Analysis
-
max time kernel
71s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 12:49
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.CrypterX-gen.24274.13707.exe
Resource
win7-20220812-en
General
-
Target
SecuriteInfo.com.Win32.CrypterX-gen.24274.13707.exe
-
Size
885KB
-
MD5
630ffd21c1de8a583a4e1627b8ac6534
-
SHA1
7cdb7d33a07326fa3b2699bb7308889a0920541a
-
SHA256
02b628dcbfaa0cad2ccde62b1cfb16425a8d40b4cad9de200569ce1b84981612
-
SHA512
9ee857113df144f0fed19c1c831cf4731b866e8b5a92417b11c445d2cb9a374c430a6c2fc4a7318bd01a0fdc756132d7f4895f0798a3fdf194ac3b223f10cd68
-
SSDEEP
24576:hIVD2ISXOaDU11ecODssqm/6rw5Roa/W9DdEPf:ha2RXOKcLsq46s5RoafP
Malware Config
Extracted
formbook
4.1
f9r5
teknotimur.com
zuliboo.com
remmingtoncampbell.com
vehicletitleloansphoenix.com
sen-computer.com
98731.biz
shelikesblu.com
canis-totem.com
metaversemedianetwork.com
adsdu.com
vanishmediasystems.com
astewaykebede.com
wszhongxue.com
gacha-animator-free.com
papatyadekorasyon.com
mqc168.top
simplebrilliantsolutions.com
jubileehawkesprairie.com
ridflab.com
conboysfilm.com
iseemerit.world
airhbb.com
haveyourshare.com
qcstcsz.com
attorneykarinaramirez.com
patriziabartelle.com
dcc.coop
hdzz.top
treesandstarsoracle.com
rebarunikont.com
achivego.site
baipiao100.com
menslibwrty.com
insulationtraining.online
horseflix.club
suxyqyu.xyz
sqoki.com
ffbsjhvbsjhbvsajv.xyz
beapest.cfd
4892166.com
dvdmediastar.com
hotwomensearching4u.site
cupompetlover.com
terrapretasales.com
joinsequene.com
powerkitap.com
jonjene.com
wqcwgl.com
utahexotics.com
ballerboutique.com
cftronline.com
gettidaladvance.site
anagladstonedesign.com
bunsi-figura.store
ttvip-13.net
cmjysx-uqps.website
ifealafia.com
carlospainter.com
elitetrio.xyz
inggridangelia.com
leporebaq.com
youpinhang.com
palm3d.net
wo567567.com
shinecleaningasheville.com
Signatures
-
Formbook payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/584-67-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/584-68-0x000000000041F150-mapping.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
SecuriteInfo.com.Win32.CrypterX-gen.24274.13707.exedescription pid process target process PID 1368 set thread context of 584 1368 SecuriteInfo.com.Win32.CrypterX-gen.24274.13707.exe SecuriteInfo.com.Win32.CrypterX-gen.24274.13707.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
SecuriteInfo.com.Win32.CrypterX-gen.24274.13707.exepowershell.exepid process 584 SecuriteInfo.com.Win32.CrypterX-gen.24274.13707.exe 1832 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 1832 powershell.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
SecuriteInfo.com.Win32.CrypterX-gen.24274.13707.exedescription pid process target process PID 1368 wrote to memory of 1832 1368 SecuriteInfo.com.Win32.CrypterX-gen.24274.13707.exe powershell.exe PID 1368 wrote to memory of 1832 1368 SecuriteInfo.com.Win32.CrypterX-gen.24274.13707.exe powershell.exe PID 1368 wrote to memory of 1832 1368 SecuriteInfo.com.Win32.CrypterX-gen.24274.13707.exe powershell.exe PID 1368 wrote to memory of 1832 1368 SecuriteInfo.com.Win32.CrypterX-gen.24274.13707.exe powershell.exe PID 1368 wrote to memory of 1820 1368 SecuriteInfo.com.Win32.CrypterX-gen.24274.13707.exe schtasks.exe PID 1368 wrote to memory of 1820 1368 SecuriteInfo.com.Win32.CrypterX-gen.24274.13707.exe schtasks.exe PID 1368 wrote to memory of 1820 1368 SecuriteInfo.com.Win32.CrypterX-gen.24274.13707.exe schtasks.exe PID 1368 wrote to memory of 1820 1368 SecuriteInfo.com.Win32.CrypterX-gen.24274.13707.exe schtasks.exe PID 1368 wrote to memory of 584 1368 SecuriteInfo.com.Win32.CrypterX-gen.24274.13707.exe SecuriteInfo.com.Win32.CrypterX-gen.24274.13707.exe PID 1368 wrote to memory of 584 1368 SecuriteInfo.com.Win32.CrypterX-gen.24274.13707.exe SecuriteInfo.com.Win32.CrypterX-gen.24274.13707.exe PID 1368 wrote to memory of 584 1368 SecuriteInfo.com.Win32.CrypterX-gen.24274.13707.exe SecuriteInfo.com.Win32.CrypterX-gen.24274.13707.exe PID 1368 wrote to memory of 584 1368 SecuriteInfo.com.Win32.CrypterX-gen.24274.13707.exe SecuriteInfo.com.Win32.CrypterX-gen.24274.13707.exe PID 1368 wrote to memory of 584 1368 SecuriteInfo.com.Win32.CrypterX-gen.24274.13707.exe SecuriteInfo.com.Win32.CrypterX-gen.24274.13707.exe PID 1368 wrote to memory of 584 1368 SecuriteInfo.com.Win32.CrypterX-gen.24274.13707.exe SecuriteInfo.com.Win32.CrypterX-gen.24274.13707.exe PID 1368 wrote to memory of 584 1368 SecuriteInfo.com.Win32.CrypterX-gen.24274.13707.exe SecuriteInfo.com.Win32.CrypterX-gen.24274.13707.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.CrypterX-gen.24274.13707.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.CrypterX-gen.24274.13707.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\owFIYUUG.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1832
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\owFIYUUG" /XML "C:\Users\Admin\AppData\Local\Temp\tmpE773.tmp"2⤵
- Creates scheduled task(s)
PID:1820
-
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.CrypterX-gen.24274.13707.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.CrypterX-gen.24274.13707.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:584
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD53065bf846c0152430f39bb4abe8fc794
SHA1b5ae86b27fe20702d0e23efa89af4c1365c5b261
SHA2568266a23b4722923f1e23dedfc672399157f926fa9e841c25cc13d6c5d0ae5031
SHA5120a0c35cf63c00bc3107cec95f962b49bad39886bbe1ff5dcfb66ba10261a17b022f7871609fa258d5c0c2178c71e35a3f550c937594703d3a2baa379efdab3bc