Analysis

  • max time kernel
    147s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    27/10/2022, 11:39

General

  • Target

    EKSTRE.exe

  • Size

    214KB

  • MD5

    36089a492ec3710e15a4b5a0261d249b

  • SHA1

    75e9a0c4ca67ddd2c21353e03a2d80881aca3bc4

  • SHA256

    9469fcaa1fdedbca5dea10fbc8908e549bd80111eebeb817b1f74d6355fdff66

  • SHA512

    834192c31bdbfa43ac8cc32df9911e6aa3854b1a14615f6176b3fbe89298a10367d128a2fb0edb0e81bdb4fcd47fb57f7c3e2d8ae1502bb5d201787d2f8cf5b0

  • SSDEEP

    6144:qweEpm/FpVprq8ELucHE4VS08uIaijEeHd:bQzqikTnbiQ8

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

et02

Decoy

floppa.art

mdesign.solutions

rus8.top

pleasantvilleenclave.com

schweitzervacation.rentals

yaolibeautyme.com

the20-sa.com

hifuel.info

meadowsweetwater.com

squamouscellcarcinoma.site

buildingblmt.com

saberfund.online

letyourstorytalk.com

neinagordon.com

turing.buzz

bouldercityhandyman.net

gethub.online

404wellesleycourt.com

squezpop.com

doublesranch.net

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1216
    • C:\Users\Admin\AppData\Local\Temp\EKSTRE.exe
      "C:\Users\Admin\AppData\Local\Temp\EKSTRE.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1048
      • C:\Users\Admin\AppData\Local\Temp\rwwudzwrpr.exe
        "C:\Users\Admin\AppData\Local\Temp\rwwudzwrpr.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:1996
        • C:\Users\Admin\AppData\Local\Temp\rwwudzwrpr.exe
          "C:\Users\Admin\AppData\Local\Temp\rwwudzwrpr.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:1512
    • C:\Windows\SysWOW64\control.exe
      "C:\Windows\SysWOW64\control.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1356
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\rwwudzwrpr.exe"
        3⤵
          PID:836

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\inbimjtr.u

            Filesize

            6KB

            MD5

            d2f51ce7e87ae8f5d164f4858bbd6b45

            SHA1

            3110065c1bce9d2ed9683832a8c3652ea4b37739

            SHA256

            9a84491d0cc1b198d79700f089a1b220a844bb80d2e76269d21e4ab609477bdd

            SHA512

            018db15747d60ef85f173d7d1280ff6dda015f71b6be47986f686bb1dbe7e256b250e9e3c13e03e475bf86e64ee2d4482a3d016cac05f52873a098b0fc67ccf1

          • C:\Users\Admin\AppData\Local\Temp\rpicdsugyfp.vz

            Filesize

            185KB

            MD5

            043c8e17bbc12a9f4b5e4616663b0595

            SHA1

            a7af266fa00811ef5d25401e5aa6c15f178debd9

            SHA256

            aab6aab04ff5f6e639dbf39084a338b1332ed3b233fd20bf1c1023b19a6de1c5

            SHA512

            8755c8f6b322144eba2c8016197df1b97e096bd0c1a27e305ba8f5dc7dd44db66474bf8cac11ac6b410b6f41cacdf852eda282beaeb23d0af5ce3415173ebf9e

          • C:\Users\Admin\AppData\Local\Temp\rwwudzwrpr.exe

            Filesize

            5KB

            MD5

            90767bfc8096035406556162057d9cf2

            SHA1

            9826c892953d56ce9cd2f5bd9d9bac04318fa8eb

            SHA256

            4ff7e7524ab6d4ed40e6bb4235f48bec1796e63038c49475b88e572c2b82bf52

            SHA512

            5a76f9fa025ee2457a5b605bdeb0b263dc2842529d5f95a3e4a13d784c1636d1d366136cf96df4ea082ba5e7c5beb85cd20dad886a1395113f657bb15308c41f

          • C:\Users\Admin\AppData\Local\Temp\rwwudzwrpr.exe

            Filesize

            5KB

            MD5

            90767bfc8096035406556162057d9cf2

            SHA1

            9826c892953d56ce9cd2f5bd9d9bac04318fa8eb

            SHA256

            4ff7e7524ab6d4ed40e6bb4235f48bec1796e63038c49475b88e572c2b82bf52

            SHA512

            5a76f9fa025ee2457a5b605bdeb0b263dc2842529d5f95a3e4a13d784c1636d1d366136cf96df4ea082ba5e7c5beb85cd20dad886a1395113f657bb15308c41f

          • C:\Users\Admin\AppData\Local\Temp\rwwudzwrpr.exe

            Filesize

            5KB

            MD5

            90767bfc8096035406556162057d9cf2

            SHA1

            9826c892953d56ce9cd2f5bd9d9bac04318fa8eb

            SHA256

            4ff7e7524ab6d4ed40e6bb4235f48bec1796e63038c49475b88e572c2b82bf52

            SHA512

            5a76f9fa025ee2457a5b605bdeb0b263dc2842529d5f95a3e4a13d784c1636d1d366136cf96df4ea082ba5e7c5beb85cd20dad886a1395113f657bb15308c41f

          • \Users\Admin\AppData\Local\Temp\rwwudzwrpr.exe

            Filesize

            5KB

            MD5

            90767bfc8096035406556162057d9cf2

            SHA1

            9826c892953d56ce9cd2f5bd9d9bac04318fa8eb

            SHA256

            4ff7e7524ab6d4ed40e6bb4235f48bec1796e63038c49475b88e572c2b82bf52

            SHA512

            5a76f9fa025ee2457a5b605bdeb0b263dc2842529d5f95a3e4a13d784c1636d1d366136cf96df4ea082ba5e7c5beb85cd20dad886a1395113f657bb15308c41f

          • \Users\Admin\AppData\Local\Temp\rwwudzwrpr.exe

            Filesize

            5KB

            MD5

            90767bfc8096035406556162057d9cf2

            SHA1

            9826c892953d56ce9cd2f5bd9d9bac04318fa8eb

            SHA256

            4ff7e7524ab6d4ed40e6bb4235f48bec1796e63038c49475b88e572c2b82bf52

            SHA512

            5a76f9fa025ee2457a5b605bdeb0b263dc2842529d5f95a3e4a13d784c1636d1d366136cf96df4ea082ba5e7c5beb85cd20dad886a1395113f657bb15308c41f

          • memory/1048-54-0x0000000076171000-0x0000000076173000-memory.dmp

            Filesize

            8KB

          • memory/1216-68-0x0000000005050000-0x0000000005136000-memory.dmp

            Filesize

            920KB

          • memory/1216-78-0x0000000006800000-0x000000000691B000-memory.dmp

            Filesize

            1.1MB

          • memory/1216-76-0x0000000006800000-0x000000000691B000-memory.dmp

            Filesize

            1.1MB

          • memory/1356-73-0x00000000000D0000-0x00000000000FF000-memory.dmp

            Filesize

            188KB

          • memory/1356-72-0x0000000000ED0000-0x0000000000EEF000-memory.dmp

            Filesize

            124KB

          • memory/1356-74-0x0000000000AD0000-0x0000000000DD3000-memory.dmp

            Filesize

            3.0MB

          • memory/1356-75-0x00000000009E0000-0x0000000000A73000-memory.dmp

            Filesize

            588KB

          • memory/1356-77-0x00000000000D0000-0x00000000000FF000-memory.dmp

            Filesize

            188KB

          • memory/1512-67-0x00000000002C0000-0x00000000002D4000-memory.dmp

            Filesize

            80KB

          • memory/1512-66-0x0000000000800000-0x0000000000B03000-memory.dmp

            Filesize

            3.0MB

          • memory/1512-65-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB