Analysis
-
max time kernel
262s -
max time network
282s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2022 09:38
Static task
static1
Behavioral task
behavioral1
Sample
clientIC.exe
Resource
win7-20220901-en
General
-
Target
clientIC.exe
-
Size
233KB
-
MD5
6748ab9c3f718189aa1942e6465c5de4
-
SHA1
872407ac71d607b1d02b1e116ce7c1a788078888
-
SHA256
d7cc0491b79a1024a4b9cdff777d016b9ccd6ecb7b335ccb54f61fea89e345cd
-
SHA512
90710bb4a02c94c9274aa25ca67357c037475d1c7793fc9a72568e853c989a5e77587f7f7a66bcc46c89f53e3629a507d537721c234866710cabb362b79da74a
-
SSDEEP
6144:5Bnuy0yPQ9aJbN6bWfO8hOXFI07pyDRAHUdTHyqiYBNBYd5PP2Tkc+:Ky0yPQ90bN6bkhI9W2rMNBYn2Ic+
Malware Config
Extracted
formbook
4.1
wh23
ow9vyvfee.com
alvis.one
mutantgobz.claims
plynofon.com
southofkingst.store
nuvidamedspa.com
coffeeforyou56.com
opaletechevents.com
momobar.life
abcmousu.com
learnicd-11.com
tipokin.xyz
kahvezevki.com
suratdimond.com
oldartists.best
infoepic.info
mattresslabo.com
skarlmotors.com
cl9319x.xyz
med49app.net
vivarellistaging2.com
gwnv.link
ogurecsbatvoi-7.online
littlelionplaycafe.com
floridaindianrivergeoves.com
eyelashacademysurrey.com
elprobetre.store
sexfan.biz
westbay.casino
carmana.store
optitude.finance
neo-hub.us
meadowwoodanimalclinic.com
ok-experts.com
magnoliabymr.com
fenomini.com
miaowu.work
skipermind.com
winstim.com
14123ninemile.com
plegablescr.com
bloommagiccbdburaliste.com
focusing-garef.com
krumobilept.com
norbercik.online
qteko.com
growupmarketingservices.com
alem-holdings.com
entreinnovator3.com
mainlydivision.space
module.live
gtrewegehwewe5.asia
jd8wme.cyou
pingacx757.com
big-teamwork.com
lesyeuxdanslespoches.com
yutighjkdfgjkd.shop
yourstoolsample.com
musntgrumble.com
jurgenremmerie.com
ebade.xyz
johnollieconstruction.com
bioprofumeria.shop
sarithebrand.com
taiguszab.online
Signatures
-
Formbook payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/3304-139-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/2996-145-0x0000000000940000-0x000000000096F000-memory.dmp formbook behavioral2/memory/2996-147-0x0000000000940000-0x000000000096F000-memory.dmp formbook -
Executes dropped EXE 2 IoCs
Processes:
phduzwarfr.exephduzwarfr.exepid process 4636 phduzwarfr.exe 3304 phduzwarfr.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
phduzwarfr.exephduzwarfr.exeexplorer.exedescription pid process target process PID 4636 set thread context of 3304 4636 phduzwarfr.exe phduzwarfr.exe PID 3304 set thread context of 1300 3304 phduzwarfr.exe Explorer.EXE PID 2996 set thread context of 1300 2996 explorer.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 38 IoCs
Processes:
phduzwarfr.exeexplorer.exepid process 3304 phduzwarfr.exe 3304 phduzwarfr.exe 3304 phduzwarfr.exe 3304 phduzwarfr.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 1300 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
phduzwarfr.exephduzwarfr.exeexplorer.exepid process 4636 phduzwarfr.exe 3304 phduzwarfr.exe 3304 phduzwarfr.exe 3304 phduzwarfr.exe 2996 explorer.exe 2996 explorer.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
Processes:
phduzwarfr.exeexplorer.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 3304 phduzwarfr.exe Token: SeDebugPrivilege 2996 explorer.exe Token: SeShutdownPrivilege 1300 Explorer.EXE Token: SeCreatePagefilePrivilege 1300 Explorer.EXE Token: SeShutdownPrivilege 1300 Explorer.EXE Token: SeCreatePagefilePrivilege 1300 Explorer.EXE Token: SeShutdownPrivilege 1300 Explorer.EXE Token: SeCreatePagefilePrivilege 1300 Explorer.EXE Token: SeShutdownPrivilege 1300 Explorer.EXE Token: SeCreatePagefilePrivilege 1300 Explorer.EXE Token: SeShutdownPrivilege 1300 Explorer.EXE Token: SeCreatePagefilePrivilege 1300 Explorer.EXE -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
clientIC.exephduzwarfr.exeExplorer.EXEexplorer.exedescription pid process target process PID 3140 wrote to memory of 4636 3140 clientIC.exe phduzwarfr.exe PID 3140 wrote to memory of 4636 3140 clientIC.exe phduzwarfr.exe PID 3140 wrote to memory of 4636 3140 clientIC.exe phduzwarfr.exe PID 4636 wrote to memory of 3304 4636 phduzwarfr.exe phduzwarfr.exe PID 4636 wrote to memory of 3304 4636 phduzwarfr.exe phduzwarfr.exe PID 4636 wrote to memory of 3304 4636 phduzwarfr.exe phduzwarfr.exe PID 4636 wrote to memory of 3304 4636 phduzwarfr.exe phduzwarfr.exe PID 1300 wrote to memory of 2996 1300 Explorer.EXE explorer.exe PID 1300 wrote to memory of 2996 1300 Explorer.EXE explorer.exe PID 1300 wrote to memory of 2996 1300 Explorer.EXE explorer.exe PID 2996 wrote to memory of 4500 2996 explorer.exe cmd.exe PID 2996 wrote to memory of 4500 2996 explorer.exe cmd.exe PID 2996 wrote to memory of 4500 2996 explorer.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Users\Admin\AppData\Local\Temp\clientIC.exe"C:\Users\Admin\AppData\Local\Temp\clientIC.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Users\Admin\AppData\Local\Temp\phduzwarfr.exe"C:\Users\Admin\AppData\Local\Temp\phduzwarfr.exe" C:\Users\Admin\AppData\Local\Temp\zvqzaut.hws3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Users\Admin\AppData\Local\Temp\phduzwarfr.exe"C:\Users\Admin\AppData\Local\Temp\phduzwarfr.exe" C:\Users\Admin\AppData\Local\Temp\zvqzaut.hws4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3304 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\phduzwarfr.exe"3⤵PID:4500
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\ffxuxjbtdz.bFilesize
185KB
MD5ce0501d049b36b96e29f0187e0913405
SHA16703ba8426b90fe9f16f1282e7097d0dbdd55d35
SHA25617b672ceb5d15ca6f3b6a740ab9ec92aefb998dac041523a3c53b7ff3d152a75
SHA51277ee1d15271935e02b4f6715c8d31472765a997381cae9456edfff409b56626fd2fb923dc2e5b592f4359c3bf6753f11a8d0e4ce8491353a3c5d516d834b2120
-
C:\Users\Admin\AppData\Local\Temp\phduzwarfr.exeFilesize
58KB
MD5b670630c7aa6f7e6951b5c76c744d4d9
SHA1de350e75c9bafcd96a7d1d7d903f5a93bd1feac9
SHA25629401b58e8e60b9263f1cf414ceb9d86ba008228398d102c98d9adbd914afa54
SHA512ec639fe440a1b005df43e0ded88ced0db1d8bc88a10a7c1d150658911a32233246969ad1b6819618d02a00883ac5c13405978d67674f6a662e540cd3a87d4d7a
-
C:\Users\Admin\AppData\Local\Temp\phduzwarfr.exeFilesize
58KB
MD5b670630c7aa6f7e6951b5c76c744d4d9
SHA1de350e75c9bafcd96a7d1d7d903f5a93bd1feac9
SHA25629401b58e8e60b9263f1cf414ceb9d86ba008228398d102c98d9adbd914afa54
SHA512ec639fe440a1b005df43e0ded88ced0db1d8bc88a10a7c1d150658911a32233246969ad1b6819618d02a00883ac5c13405978d67674f6a662e540cd3a87d4d7a
-
C:\Users\Admin\AppData\Local\Temp\phduzwarfr.exeFilesize
58KB
MD5b670630c7aa6f7e6951b5c76c744d4d9
SHA1de350e75c9bafcd96a7d1d7d903f5a93bd1feac9
SHA25629401b58e8e60b9263f1cf414ceb9d86ba008228398d102c98d9adbd914afa54
SHA512ec639fe440a1b005df43e0ded88ced0db1d8bc88a10a7c1d150658911a32233246969ad1b6819618d02a00883ac5c13405978d67674f6a662e540cd3a87d4d7a
-
C:\Users\Admin\AppData\Local\Temp\zvqzaut.hwsFilesize
5KB
MD50e0ffbdced812efa2a46bf7031cde71f
SHA13d89adc82fc0176d929a74090a67bff18c81a2c6
SHA256f073014d979689fa38acc7446e2197a970645c52252e1a49a35ad4810be97c80
SHA5122b87dd9fe218bcd2c7f4d91e3e0d82beda125327582666dc4cf7c0d8dbb83502297ed913a876731542adb2e73b49bdd2e209baf6bbbd8f249e068b20910be76e
-
memory/1300-153-0x0000000003550000-0x0000000003560000-memory.dmpFilesize
64KB
-
memory/1300-160-0x0000000001310000-0x0000000001320000-memory.dmpFilesize
64KB
-
memory/1300-164-0x0000000001310000-0x0000000001320000-memory.dmpFilesize
64KB
-
memory/1300-163-0x0000000001300000-0x0000000001310000-memory.dmpFilesize
64KB
-
memory/1300-162-0x0000000001310000-0x0000000001320000-memory.dmpFilesize
64KB
-
memory/1300-142-0x00000000091A0000-0x00000000092E4000-memory.dmpFilesize
1.3MB
-
memory/1300-159-0x0000000007CB0000-0x0000000007D72000-memory.dmpFilesize
776KB
-
memory/1300-158-0x0000000007CB0000-0x0000000007D72000-memory.dmpFilesize
776KB
-
memory/1300-156-0x0000000003550000-0x0000000003560000-memory.dmpFilesize
64KB
-
memory/1300-155-0x0000000003550000-0x0000000003560000-memory.dmpFilesize
64KB
-
memory/1300-154-0x0000000003550000-0x0000000003560000-memory.dmpFilesize
64KB
-
memory/1300-161-0x0000000003650000-0x0000000003660000-memory.dmpFilesize
64KB
-
memory/1300-149-0x0000000001310000-0x0000000001320000-memory.dmpFilesize
64KB
-
memory/1300-150-0x0000000001310000-0x0000000001320000-memory.dmpFilesize
64KB
-
memory/1300-151-0x0000000003550000-0x0000000003560000-memory.dmpFilesize
64KB
-
memory/1300-152-0x0000000003550000-0x0000000003560000-memory.dmpFilesize
64KB
-
memory/1300-165-0x0000000003650000-0x0000000003660000-memory.dmpFilesize
64KB
-
memory/2996-147-0x0000000000940000-0x000000000096F000-memory.dmpFilesize
188KB
-
memory/2996-146-0x0000000002B60000-0x0000000002EAA000-memory.dmpFilesize
3.3MB
-
memory/2996-145-0x0000000000940000-0x000000000096F000-memory.dmpFilesize
188KB
-
memory/2996-157-0x00000000029E0000-0x0000000002A73000-memory.dmpFilesize
588KB
-
memory/2996-144-0x0000000000400000-0x0000000000833000-memory.dmpFilesize
4.2MB
-
memory/2996-143-0x0000000000000000-mapping.dmp
-
memory/3304-140-0x0000000000B10000-0x0000000000E5A000-memory.dmpFilesize
3.3MB
-
memory/3304-141-0x00000000005C0000-0x00000000005D4000-memory.dmpFilesize
80KB
-
memory/3304-139-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/3304-137-0x0000000000000000-mapping.dmp
-
memory/4500-148-0x0000000000000000-mapping.dmp
-
memory/4636-132-0x0000000000000000-mapping.dmp