Analysis
-
max time kernel
173s -
max time network
171s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05-12-2022 20:21
Static task
static1
Behavioral task
behavioral1
Sample
a2b43ba6d6a6af9f0fa07cab1a1ffd64.exe
Resource
win7-20220812-en
General
-
Target
a2b43ba6d6a6af9f0fa07cab1a1ffd64.exe
-
Size
413KB
-
MD5
a2b43ba6d6a6af9f0fa07cab1a1ffd64
-
SHA1
0d63ee2545439dff61486e040fb8d921bee79ae3
-
SHA256
9a67166c5a81302300022d5fcf029600356460fcf3ce82fa37db08b131a0459f
-
SHA512
2a1105023880ae650ba67f2d657f3c0fe8c1a84c40a5a9ac5303f0c666226c454c40893f79073e816d14d873a3b583803934f9540a9ee7a604318affb1b427bb
-
SSDEEP
6144:LBnmyK4O/ekC2y6gPWJ6OC4tp8k4Hg2Y5nkjtPPraKFMP4wzSl7dlP7O/9Dj:Q7e6gPPOCm8kSIsPWK2Ptzo7dpy
Malware Config
Extracted
formbook
4.1
8rmt
3472cc.com
takecareyourhair.com
kontolajigasd21.xyz
daihaitrinh.net
syncmostlatestinfo-file.info
lovesolutionsastrologist.info
angelapryan.com
rio727casino.com
jjsgagets.com
devyatkina.online
thegoldenbeautyqatar.com
czytaj-unas24live.monster
timepoachers.com
gayxxxporn.site
72308.xyz
kristanolivo.com
hijrahfwd.com
bmfighters.com
alfamx.website
handfulofbabesbows.com
nationalsocialism.link
mega-recarga-arg.com
rytstack.com
kfav77.xyz
rrexec.net
linetl.top
freedomcleaningusa.com
abofahad3478.tokyo
teamvalvolineeurope.com
kyty4265.com
afrikannaland.info
dharmatradinguae.com
bqylc.buzz
lifeprojectmanager.pro
streeteli.site
68fk.vip
wasemanntrucking.com
auracreitarusblog.com
dfgzyt.cyou
tecnotuto.net
ookkvip.com
247repairs.info
tyvwotnmrlpjgl.biz
courtneymporter.com
gildainterior.com
papiska.xyz
sparrow.run
tyh-group.com
april-zodiac-sign.info
kiaf1.site
cooleyes.live
partasa.com
connecticutinteriors.com
thelovehandles.us
netinseg.website
diaryranch.xyz
serenaderange.com
milano.icu
vapeseasy.com
hengruncosmetics.com
vlashon.com
masberlian.ink
djayadiwangsa.store
nicneni.xyz
ym2668.top
Signatures
-
Formbook payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1740-65-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2028-72-0x00000000000C0000-0x00000000000EF000-memory.dmp formbook behavioral1/memory/2028-77-0x00000000000C0000-0x00000000000EF000-memory.dmp formbook -
Executes dropped EXE 2 IoCs
Processes:
ycayuhnew.exeycayuhnew.exepid process 2036 ycayuhnew.exe 1740 ycayuhnew.exe -
Loads dropped DLL 2 IoCs
Processes:
a2b43ba6d6a6af9f0fa07cab1a1ffd64.exeycayuhnew.exepid process 276 a2b43ba6d6a6af9f0fa07cab1a1ffd64.exe 2036 ycayuhnew.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
ycayuhnew.exeycayuhnew.exemstsc.exedescription pid process target process PID 2036 set thread context of 1740 2036 ycayuhnew.exe ycayuhnew.exe PID 1740 set thread context of 1220 1740 ycayuhnew.exe Explorer.EXE PID 2028 set thread context of 1220 2028 mstsc.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 27 IoCs
Processes:
ycayuhnew.exemstsc.exepid process 1740 ycayuhnew.exe 1740 ycayuhnew.exe 2028 mstsc.exe 2028 mstsc.exe 2028 mstsc.exe 2028 mstsc.exe 2028 mstsc.exe 2028 mstsc.exe 2028 mstsc.exe 2028 mstsc.exe 2028 mstsc.exe 2028 mstsc.exe 2028 mstsc.exe 2028 mstsc.exe 2028 mstsc.exe 2028 mstsc.exe 2028 mstsc.exe 2028 mstsc.exe 2028 mstsc.exe 2028 mstsc.exe 2028 mstsc.exe 2028 mstsc.exe 2028 mstsc.exe 2028 mstsc.exe 2028 mstsc.exe 2028 mstsc.exe 2028 mstsc.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
ycayuhnew.exeycayuhnew.exemstsc.exepid process 2036 ycayuhnew.exe 1740 ycayuhnew.exe 1740 ycayuhnew.exe 1740 ycayuhnew.exe 2028 mstsc.exe 2028 mstsc.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
