Analysis
-
max time kernel
52s -
max time network
67s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
23-11-2022 13:51
Static task
static1
General
-
Target
502f5ca3567e3c23c443376a14c0e4e86ec453e37696f12d723aab77e332a46e.exe
-
Size
6KB
-
MD5
d2b6ec246c1627c4eff844ec15de05b2
-
SHA1
252ed9f325c178cc4e054fbbad59b68e27728439
-
SHA256
502f5ca3567e3c23c443376a14c0e4e86ec453e37696f12d723aab77e332a46e
-
SHA512
e6c07de510ffc22447fd76b77c41631a6d060c3b2d4971ef8cd92260c9f69842b8e621bb7c28a29ebf3960bf61e26c6b3107b97eebcdb738b1bdb853c913d2ac
-
SSDEEP
48:6N/UH4k/Hlw2u9h3rlJ4ff1DIMQrYhJp6LOQDhRW4xyiXiiVcqBHfOulVt+hXuFW:Qkq5h334fd44JshRW4hieckRNkuzNt
Malware Config
Extracted
formbook
4.1
do25
nickifarina.site
nfptrwge.bar
nobreemporio.com
split-acres.com
sharingservice-act.com
nakedinktees.shop
zhensheng1988.com
ipiton.com
liftoffdigitalmarketing.com
karen.cool
theprotestantchurch.com
shirhadarr.com
azdtwp.com
comzestdent.com
jnsjh.com
in-heat-cool.com
dfefej.top
tumingchun.com
eisei-shouji.tokyo
sparecreeping.com
savitleather.com
dfd33.com
bolognabene.net
googlesepaisekaisekamaye.com
f219te8i5y.xyz
protocolozeropedras.online
xn--obsuga-5db.tech
delightzeffl.cloud
frenchiescoin.com
holoslifestyles.com
busonthego.com
istanblyzx.online
lexasm.com
gour.top
smallbizratetracker.com
putconcept.website
ashleighcaroe.com
fredrickamzwaro.click
tracy41myers.online
gensource.net
leggings.design
circleofinfluence1.com
shiningdot.online
muhunglong.com
jaxon-lane.com
jzlc1788.com
personalscore.net
greenpackfeedback.tech
baoshuiniao.com
hotelocioclub.com
goodtobehomeamerica.com
tlshine.com
cncndinosaurs.xyz
escalateph.com
climatehub.tech
sxtfjx.xyz
slotxoth456.com
mascotemais.shop
karnakai.net
ewqjai.xyz
currencyrates.wiki
ceruleankeep.com
okx-veri.xyz
kumamotometallic.com
pornblogsspider.com
Signatures
-
Formbook payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/3776-296-0x000000000041F160-mapping.dmp formbook behavioral1/memory/3776-303-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
502f5ca3567e3c23c443376a14c0e4e86ec453e37696f12d723aab77e332a46e.exedescription pid process target process PID 2748 set thread context of 3776 2748 502f5ca3567e3c23c443376a14c0e4e86ec453e37696f12d723aab77e332a46e.exe 502f5ca3567e3c23c443376a14c0e4e86ec453e37696f12d723aab77e332a46e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
powershell.exe502f5ca3567e3c23c443376a14c0e4e86ec453e37696f12d723aab77e332a46e.exepid process 1184 powershell.exe 1184 powershell.exe 1184 powershell.exe 3776 502f5ca3567e3c23c443376a14c0e4e86ec453e37696f12d723aab77e332a46e.exe 3776 502f5ca3567e3c23c443376a14c0e4e86ec453e37696f12d723aab77e332a46e.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
502f5ca3567e3c23c443376a14c0e4e86ec453e37696f12d723aab77e332a46e.exepowershell.exedescription pid process Token: SeDebugPrivilege 2748 502f5ca3567e3c23c443376a14c0e4e86ec453e37696f12d723aab77e332a46e.exe Token: SeDebugPrivilege 1184 powershell.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
502f5ca3567e3c23c443376a14c0e4e86ec453e37696f12d723aab77e332a46e.exedescription pid process target process PID 2748 wrote to memory of 1184 2748 502f5ca3567e3c23c443376a14c0e4e86ec453e37696f12d723aab77e332a46e.exe powershell.exe PID 2748 wrote to memory of 1184 2748 502f5ca3567e3c23c443376a14c0e4e86ec453e37696f12d723aab77e332a46e.exe powershell.exe PID 2748 wrote to memory of 1184 2748 502f5ca3567e3c23c443376a14c0e4e86ec453e37696f12d723aab77e332a46e.exe powershell.exe PID 2748 wrote to memory of 3776 2748 502f5ca3567e3c23c443376a14c0e4e86ec453e37696f12d723aab77e332a46e.exe 502f5ca3567e3c23c443376a14c0e4e86ec453e37696f12d723aab77e332a46e.exe PID 2748 wrote to memory of 3776 2748 502f5ca3567e3c23c443376a14c0e4e86ec453e37696f12d723aab77e332a46e.exe 502f5ca3567e3c23c443376a14c0e4e86ec453e37696f12d723aab77e332a46e.exe PID 2748 wrote to memory of 3776 2748 502f5ca3567e3c23c443376a14c0e4e86ec453e37696f12d723aab77e332a46e.exe 502f5ca3567e3c23c443376a14c0e4e86ec453e37696f12d723aab77e332a46e.exe PID 2748 wrote to memory of 3776 2748 502f5ca3567e3c23c443376a14c0e4e86ec453e37696f12d723aab77e332a46e.exe 502f5ca3567e3c23c443376a14c0e4e86ec453e37696f12d723aab77e332a46e.exe PID 2748 wrote to memory of 3776 2748 502f5ca3567e3c23c443376a14c0e4e86ec453e37696f12d723aab77e332a46e.exe 502f5ca3567e3c23c443376a14c0e4e86ec453e37696f12d723aab77e332a46e.exe PID 2748 wrote to memory of 3776 2748 502f5ca3567e3c23c443376a14c0e4e86ec453e37696f12d723aab77e332a46e.exe 502f5ca3567e3c23c443376a14c0e4e86ec453e37696f12d723aab77e332a46e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\502f5ca3567e3c23c443376a14c0e4e86ec453e37696f12d723aab77e332a46e.exe"C:\Users\Admin\AppData\Local\Temp\502f5ca3567e3c23c443376a14c0e4e86ec453e37696f12d723aab77e332a46e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1184 -
C:\Users\Admin\AppData\Local\Temp\502f5ca3567e3c23c443376a14c0e4e86ec453e37696f12d723aab77e332a46e.exeC:\Users\Admin\AppData\Local\Temp\502f5ca3567e3c23c443376a14c0e4e86ec453e37696f12d723aab77e332a46e.exe2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3776