Analysis
-
max time kernel
153s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2022 09:21
Static task
static1
Behavioral task
behavioral1
Sample
11-29-22.exe
Resource
win7-20220901-en
General
-
Target
11-29-22.exe
-
Size
121KB
-
MD5
e906026bef372da3ac8618be9c0a1787
-
SHA1
d98429fcff9d667e116c8b99469070e7bdb0de59
-
SHA256
d13d078e3ca43adb581966a669f056116b1aaee681d1b6c026f0b6f4bb606324
-
SHA512
403de6adc801b3f460967f0b0d63003647265be67cc0336aeb60a1c31cdbed00199eb43c8bed489c777299db36f88f785b99e29bf15b4f3615bd907b3431f4cb
-
SSDEEP
3072:VEvf9OEud7hY72rOAOkGt6+duWA/t/SHUebbxCbGgKk12qk/In/87gUHCzQgtn9x:u9OnGZwLf8
Malware Config
Extracted
formbook
4.1
fs44
whneat.com
jljcw.net
pocodelivery.com
outofplacezine.com
yavuzcansigorta.com
xinhewood-cn.com
cartogogh.com
5avis.com
joyceyong.art
digitalsurf.community
blackcreekbarns.com
magazinedistribuidor.com
sportsgross.com
drevom.online
mayibeofservice.com
gareloi-digit.com
permitha.net
renaissanceestetica.com
facts-r-friends.com
dach-loc.com
thezuki.xyz
cerradoforte.com
yunjin-band.com
soleirasun.com
stoneyinsideout.com
a-sprut.store
verdistar.com
hivingly.com
trywork.net
bvpropertymanagement.com
calibrationprofessionals.com
mpalmcoffee.com
polygons-stakes.site
themomerator.com
payrollserviceform.com
luyensex.club
elon-drop.net
bluechipblog.com
suaempresaemcasa.com
experimentalcircus.art
vietnamesecuisines.com
i4zlyv.com
b23q.xyz
quantumap.com
sana-poratal.site
eastcoastguardfl.com
maxwell-caspar.com
pontochavelocacoes.com
nitsmm.site
tiffanyrockdesign.com
dgmlsubscribers.com
cybericonsultancy.com
bankssy.com
cxitsolution.com
summerinthepark2022.com
chainadmere.com
quangdecalshop.com
winagency.net
motorworks.tech
huefa.club
mthoodviewlodge.com
bahisaltv79.com
codeforge.pro
dpd-gasplumbingandheating.com
echoesdesing.com
Signatures
-
Formbook payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/3868-149-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/3868-155-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4360-159-0x00000000003B0000-0x00000000003DF000-memory.dmp formbook behavioral2/memory/4360-161-0x00000000003B0000-0x00000000003DF000-memory.dmp formbook -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
11-29-22.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 11-29-22.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
11-29-22.exeMSBuild.exeWWAHost.exedescription pid process target process PID 400 set thread context of 3868 400 11-29-22.exe MSBuild.exe PID 3868 set thread context of 3044 3868 MSBuild.exe Explorer.EXE PID 4360 set thread context of 3044 4360 WWAHost.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 44 IoCs
Processes:
powershell.exepowershell.exeMSBuild.exeWWAHost.exepid process 3264 powershell.exe 3264 powershell.exe 4032 powershell.exe 4032 powershell.exe 3868 MSBuild.exe 3868 MSBuild.exe 3868 MSBuild.exe 3868 MSBuild.exe 4360 WWAHost.exe 4360 WWAHost.exe 4360 WWAHost.exe 4360 WWAHost.exe 4360 WWAHost.exe 4360 WWAHost.exe 4360 WWAHost.exe 4360 WWAHost.exe 4360 WWAHost.exe 4360 WWAHost.exe 4360 WWAHost.exe 4360 WWAHost.exe 4360 WWAHost.exe 4360 WWAHost.exe 4360 WWAHost.exe 4360 WWAHost.exe 4360 WWAHost.exe 4360 WWAHost.exe 4360 WWAHost.exe 4360 WWAHost.exe 4360 WWAHost.exe 4360 WWAHost.exe 4360 WWAHost.exe 4360 WWAHost.exe 4360 WWAHost.exe 4360 WWAHost.exe 4360 WWAHost.exe 4360 WWAHost.exe 4360 WWAHost.exe 4360 WWAHost.exe 4360 WWAHost.exe 4360 WWAHost.exe 4360 WWAHost.exe 4360 WWAHost.exe 4360 WWAHost.exe 4360 WWAHost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3044 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
MSBuild.exeWWAHost.exepid process 3868 MSBuild.exe 3868 MSBuild.exe 3868 MSBuild.exe 4360 WWAHost.exe 4360 WWAHost.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
powershell.exe11-29-22.exepowershell.exeMSBuild.exeWWAHost.exedescription pid process Token: SeDebugPrivilege 3264 powershell.exe Token: SeDebugPrivilege 400 11-29-22.exe Token: SeDebugPrivilege 4032 powershell.exe Token: SeDebugPrivilege 3868 MSBuild.exe Token: SeDebugPrivilege 4360 WWAHost.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
11-29-22.exeExplorer.EXEWWAHost.exedescription pid process target process PID 400 wrote to memory of 3264 400 11-29-22.exe powershell.exe PID 400 wrote to memory of 3264 400 11-29-22.exe powershell.exe PID 400 wrote to memory of 3264 400 11-29-22.exe powershell.exe PID 400 wrote to memory of 4032 400 11-29-22.exe powershell.exe PID 400 wrote to memory of 4032 400 11-29-22.exe powershell.exe PID 400 wrote to memory of 4032 400 11-29-22.exe powershell.exe PID 400 wrote to memory of 3868 400 11-29-22.exe MSBuild.exe PID 400 wrote to memory of 3868 400 11-29-22.exe MSBuild.exe PID 400 wrote to memory of 3868 400 11-29-22.exe MSBuild.exe PID 400 wrote to memory of 3868 400 11-29-22.exe MSBuild.exe PID 400 wrote to memory of 3868 400 11-29-22.exe MSBuild.exe PID 400 wrote to memory of 3868 400 11-29-22.exe MSBuild.exe PID 3044 wrote to memory of 4360 3044 Explorer.EXE WWAHost.exe PID 3044 wrote to memory of 4360 3044 Explorer.EXE WWAHost.exe PID 3044 wrote to memory of 4360 3044 Explorer.EXE WWAHost.exe PID 4360 wrote to memory of 868 4360 WWAHost.exe cmd.exe PID 4360 wrote to memory of 868 4360 WWAHost.exe cmd.exe PID 4360 wrote to memory of 868 4360 WWAHost.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\11-29-22.exe"C:\Users\Admin\AppData\Local\Temp\11-29-22.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-Date3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3264
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMQAwAA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4032
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe purecrypter.exe3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3868
-
-
-
C:\Windows\SysWOW64\WWAHost.exe"C:\Windows\SysWOW64\WWAHost.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵PID:868
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD54280e36a29fa31c01e4d8b2ba726a0d8
SHA1c485c2c9ce0a99747b18d899b71dfa9a64dabe32
SHA256e2486a1bdcba80dad6dd6210d7374bd70ae196a523c06ceda71370fd3ea78359
SHA512494fe5f0ade03669e5830bed93c964d69b86629440148d7b0881cf53203fd89443ebff9b4d1ee9d96244f62af6edede622d9eacba37f80f389a0d522e4ad4ea4
-
Filesize
17KB
MD59befb8f6c6fcb990e6014c5b4aa8da88
SHA1480221b1584f17c89e6b8ee41c1b5d0e041d3fc6
SHA256d5ca9a675e7449c6405aca51a8f1b086d846f9ef53bd43cd57080aea589d9f4a
SHA512d429a38d2288f0fdea92101d41000e30c85ef3d56c4f16a6c2afd2c2ab5f0183e11a12584dc3b328542e53e9b34f4effced1b46d0b208c975ebfce81c58b8c07