Analysis
-
max time kernel
166s -
max time network
178s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2022 16:06
Static task
static1
General
-
Target
27d5822dd4cdeafc49c43ccbb21ce23d954880fe396902ce9e5b5dac81a6cf84.exe
-
Size
7KB
-
MD5
af5bbd736013f8528a3bd005472d32e4
-
SHA1
0a3445d75d92ee7b1b9e76d22ac72f775f2481f9
-
SHA256
27d5822dd4cdeafc49c43ccbb21ce23d954880fe396902ce9e5b5dac81a6cf84
-
SHA512
ce2e34520912ce40285598776adb55fd34c3882903ce3722728556070036144d492599147b84dac03267501a4d919219260fc16026da0cc6503859234c071320
-
SSDEEP
96:YICxjg4TvWzBuUPhsMYJCMuH7q+rDPfkHHJkZjTA3GnUODL:YfUuUPhhdbqASHa5Av0
Malware Config
Extracted
formbook
4.1
dv22
ivk-muc.com
theplantgranny.net
efefefficient.buzz
car-deals-87506.com
yangcongzhibo.net
empiralventures.com
latexpillo.com
ferramentafivizzanese.shop
kx1553.com
timamollo.africa
paran6787.net
fabicilio.online
kreativnettchen.shop
manakamana.co.uk
andreapeverelli.shop
jianf.site
kmqan.xyz
aoshilang.com
dnsmctmu.com
pumpkinsmp.net
mixloaded.africa
cunhuatv0.xyz
thedreamrun.co.uk
ldkj9d8.vip
hairtransplant-turkey.com
6635.global
convergeonart.com
ichwillstillen.com
thelivinglovedco.com
whybereasonable.com
fransizrivierasi.com
base2mexico.com
igniteadventureandwellness.com
tradeinclusive.africa
flyingsardine.uno
freziatextile.ru
icimke.com
tubefuckme.net
csvillage.net
dripcentral.shop
idfmusic.com
eyeintheskysecurity.co.uk
ewa-lab.tech
longpostaltubes.co.uk
bee-win.com
disrae.com
haoi111.com
e-curlibrium.com
digiturkrizebayi.com
mrbenmultilinks.africa
gszxtyl.xyz
foresightgroup.africa
metamallmarketplace.com
tobyno.co.uk
asgstafffing.com
kittycatkingdom.shop
amqp.xyz
bayb.boo
landmarkcityguide.com
dististicks.com
tubeporn4k.net
europeaceducation.net
hash2earn.com
jiwuke.com
obgista.africa
Signatures
-
Formbook payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1960-146-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
27d5822dd4cdeafc49c43ccbb21ce23d954880fe396902ce9e5b5dac81a6cf84.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 27d5822dd4cdeafc49c43ccbb21ce23d954880fe396902ce9e5b5dac81a6cf84.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
27d5822dd4cdeafc49c43ccbb21ce23d954880fe396902ce9e5b5dac81a6cf84.exedescription pid process target process PID 3960 set thread context of 1960 3960 27d5822dd4cdeafc49c43ccbb21ce23d954880fe396902ce9e5b5dac81a6cf84.exe 27d5822dd4cdeafc49c43ccbb21ce23d954880fe396902ce9e5b5dac81a6cf84.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
powershell.exe27d5822dd4cdeafc49c43ccbb21ce23d954880fe396902ce9e5b5dac81a6cf84.exe27d5822dd4cdeafc49c43ccbb21ce23d954880fe396902ce9e5b5dac81a6cf84.exepid process 3024 powershell.exe 3024 powershell.exe 3960 27d5822dd4cdeafc49c43ccbb21ce23d954880fe396902ce9e5b5dac81a6cf84.exe 3960 27d5822dd4cdeafc49c43ccbb21ce23d954880fe396902ce9e5b5dac81a6cf84.exe 3960 27d5822dd4cdeafc49c43ccbb21ce23d954880fe396902ce9e5b5dac81a6cf84.exe 3960 27d5822dd4cdeafc49c43ccbb21ce23d954880fe396902ce9e5b5dac81a6cf84.exe 1960 27d5822dd4cdeafc49c43ccbb21ce23d954880fe396902ce9e5b5dac81a6cf84.exe 1960 27d5822dd4cdeafc49c43ccbb21ce23d954880fe396902ce9e5b5dac81a6cf84.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
27d5822dd4cdeafc49c43ccbb21ce23d954880fe396902ce9e5b5dac81a6cf84.exepowershell.exedescription pid process Token: SeDebugPrivilege 3960 27d5822dd4cdeafc49c43ccbb21ce23d954880fe396902ce9e5b5dac81a6cf84.exe Token: SeDebugPrivilege 3024 powershell.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
