Analysis
-
max time kernel
186s -
max time network
206s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2022 14:11
Static task
static1
Behavioral task
behavioral1
Sample
b44ee52856f84ec787ba1c374c756932c713d3a93b8a610b0c4e362b008bb5eb.exe
Resource
win7-20220812-en
General
-
Target
b44ee52856f84ec787ba1c374c756932c713d3a93b8a610b0c4e362b008bb5eb.exe
-
Size
994KB
-
MD5
ad50c081824b04713a98c32b22e487f8
-
SHA1
757ca6a028d1e38efbedf24a8f957043ae22e694
-
SHA256
b44ee52856f84ec787ba1c374c756932c713d3a93b8a610b0c4e362b008bb5eb
-
SHA512
14af69699b174feea717cf92ecf97070878969596ed10f56dd871b57a52d09fcfb154a753e0a160dbdc813e96adea63c7139744751d5a645d5c1ed530abe96e0
-
SSDEEP
12288:87mFpBYj6jRPLjRPqjBjjyjBjBjBjBjLjkeJ28I4Php94J8JVIQkxHiZ3jJDOK8H:GyBJVIQeIIpgOG75
Malware Config
Extracted
formbook
4.1
dei5
studiomullerphoto.com
reallionairewear.com
dogsalondoggy-tail.com
excelmache.net
bigdiscounters.com
7986799.com
ignition.guru
xiaoxu.info
jpinpd.com
solpool.info
uchooswrewards.com
everestengineeringworks.com
qianglongzhipin.com
deepimper-325.com
appliedrate.com
radsazemehr.com
vivabematividadesfisicas.com
capacitalo.com
somecore.com
listingclass.net
romel.codes
mybettermentor.com
hxc43.com
btccvil312723.com
rudiskenya.com
internationalrockmusic.com
wudiwifi.com
scienceacademyraj.com
tumulusinnovations.com
studioeduardobeninca.com
formabench.com
ribbonredwhiteandblue.com
miningequipmentrental.com
myamom.com
riversportswear.net
14505glenmarkdr.com
nikolcosmetic.com
toninopr.com
cutfortheconnect.com
nl22584.com
mezokovesd.com
rozhandesign.com
futbolki.space
rmobipanoshop.com
merchmuslim.com
recurrentcornealerosion.com
enottampan.com
vasquez.photos
koreanmindbeauty.com
andressabode.com
thetwolouises.com
weberbyroble.com
followmargpolo.com
englishclubb.online
sorryididnthearthat.com
greatlookfashion.club
cartoleriagrillocatania.com
esteprize.com
sdsej.com
phiecraft.xyz
psm-gen.com
passivefiresafe.com
homeyplantycosy.com
0343888.com
merckcbd.com
Signatures
-
Formbook payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/736-142-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
b44ee52856f84ec787ba1c374c756932c713d3a93b8a610b0c4e362b008bb5eb.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation b44ee52856f84ec787ba1c374c756932c713d3a93b8a610b0c4e362b008bb5eb.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
b44ee52856f84ec787ba1c374c756932c713d3a93b8a610b0c4e362b008bb5eb.exedescription pid process target process PID 4300 set thread context of 736 4300 b44ee52856f84ec787ba1c374c756932c713d3a93b8a610b0c4e362b008bb5eb.exe b44ee52856f84ec787ba1c374c756932c713d3a93b8a610b0c4e362b008bb5eb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
b44ee52856f84ec787ba1c374c756932c713d3a93b8a610b0c4e362b008bb5eb.exeb44ee52856f84ec787ba1c374c756932c713d3a93b8a610b0c4e362b008bb5eb.exepid process 4300 b44ee52856f84ec787ba1c374c756932c713d3a93b8a610b0c4e362b008bb5eb.exe 4300 b44ee52856f84ec787ba1c374c756932c713d3a93b8a610b0c4e362b008bb5eb.exe 4300 b44ee52856f84ec787ba1c374c756932c713d3a93b8a610b0c4e362b008bb5eb.exe 736 b44ee52856f84ec787ba1c374c756932c713d3a93b8a610b0c4e362b008bb5eb.exe 736 b44ee52856f84ec787ba1c374c756932c713d3a93b8a610b0c4e362b008bb5eb.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
