.1MB

    • memory/4916-144-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/4916-141-0x00000000009F0000-0x0000000000A04000-memory.dmp

      Filesize

      80KB

    • memory/4916-140-0x0000000000A30000-0x0000000000D7A000-memory.dmp

      Filesize

      3.3MB

    • memory/4916-139-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB