Analysis
-
max time kernel
52s -
max time network
67s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
23-11-2022 13:51
Static task
static1
General
-
Target
502f5ca3567e3c23c443376a14c0e4e86ec453e37696f12d723aab77e332a46e.exe
-
Size
6KB
-
MD5
d2b6ec246c1627c4eff844ec15de05b2
-
SHA1
252ed9f325c178cc4e054fbbad59b68e27728439
-
SHA256
502f5ca3567e3c23c443376a14c0e4e86ec453e37696f12d723aab77e332a46e
-
SHA512
e6c07de510ffc22447fd76b77c41631a6d060c3b2d4971ef8cd92260c9f69842b8e621bb7c28a29ebf3960bf61e26c6b3107b97eebcdb738b1bdb853c913d2ac
-
SSDEEP
48:6N/UH4k/Hlw2u9h3rlJ4ff1DIMQrYhJp6LOQDhRW4xyiXiiVcqBHfOulVt+hXuFW:Qkq5h334fd44JshRW4hieckRNkuzNt
Malware Config
Extracted
formbook
4.1
do25
nickifarina.site
nfptrwge.bar
nobreemporio.com
split-acres.com
sharingservice-act.com
nakedinktees.shop
zhensheng1988.com
ipiton.com
liftoffdigitalmarketing.com
karen.cool
theprotestantchurch.com
shirhadarr.com
azdtwp.com
comzestdent.com
jnsjh.com
in-heat-cool.com
dfefej.top
tumingchun.com
eisei-shouji.tokyo
sparecreeping.com
savitleather.com
dfd33.com
bolognabene.net
googlesepaisekaisekamaye.com
f219te8i5y.xyz
protocolozeropedras.online
xn--obsuga-5db.tech
delightzeffl.cloud
frenchiescoin.com
holoslifestyles.com
busonthego.com
istanblyzx.online
lexasm.com
gour.top
smallbizratetracker.com
putconcept.website
ashleighcaroe.com
fredrickamzwaro.click
tracy41myers.online
gensource.net
leggings.design
circleofinfluence1.com
shiningdot.online
muhunglong.com
jaxon-lane.com
jzlc1788.com
personalscore.net
greenpackfeedback.tech
baoshuiniao.com
hotelocioclub.com
goodtobehomeamerica.com
tlshine.com
cncndinosaurs.xyz
escalateph.com
climatehub.tech
sxtfjx.xyz
slotxoth456.com
mascotemais.shop
karnakai.net
ewqjai.xyz
currencyrates.wiki
ceruleankeep.com
okx-veri.xyz
kumamotometallic.com
pornblogsspider.com
Signatures
-
Formbook payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/3776-296-0x000000000041F160-mapping.dmp formbook behavioral1/memory/3776-303-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
502f5ca3567e3c23c443376a14c0e4e86ec453e37696f12d723aab77e332a46e.exedescription pid process target process PID 2748 set thread context of 3776 2748 502f5ca3567e3c23c443376a14c0e4e86ec453e37696f12d723aab77e332a46e.exe 502f5ca3567e3c23c443376a14c0e4e86ec453e37696f12d723aab77e332a46e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
powershell.exe502f5ca3567e3c23c443376a14c0e4e86ec453e37696f12d723aab77e332a46e.exepid process 1184 powershell.exe 1184 powershell.exe 1184 powershell.exe 3776 502f5ca3567e3c23c443376a14c0e4e86ec453e37696f12d723aab77e332a46e.exe 3776 502f5ca3567e3c23c443376a14c0e4e86ec453e37696f12d723aab77e332a46e.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
502f5ca3567e3c23c443376a14c0e4e86ec453e37696f12d723aab77e332a46e.exepowershell.exedescription pid process Token: SeDebugPrivilege 2748 502f5ca3567e3c23c443376a14c0e4e86ec453e37696f12d723aab77e332a46e.exe Token: SeDebugPrivilege 1184 powershell.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
502f5ca3567e3c23c443376a14c0e4e86ec453e37696f12d723aab77e332a46e.exedescription pid process target process PID 2748 wrote to memory of 1184 2748 502f5ca3567e3c23c443376a14c0e4e86ec453e37696f12d723aab77e332a46e.exe powershell.exe PID 2748 wrote to memory of 1184 2748 502f5ca3567e3c23c443376a14c0e4e86ec453e37696f12d723aab77e332a46e.exe powershell.exe PID 2748 wrote to memory of 1184 2748 502f5ca3567e3c23c443376a14c0e4e86ec453e37696f12d723aab77e332a46e.exe powershell.exe PID 2748 wrote to memory of 3776 2748 502f5ca3567e3c23c443376a14c0e4e86ec453e37696f12d723aab77e332a46e.exe 502f5ca3567e3c23c443376a14c0e4e86ec453e37696f12d723aab77e332a46e.exe PID 2748 wrote to memory of 3776 2748 502f5ca3567e3c23c443376a14c0e4e86ec453e37696f12d723aab77e332a46e.exe 502f5ca3567e3c23c443376a14c0e4e86ec453e37696f12d723aab77e332a46e.exe PID 2748 wrote to memory of 3776 2748 502f5ca3567e3c23c443376a14c0e4e86ec453e37696f12d723aab77e332a46e.exe 502f5ca3567e3c23c443376a14c0e4e86ec453e37696f12d723aab77e332a46e.exe PID 2748 wrote to memory of 3776 2748 502f5ca3567e3c23c443376a14c0e4e86ec453e37696f12d723aab77e332a46e.exe 502f5ca3567e3c23c443376a14c0e4e86ec453e37696f12d723aab77e332a46e.exe PID 2748 wrote to memory of 3776 2748 502f5ca3567e3c23c443376a14c0e4e86ec453e37696f12d723aab77e332a46e.exe 502f5ca3567e3c23c443376a14c0e4e86ec453e37696f12d723aab77e332a46e.exe PID 2748 wrote to memory of 3776 2748 502f5ca3567e3c23c443376a14c0e4e86ec453e37696f12d723aab77e332a46e.exe 502f5ca3567e3c23c443376a14c0e4e86ec453e37696f12d723aab77e332a46e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\502f5ca3567e3c23c443376a14c0e4e86ec453e37696f12d723aab77e332a46e.exe"C:\Users\Admin\AppData\Local\Temp\502f5ca3567e3c23c443376a14c0e4e86ec453e37696f12d723aab77e332a46e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\502f5ca3567e3c23c443376a14c0e4e86ec453e37696f12d723aab77e332a46e.exeC:\Users\Admin\AppData\Local\Temp\502f5ca3567e3c23c443376a14c0e4e86ec453e37696f12d723aab77e332a46e.exe2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1184-209-0x0000000000000000-mapping.dmp
-
memory/1184-245-0x0000000007120000-0x0000000007156000-memory.dmpFilesize
216KB
-
memory/1184-250-0x0000000007880000-0x0000000007EA8000-memory.dmpFilesize
6.2MB
-
memory/1184-269-0x0000000008100000-0x0000000008166000-memory.dmpFilesize
408KB
-
memory/1184-270-0x0000000007F20000-0x0000000007F86000-memory.dmpFilesize
408KB
-
memory/1184-289-0x0000000009DA0000-0x000000000A418000-memory.dmpFilesize
6.5MB
-
memory/1184-290-0x0000000009720000-0x000000000973A000-memory.dmpFilesize
104KB
-
memory/1184-278-0x00000000088E0000-0x0000000008956000-memory.dmpFilesize
472KB
-
memory/1184-274-0x0000000008A30000-0x0000000008A7B000-memory.dmpFilesize
300KB
-
memory/1184-273-0x0000000008170000-0x000000000818C000-memory.dmpFilesize
112KB
-
memory/2748-155-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-162-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-127-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-128-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-129-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-130-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-131-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-132-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-133-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-134-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-135-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-137-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-136-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-138-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-139-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-140-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-141-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-142-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-143-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-144-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-145-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-146-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-147-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-148-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-149-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-150-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-151-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-152-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-153-0x0000000000A20000-0x0000000000A28000-memory.dmpFilesize
32KB
-
memory/2748-154-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-125-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-156-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-157-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-158-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-159-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-160-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-161-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-126-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-163-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-164-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-165-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-166-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-167-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-168-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-169-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-170-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-171-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-172-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-173-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-174-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-175-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-176-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-177-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-178-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-179-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-180-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-181-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-182-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-183-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-184-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-124-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-123-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-122-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-121-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-120-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-192-0x0000000005B60000-0x0000000005D8C000-memory.dmpFilesize
2.2MB
-
memory/2748-193-0x0000000005EB0000-0x0000000005F42000-memory.dmpFilesize
584KB
-
memory/2748-195-0x0000000005F80000-0x0000000005FA2000-memory.dmpFilesize
136KB
-
memory/2748-194-0x0000000006450000-0x000000000694E000-memory.dmpFilesize
5.0MB
-
memory/2748-197-0x00000000060C0000-0x0000000006410000-memory.dmpFilesize
3.3MB
-
memory/3776-296-0x000000000041F160-mapping.dmp
-
memory/3776-303-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/3776-304-0x0000000001720000-0x0000000001A40000-memory.dmpFilesize
3.1MB