Analysis
-
max time kernel
186s -
max time network
190s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 14:39
Static task
static1
Behavioral task
behavioral1
Sample
PROVA DE PAGAMENTO.exe
Resource
win7-20221111-en
General
-
Target
PROVA DE PAGAMENTO.exe
-
Size
710KB
-
MD5
d90ee4a69a80b53f8b6ac0f3fd08e72c
-
SHA1
000e8e599fbf58baeac2483c92370b811fa2477d
-
SHA256
c0764ceab13a533b3ea99ccc162a1f36e85f4094b29c4a30b91b0d3f0ff1112e
-
SHA512
ec18433d2c9afc3865c5f6b58acdb895c6abe98427b8e19d37e991033a3aee5254fea78f097aa472d9a1930f6d5fcc17cafd524fd5170c9bf3427bdb0f5a7755
-
SSDEEP
12288:pSIyM/U057k2TlIh1A/lDMzAmORWyYuMkAAV/8wot83w/8rRWnu6:BBOzGVMU9WyvdFotCronu6
Malware Config
Extracted
formbook
4.1
gs25
real-food.store
marketdatalibrary.com
jolidens.space
ydental.info
tattoosbyjayinked.com
buytradesellpei.com
61983.xyz
identitysolver.xyz
mgfang.com
teizer.one
staychillax.com
ylanzarote.com
workte.net
maukigato.shop
coolbag.site
btya1r.com
dkhaohao.shop
zugaro.xyz
boon168.com
xn--80aeegahlwtdkp.com
ofiarx.com
militaryees.com
moshrifmontagebau.com
usesportcompany.com
savagesocietyclothing.com
wethedreamrs.com
allhealthzdorovoiscilenie.sbs
legacycrossingbroker.com
dompietro.com
hallconciergerie.com
xn--289a95vn5cmx6a.com
siervostinting.com
windesk.info
braxton.construction
scarefullym.shop
organicyummyvegan.com
maniza.shop
moviesmod.one
wenmingsm.com
techgist.tech
infodescansovital.click
adsfuture.shop
54844.site
opensea.creditcard
yassinshield.com
daubacthanhdeneasy.online
governmentmarketstrategies.com
socioeconomical.pics
blackmail.guide
tdrevolution.net
mega-pornx.info
favrity.com
cuocsongtot2022.site
touchlyfe.com
track-usps.info
kitchentimeremodeling.com
jettylearn.com
hookguy.buzz
cojo.world
negocio-naweb.store
kern3361ren1.site
smithbryan.website
jlxseat.top
rocksology.net
crownglassware.info
Signatures
-
Formbook payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/3136-144-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/3136-149-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4580-155-0x00000000003D0000-0x00000000003FF000-memory.dmp formbook -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
PROVA DE PAGAMENTO.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation PROVA DE PAGAMENTO.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
PROVA DE PAGAMENTO.exeRegSvcs.exedescription pid process target process PID 4320 set thread context of 3136 4320 PROVA DE PAGAMENTO.exe RegSvcs.exe PID 3136 set thread context of 2748 3136 RegSvcs.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 25 IoCs
Processes:
PROVA DE PAGAMENTO.exeRegSvcs.exepowershell.exeWWAHost.exepid process 4320 PROVA DE PAGAMENTO.exe 4320 PROVA DE PAGAMENTO.exe 4320 PROVA DE PAGAMENTO.exe 4320 PROVA DE PAGAMENTO.exe 4320 PROVA DE PAGAMENTO.exe 4320 PROVA DE PAGAMENTO.exe 4320 PROVA DE PAGAMENTO.exe 4320 PROVA DE PAGAMENTO.exe 4320 PROVA DE PAGAMENTO.exe 4320 PROVA DE PAGAMENTO.exe 4320 PROVA DE PAGAMENTO.exe 4320 PROVA DE PAGAMENTO.exe 4320 PROVA DE PAGAMENTO.exe 4320 PROVA DE PAGAMENTO.exe 4320 PROVA DE PAGAMENTO.exe 3136 RegSvcs.exe 3136 RegSvcs.exe 3136 RegSvcs.exe 3136 RegSvcs.exe 1404 powershell.exe 1404 powershell.exe 4580 WWAHost.exe 4580 WWAHost.exe 4580 WWAHost.exe 4580 WWAHost.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