b44ee52856f84ec787ba1c374c756932c713d3a93b8a610b0c4e362b008bb5eb.exedescription pid process Token: SeDebugPrivilege 4300 b44ee52856f84ec787ba1c374c756932c713d3a93b8a610b0c4e362b008bb5eb.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
b44ee52856f84ec787ba1c374c756932c713d3a93b8a610b0c4e362b008bb5eb.exedescription pid process target process PID 4300 wrote to memory of 2756 4300 b44ee52856f84ec787ba1c374c756932c713d3a93b8a610b0c4e362b008bb5eb.exe schtasks.exe PID 4300 wrote to memory of 2756 4300 b44ee52856f84ec787ba1c374c756932c713d3a93b8a610b0c4e362b008bb5eb.exe schtasks.exe PID 4300 wrote to memory of 2756 4300 b44ee52856f84ec787ba1c374c756932c713d3a93b8a610b0c4e362b008bb5eb.exe schtasks.exe PID 4300 wrote to memory of 3884 4300 b44ee52856f84ec787ba1c374c756932c713d3a93b8a610b0c4e362b008bb5eb.exe b44ee52856f84ec787ba1c374c756932c713d3a93b8a610b0c4e362b008bb5eb.exe PID 4300 wrote to memory of 3884 4300 b44ee52856f84ec787ba1c374c756932c713d3a93b8a610b0c4e362b008bb5eb.exe b44ee52856f84ec787ba1c374c756932c713d3a93b8a610b0c4e362b008bb5eb.exe PID 4300 wrote to memory of 3884 4300 b44ee52856f84ec787ba1c374c756932c713d3a93b8a610b0c4e362b008bb5eb.exe b44ee52856f84ec787ba1c374c756932c713d3a93b8a610b0c4e362b008bb5eb.exe PID 4300 wrote to memory of 736 4300 b44ee52856f84ec787ba1c374c756932c713d3a93b8a610b0c4e362b008bb5eb.exe b44ee52856f84ec787ba1c374c756932c713d3a93b8a610b0c4e362b008bb5eb.exe PID 4300 wrote to memory of 736 4300 b44ee52856f84ec787ba1c374c756932c713d3a93b8a610b0c4e362b008bb5eb.exe b44ee52856f84ec787ba1c374c756932c713d3a93b8a610b0c4e362b008bb5eb.exe PID 4300 wrote to memory of 736 4300 b44ee52856f84ec787ba1c374c756932c713d3a93b8a610b0c4e362b008bb5eb.exe b44ee52856f84ec787ba1c374c756932c713d3a93b8a610b0c4e362b008bb5eb.exe PID 4300 wrote to memory of 736 4300 b44ee52856f84ec787ba1c374c756932c713d3a93b8a610b0c4e362b008bb5eb.exe b44ee52856f84ec787ba1c374c756932c713d3a93b8a610b0c4e362b008bb5eb.exe PID 4300 wrote to memory of 736 4300 b44ee52856f84ec787ba1c374c756932c713d3a93b8a610b0c4e362b008bb5eb.exe b44ee52856f84ec787ba1c374c756932c713d3a93b8a610b0c4e362b008bb5eb.exe PID 4300 wrote to memory of 736 4300 b44ee52856f84ec787ba1c374c756932c713d3a93b8a610b0c4e362b008bb5eb.exe b44ee52856f84ec787ba1c374c756932c713d3a93b8a610b0c4e362b008bb5eb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b44ee52856f84ec787ba1c374c756932c713d3a93b8a610b0c4e362b008bb5eb.exe"C:\Users\Admin\AppData\Local\Temp\b44ee52856f84ec787ba1c374c756932c713d3a93b8a610b0c4e362b008bb5eb.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\DIvKOnF" /XML "C:\Users\Admin\AppData\Local\Temp\tmp46D3.tmp"2⤵
- Creates scheduled task(s)
PID:2756
-
-
C:\Users\Admin\AppData\Local\Temp\b44ee52856f84ec787ba1c374c756932c713d3a93b8a610b0c4e362b008bb5eb.exe"C:\Users\Admin\AppData\Local\Temp\b44ee52856f84ec787ba1c374c756932c713d3a93b8a610b0c4e362b008bb5eb.exe"2⤵PID:3884
-
-
C:\Users\Admin\AppData\Local\Temp\b44ee52856f84ec787ba1c374c756932c713d3a93b8a610b0c4e362b008bb5eb.exe"C:\Users\Admin\AppData\Local\Temp\b44ee52856f84ec787ba1c374c756932c713d3a93b8a610b0c4e362b008bb5eb.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:736
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD554c0cbe4111b285d8489440a6c3e3dc9
SHA1a3dbd1c6daac028f1c103fb2324ac0010fcb1a9d
SHA256e6395e92978d476b8c5232487eaf7e8076dad8b207dad962209d80ab642bde82
SHA51295aefd54a831e5c4208ef12ec73cc2ed173f0ab816b23cb27507265938a0e60a9fbe317b7321bcbafd27a01f4bca2ee43b2f666b4e10ec2102157efe241537cf