Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2022 20:49
Static task
static1
Behavioral task
behavioral1
Sample
19b1c1a8ae564560a0cbf3382bd566fd6b70c4a685d86dbd64f25fe01cc17cca.exe
Resource
win7-20220901-en
General
-
Target
19b1c1a8ae564560a0cbf3382bd566fd6b70c4a685d86dbd64f25fe01cc17cca.exe
-
Size
260KB
-
MD5
d7f70f86875fb3aadfa0228690652fb3
-
SHA1
40745191f6897210d46c023259ac17084ebe0f12
-
SHA256
19b1c1a8ae564560a0cbf3382bd566fd6b70c4a685d86dbd64f25fe01cc17cca
-
SHA512
528a947c1219faeb14585ab9e5dbfd23cc2a8aaf1bbaa11fdff13699c904bdf5364c149de26fb91ba134d737d82d7208144d9036c0dc3f88ff56357fd8cb2701
-
SSDEEP
6144:QBn1/WI+GjGGWQ51zoG0cm9TsMhKULa2OEmQV2:g/nVGGZPoDceTXhxL2Pp
Malware Config
Extracted
formbook
4.1
tc10
mwigyu.com
sepuluholx.com
nsdigitalagency.com
horrorkore.com
santaclaracoimbrakarate.com
myeternalsummer.com
laosmidnight-lotto.com
haremp.xyz
boyace.top
unusualwithdrawal.com
wildflowerkidsri.com
backlitvps.dev
topwellgas.com
k3nnsworld3.com
wanbang.xyz
cntvc.net
sjcamden.church
pussit24.com
claml.com
statisticsturkey.com
gamebetservice.site
medicfield.com
richardsargeant.com
power-stabilizer.com
xn--budgetarakiralama-isb.com
jizzblow.com
instantphotography.online
sy-kaili.com
procurriengineers.com
tudoffers.store
nc125f.fun
vegangangster.com
paidthinking.com
jzecca.com
hr-energys.com
mnsms.com
thediplomatrealty.com
egenolfmachine.site
kedao.top
serenitisolutions.com
agprograms.tech
sinymp.com
dichoscolombia.com
chancesbetting.com
blackfoxmusicgroup.com
salvoconducto.online
webrangro.com
petsworthy.com
epergun.com
1013637.xyz
raitarantula.com
all-about-chandeliers.com
boothclothingco.com
stfidelis.net
data-science-13819.com
coraphsyicaltherapy.com
hotronixheatpresses.com
bernardnelfadigital.com
monarchmunchies.com
tasbo.online
equity321.com
jesocial.com
dlwhzs.com
twomobi.com
rhondarisley.site
Signatures
-
Formbook payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/3256-139-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/3256-146-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/5096-148-0x0000000000960000-0x000000000098F000-memory.dmp formbook behavioral2/memory/5096-153-0x0000000000960000-0x000000000098F000-memory.dmp formbook -
Executes dropped EXE 2 IoCs
Processes:
leqls.exeleqls.exepid process 2228 leqls.exe 3256 leqls.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
leqls.exeleqls.execolorcpl.exedescription pid process target process PID 2228 set thread context of 3256 2228 leqls.exe leqls.exe PID 3256 set thread context of 776 3256 leqls.exe Explorer.EXE PID 3256 set thread context of 776 3256 leqls.exe Explorer.EXE PID 5096 set thread context of 776 5096 colorcpl.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 60 IoCs
Processes:
leqls.execolorcpl.exepid process 3256 leqls.exe 3256 leqls.exe 3256 leqls.exe 3256 leqls.exe 3256 leqls.exe 3256 leqls.exe 5096 colorcpl.exe 5096 colorcpl.exe 5096 colorcpl.exe 5096 colorcpl.exe 5096 colorcpl.exe 5096 colorcpl.exe 5096 colorcpl.exe 5096 colorcpl.exe 5096 colorcpl.exe 5096 colorcpl.exe 5096 colorcpl.exe 5096 colorcpl.exe 5096 colorcpl.exe 5096 colorcpl.exe 5096 colorcpl.exe 5096 colorcpl.exe 5096 colorcpl.exe 5096 colorcpl.exe 5096 colorcpl.exe 5096 colorcpl.exe 5096 colorcpl.exe 5096 colorcpl.exe 5096 colorcpl.exe 5096 colorcpl.exe 5096 colorcpl.exe 5096 colorcpl.exe 5096 colorcpl.exe 5096 colorcpl.exe 5096 colorcpl.exe 5096 colorcpl.exe 5096 colorcpl.exe 5096 colorcpl.exe 5096 colorcpl.exe 5096 colorcpl.exe 5096 colorcpl.exe 5096 colorcpl.exe 5096 colorcpl.exe 5096 colorcpl.exe 5096 colorcpl.exe 5096 colorcpl.exe 5096 colorcpl.exe 5096 colorcpl.exe 5096 colorcpl.exe 5096 colorcpl.exe 5096 colorcpl.exe 5096 colorcpl.exe 5096 colorcpl.exe 5096 colorcpl.exe 5096 colorcpl.exe 5096 colorcpl.exe 5096 colorcpl.exe 5096 colorcpl.exe 5096 colorcpl.exe 5096 colorcpl.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 776 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
Processes:
leqls.exeleqls.execolorcpl.exepid process 2228 leqls.exe 3256 leqls.exe 3256 leqls.exe 3256 leqls.exe 3256 leqls.exe 5096 colorcpl.exe 5096 colorcpl.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
leqls.execolorcpl.exedescription pid process Token: SeDebugPrivilege 3256 leqls.exe Token: SeDebugPrivilege 5096 colorcpl.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
19b1c1a8ae564560a0cbf3382bd566fd6b70c4a685d86dbd64f25fe01cc17cca.exeleqls.exeExplorer.EXEcolorcpl.exedescription pid process target process PID 2548 wrote to memory of 2228 2548 19b1c1a8ae564560a0cbf3382bd566fd6b70c4a685d86dbd64f25fe01cc17cca.exe leqls.exe PID 2548 wrote to memory of 2228 2548 19b1c1a8ae564560a0cbf3382bd566fd6b70c4a685d86dbd64f25fe01cc17cca.exe leqls.exe PID 2548 wrote to memory of 2228 2548 19b1c1a8ae564560a0cbf3382bd566fd6b70c4a685d86dbd64f25fe01cc17cca.exe leqls.exe PID 2228 wrote to memory of 3256 2228 leqls.exe leqls.exe PID 2228 wrote to memory of 3256 2228 leqls.exe leqls.exe PID 2228 wrote to memory of 3256 2228 leqls.exe leqls.exe PID 2228 wrote to memory of 3256 2228 leqls.exe leqls.exe PID 776 wrote to memory of 5096 776 Explorer.EXE colorcpl.exe PID 776 wrote to memory of 5096 776 Explorer.EXE colorcpl.exe PID 776 wrote to memory of 5096 776 Explorer.EXE colorcpl.exe PID 5096 wrote to memory of 404 5096 colorcpl.exe cmd.exe PID 5096 wrote to memory of 404 5096 colorcpl.exe cmd.exe PID 5096 wrote to memory of 404 5096 colorcpl.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Users\Admin\AppData\Local\Temp\19b1c1a8ae564560a0cbf3382bd566fd6b70c4a685d86dbd64f25fe01cc17cca.exe"C:\Users\Admin\AppData\Local\Temp\19b1c1a8ae564560a0cbf3382bd566fd6b70c4a685d86dbd64f25fe01cc17cca.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\leqls.exe"C:\Users\Admin\AppData\Local\Temp\leqls.exe" C:\Users\Admin\AppData\Local\Temp\aqehglvbxjg.due3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\leqls.exe"C:\Users\Admin\AppData\Local\Temp\leqls.exe" C:\Users\Admin\AppData\Local\Temp\aqehglvbxjg.due4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3256 -
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:3544
-
C:\Windows\SysWOW64\colorcpl.exe"C:\Windows\SysWOW64\colorcpl.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\leqls.exe"3⤵PID:404
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\aqehglvbxjg.dueFilesize
5KB
MD5e7978f120b297bac5c86bf2acc9a40fd
SHA15c872d8a9584fe9db65d7dc038d0e878a76b4bd0
SHA25690693effc205ef2aedacae6865b0ef704111c0182e1f257272bc969bf1f0bcf6
SHA51270c31379db68a87fedd4f2ca1215e98b4875ca235564281f4c07aac79f512743373a2813d5b9e4cee3c81e901290a5b244ccdcaf1e7596bdcb735617e29dcc5f
-
C:\Users\Admin\AppData\Local\Temp\gwhkwmeamld.quxFilesize
185KB
MD525080551c072fc1ad09d66c52a451aab
SHA1bee02daf2cfcf46a2d257f002702e36400ca925d
SHA25693a2477b4d94e39e3439a20558b40665589708b5c371802a72ae5ed84404190b
SHA512f146a9de40d7244f74f4f7a05862d9dd4790c656135696a056c2438d0c177ad962b47cc382eb34aaff7e9e039e639b33a553d587b2b1f09bf59074b20384b715
-
C:\Users\Admin\AppData\Local\Temp\leqls.exeFilesize
122KB
MD560b966acbee7b9f4d8481c3b23cc8000
SHA1eb5bce7f660dd412573b416ad83c204300db013c
SHA2560721ce254a8f5f6cd82b702c8971501e4e6db317bdc2bc75cf1ebd30b2a1f5b0
SHA512169996e157a11ff92633e1d23175edd19cdfcd66509e8fed41fbe378117685bbd463f0e9f0e2ed3db3b78499a82ce2ad36a2838c536566ad630c73c9a5c7c177
-
C:\Users\Admin\AppData\Local\Temp\leqls.exeFilesize
122KB
MD560b966acbee7b9f4d8481c3b23cc8000
SHA1eb5bce7f660dd412573b416ad83c204300db013c
SHA2560721ce254a8f5f6cd82b702c8971501e4e6db317bdc2bc75cf1ebd30b2a1f5b0
SHA512169996e157a11ff92633e1d23175edd19cdfcd66509e8fed41fbe378117685bbd463f0e9f0e2ed3db3b78499a82ce2ad36a2838c536566ad630c73c9a5c7c177
-
C:\Users\Admin\AppData\Local\Temp\leqls.exeFilesize
122KB
MD560b966acbee7b9f4d8481c3b23cc8000
SHA1eb5bce7f660dd412573b416ad83c204300db013c
SHA2560721ce254a8f5f6cd82b702c8971501e4e6db317bdc2bc75cf1ebd30b2a1f5b0
SHA512169996e157a11ff92633e1d23175edd19cdfcd66509e8fed41fbe378117685bbd463f0e9f0e2ed3db3b78499a82ce2ad36a2838c536566ad630c73c9a5c7c177
-
memory/404-149-0x0000000000000000-mapping.dmp
-
memory/776-144-0x00000000083A0000-0x0000000008494000-memory.dmpFilesize
976KB
-
memory/776-154-0x0000000008870000-0x000000000896E000-memory.dmpFilesize
1016KB
-
memory/776-152-0x0000000008870000-0x000000000896E000-memory.dmpFilesize
1016KB
-
memory/776-142-0x0000000008230000-0x0000000008398000-memory.dmpFilesize
1.4MB
-
memory/2228-132-0x0000000000000000-mapping.dmp
-
memory/3256-137-0x0000000000000000-mapping.dmp
-
memory/3256-143-0x0000000000950000-0x0000000000964000-memory.dmpFilesize
80KB
-
memory/3256-146-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/3256-141-0x00000000006E0000-0x00000000006F4000-memory.dmpFilesize
80KB
-
memory/3256-140-0x00000000009E0000-0x0000000000D2A000-memory.dmpFilesize
3.3MB
-
memory/3256-139-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/5096-145-0x0000000000000000-mapping.dmp
-
memory/5096-148-0x0000000000960000-0x000000000098F000-memory.dmpFilesize
188KB
-
memory/5096-147-0x0000000000F80000-0x0000000000F99000-memory.dmpFilesize
100KB
-
memory/5096-150-0x0000000002B10000-0x0000000002E5A000-memory.dmpFilesize
3.3MB
-
memory/5096-151-0x0000000002950000-0x00000000029E3000-memory.dmpFilesize
588KB
-
memory/5096-153-0x0000000000960000-0x000000000098F000-memory.dmpFilesize
188KB