Processes:
RegSvcs.exeWWAHost.exepid process 3136 RegSvcs.exe 3136 RegSvcs.exe 3136 RegSvcs.exe 4580 WWAHost.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
PROVA DE PAGAMENTO.exepowershell.exeRegSvcs.exeExplorer.EXEWWAHost.exedescription pid process Token: SeDebugPrivilege 4320 PROVA DE PAGAMENTO.exe Token: SeDebugPrivilege 1404 powershell.exe Token: SeDebugPrivilege 3136 RegSvcs.exe Token: SeShutdownPrivilege 2748 Explorer.EXE Token: SeCreatePagefilePrivilege 2748 Explorer.EXE Token: SeDebugPrivilege 4580 WWAHost.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
PROVA DE PAGAMENTO.exeExplorer.EXEWWAHost.exedescription pid process target process PID 4320 wrote to memory of 1404 4320 PROVA DE PAGAMENTO.exe powershell.exe PID 4320 wrote to memory of 1404 4320 PROVA DE PAGAMENTO.exe powershell.exe PID 4320 wrote to memory of 1404 4320 PROVA DE PAGAMENTO.exe powershell.exe PID 4320 wrote to memory of 2876 4320 PROVA DE PAGAMENTO.exe schtasks.exe PID 4320 wrote to memory of 2876 4320 PROVA DE PAGAMENTO.exe schtasks.exe PID 4320 wrote to memory of 2876 4320 PROVA DE PAGAMENTO.exe schtasks.exe PID 4320 wrote to memory of 3116 4320 PROVA DE PAGAMENTO.exe RegSvcs.exe PID 4320 wrote to memory of 3116 4320 PROVA DE PAGAMENTO.exe RegSvcs.exe PID 4320 wrote to memory of 3116 4320 PROVA DE PAGAMENTO.exe RegSvcs.exe PID 4320 wrote to memory of 3136 4320 PROVA DE PAGAMENTO.exe RegSvcs.exe PID 4320 wrote to memory of 3136 4320 PROVA DE PAGAMENTO.exe RegSvcs.exe PID 4320 wrote to memory of 3136 4320 PROVA DE PAGAMENTO.exe RegSvcs.exe PID 4320 wrote to memory of 3136 4320 PROVA DE PAGAMENTO.exe RegSvcs.exe PID 4320 wrote to memory of 3136 4320 PROVA DE PAGAMENTO.exe RegSvcs.exe PID 4320 wrote to memory of 3136 4320 PROVA DE PAGAMENTO.exe RegSvcs.exe PID 2748 wrote to memory of 4580 2748 Explorer.EXE WWAHost.exe PID 2748 wrote to memory of 4580 2748 Explorer.EXE WWAHost.exe PID 2748 wrote to memory of 4580 2748 Explorer.EXE WWAHost.exe PID 4580 wrote to memory of 3188 4580 WWAHost.exe cmd.exe PID 4580 wrote to memory of 3188 4580 WWAHost.exe cmd.exe PID 4580 wrote to memory of 3188 4580 WWAHost.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PROVA DE PAGAMENTO.exe"C:\Users\Admin\AppData\Local\Temp\PROVA DE PAGAMENTO.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\WvnNgxUfgUAHr.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1404 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WvnNgxUfgUAHr" /XML "C:\Users\Admin\AppData\Local\Temp\tmpAF94.tmp"2⤵
- Creates scheduled task(s)
PID:2876 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:3116
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3136
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\WWAHost.exe"C:\Windows\SysWOW64\WWAHost.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵PID:3188
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD583264b5a4eb802b2da9daad98ed5024e
SHA1241ef50b9f1194f1471a1e284ba26ce33ee6dc8a
SHA25688474e9ccaeb7916acf1abb44f5b5c1c4e5b1baa2bccbcda9779489c18d5dc1f
SHA512829ca2e9aad52b67e1c321dd1cc645c60389f957afbbe493f780a8010611a603f7b3ef8d4913996063f2b33867b470e4e69554fa27efb9a2690589cce74b48d0