27d5822dd4cdeafc49c43ccbb21ce23d954880fe396902ce9e5b5dac81a6cf84.exedescription pid process target process PID 3960 wrote to memory of 3024 3960 27d5822dd4cdeafc49c43ccbb21ce23d954880fe396902ce9e5b5dac81a6cf84.exe powershell.exe PID 3960 wrote to memory of 3024 3960 27d5822dd4cdeafc49c43ccbb21ce23d954880fe396902ce9e5b5dac81a6cf84.exe powershell.exe PID 3960 wrote to memory of 3024 3960 27d5822dd4cdeafc49c43ccbb21ce23d954880fe396902ce9e5b5dac81a6cf84.exe powershell.exe PID 3960 wrote to memory of 4140 3960 27d5822dd4cdeafc49c43ccbb21ce23d954880fe396902ce9e5b5dac81a6cf84.exe 27d5822dd4cdeafc49c43ccbb21ce23d954880fe396902ce9e5b5dac81a6cf84.exe PID 3960 wrote to memory of 4140 3960 27d5822dd4cdeafc49c43ccbb21ce23d954880fe396902ce9e5b5dac81a6cf84.exe 27d5822dd4cdeafc49c43ccbb21ce23d954880fe396902ce9e5b5dac81a6cf84.exe PID 3960 wrote to memory of 4140 3960 27d5822dd4cdeafc49c43ccbb21ce23d954880fe396902ce9e5b5dac81a6cf84.exe 27d5822dd4cdeafc49c43ccbb21ce23d954880fe396902ce9e5b5dac81a6cf84.exe PID 3960 wrote to memory of 3204 3960 27d5822dd4cdeafc49c43ccbb21ce23d954880fe396902ce9e5b5dac81a6cf84.exe 27d5822dd4cdeafc49c43ccbb21ce23d954880fe396902ce9e5b5dac81a6cf84.exe PID 3960 wrote to memory of 3204 3960 27d5822dd4cdeafc49c43ccbb21ce23d954880fe396902ce9e5b5dac81a6cf84.exe 27d5822dd4cdeafc49c43ccbb21ce23d954880fe396902ce9e5b5dac81a6cf84.exe PID 3960 wrote to memory of 3204 3960 27d5822dd4cdeafc49c43ccbb21ce23d954880fe396902ce9e5b5dac81a6cf84.exe 27d5822dd4cdeafc49c43ccbb21ce23d954880fe396902ce9e5b5dac81a6cf84.exe PID 3960 wrote to memory of 1960 3960 27d5822dd4cdeafc49c43ccbb21ce23d954880fe396902ce9e5b5dac81a6cf84.exe 27d5822dd4cdeafc49c43ccbb21ce23d954880fe396902ce9e5b5dac81a6cf84.exe PID 3960 wrote to memory of 1960 3960 27d5822dd4cdeafc49c43ccbb21ce23d954880fe396902ce9e5b5dac81a6cf84.exe 27d5822dd4cdeafc49c43ccbb21ce23d954880fe396902ce9e5b5dac81a6cf84.exe PID 3960 wrote to memory of 1960 3960 27d5822dd4cdeafc49c43ccbb21ce23d954880fe396902ce9e5b5dac81a6cf84.exe 27d5822dd4cdeafc49c43ccbb21ce23d954880fe396902ce9e5b5dac81a6cf84.exe PID 3960 wrote to memory of 1960 3960 27d5822dd4cdeafc49c43ccbb21ce23d954880fe396902ce9e5b5dac81a6cf84.exe 27d5822dd4cdeafc49c43ccbb21ce23d954880fe396902ce9e5b5dac81a6cf84.exe PID 3960 wrote to memory of 1960 3960 27d5822dd4cdeafc49c43ccbb21ce23d954880fe396902ce9e5b5dac81a6cf84.exe 27d5822dd4cdeafc49c43ccbb21ce23d954880fe396902ce9e5b5dac81a6cf84.exe PID 3960 wrote to memory of 1960 3960 27d5822dd4cdeafc49c43ccbb21ce23d954880fe396902ce9e5b5dac81a6cf84.exe 27d5822dd4cdeafc49c43ccbb21ce23d954880fe396902ce9e5b5dac81a6cf84.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\27d5822dd4cdeafc49c43ccbb21ce23d954880fe396902ce9e5b5dac81a6cf84.exe"C:\Users\Admin\AppData\Local\Temp\27d5822dd4cdeafc49c43ccbb21ce23d954880fe396902ce9e5b5dac81a6cf84.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" [System.Security.Principal.WindowsIdentity]::GetCurrent().Name2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3024
-
-
C:\Users\Admin\AppData\Local\Temp\27d5822dd4cdeafc49c43ccbb21ce23d954880fe396902ce9e5b5dac81a6cf84.exeC:\Users\Admin\AppData\Local\Temp\27d5822dd4cdeafc49c43ccbb21ce23d954880fe396902ce9e5b5dac81a6cf84.exe2⤵PID:4140
-
-
C:\Users\Admin\AppData\Local\Temp\27d5822dd4cdeafc49c43ccbb21ce23d954880fe396902ce9e5b5dac81a6cf84.exeC:\Users\Admin\AppData\Local\Temp\27d5822dd4cdeafc49c43ccbb21ce23d954880fe396902ce9e5b5dac81a6cf84.exe2⤵PID:3204
-
-
C:\Users\Admin\AppData\Local\Temp\27d5822dd4cdeafc49c43ccbb21ce23d954880fe396902ce9e5b5dac81a6cf84.exeC:\Users\Admin\AppData\Local\Temp\27d5822dd4cdeafc49c43ccbb21ce23d954880fe396902ce9e5b5dac81a6cf84.exe2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1960
-