ycayuhnew.exemstsc.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 1740 ycayuhnew.exe Token: SeDebugPrivilege 2028 mstsc.exe Token: SeShutdownPrivilege 1220 Explorer.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid process 1220 Explorer.EXE 1220 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Explorer.EXEpid process 1220 Explorer.EXE 1220 Explorer.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
a2b43ba6d6a6af9f0fa07cab1a1ffd64.exeycayuhnew.exeExplorer.EXEmstsc.exedescription pid process target process PID 276 wrote to memory of 2036 276 a2b43ba6d6a6af9f0fa07cab1a1ffd64.exe ycayuhnew.exe PID 276 wrote to memory of 2036 276 a2b43ba6d6a6af9f0fa07cab1a1ffd64.exe ycayuhnew.exe PID 276 wrote to memory of 2036 276 a2b43ba6d6a6af9f0fa07cab1a1ffd64.exe ycayuhnew.exe PID 276 wrote to memory of 2036 276 a2b43ba6d6a6af9f0fa07cab1a1ffd64.exe ycayuhnew.exe PID 2036 wrote to memory of 1740 2036 ycayuhnew.exe ycayuhnew.exe PID 2036 wrote to memory of 1740 2036 ycayuhnew.exe ycayuhnew.exe PID 2036 wrote to memory of 1740 2036 ycayuhnew.exe ycayuhnew.exe PID 2036 wrote to memory of 1740 2036 ycayuhnew.exe ycayuhnew.exe PID 2036 wrote to memory of 1740 2036 ycayuhnew.exe ycayuhnew.exe PID 1220 wrote to memory of 2028 1220 Explorer.EXE mstsc.exe PID 1220 wrote to memory of 2028 1220 Explorer.EXE mstsc.exe PID 1220 wrote to memory of 2028 1220 Explorer.EXE mstsc.exe PID 1220 wrote to memory of 2028 1220 Explorer.EXE mstsc.exe PID 2028 wrote to memory of 1344 2028 mstsc.exe cmd.exe PID 2028 wrote to memory of 1344 2028 mstsc.exe cmd.exe PID 2028 wrote to memory of 1344 2028 mstsc.exe cmd.exe PID 2028 wrote to memory of 1344 2028 mstsc.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a2b43ba6d6a6af9f0fa07cab1a1ffd64.exe"C:\Users\Admin\AppData\Local\Temp\a2b43ba6d6a6af9f0fa07cab1a1ffd64.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\ycayuhnew.exe"C:\Users\Admin\AppData\Local\Temp\ycayuhnew.exe" C:\Users\Admin\AppData\Local\Temp\rjyyjwcs.j3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\ycayuhnew.exe"C:\Users\Admin\AppData\Local\Temp\ycayuhnew.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\mstsc.exe"C:\Windows\SysWOW64\mstsc.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\ycayuhnew.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\dxlnbanzq.eFilesize
185KB
MD5f6710918e3ecdba55aa451fb1b08742d
SHA14ef0c29c55d0d532ceb1a5a324b62ff98d08dd70
SHA256cc573825aba59339f11629b7fe1ed9adf098e5f12004f441948fe45fcc12a5a7
SHA512fc35b518211c758cc7f00820a6dd8d5b8543b5e069cb3f837859b98c40027256c11459dfff85dde653a1137cd20c3e5a6bc1cfd3f7b82a094fe94e16d549a4f2
-
C:\Users\Admin\AppData\Local\Temp\rjyyjwcs.jFilesize
5KB
MD545cbfd24b9943772008f524a20e0a56f
SHA1b4b00712aa448298ed165890245d8c916d2d0f64
SHA256afef884e713661b15d8639ac7268b667742ebe67b0e031e7d617f2dd2d5813ff
SHA5124f01cb3c9eb01dcd9e359322605d88e1c0d4b1dde3ecabc594dcb7ab44b6e937880c13cf595cff506df317cb7c928c2d30ebfb3249548ff3832c19a802e07f0d
-
C:\Users\Admin\AppData\Local\Temp\ycayuhnew.exeFilesize
11KB
MD5d3749f4e6710b8d5beb987f07a5e8580
SHA117d39d416576972ecdf7deb2dce4275941497a29
SHA256edfa8cf65bbe6a0ad70cfc86a451b4ac86d034efc77f4e117151faa48af2d73f
SHA5126c53523743ddec06f36fe941180c755a3d32c6c6fe85fe15fa7b159ded7d3d32202b6dd4e58f470e567feeac5ab46f3c6cc09a5d57a4b307baf786aa0365c5cd
-
C:\Users\Admin\AppData\Local\Temp\ycayuhnew.exeFilesize
11KB
MD5d3749f4e6710b8d5beb987f07a5e8580
SHA117d39d416576972ecdf7deb2dce4275941497a29
SHA256edfa8cf65bbe6a0ad70cfc86a451b4ac86d034efc77f4e117151faa48af2d73f
SHA5126c53523743ddec06f36fe941180c755a3d32c6c6fe85fe15fa7b159ded7d3d32202b6dd4e58f470e567feeac5ab46f3c6cc09a5d57a4b307baf786aa0365c5cd
-
C:\Users\Admin\AppData\Local\Temp\ycayuhnew.exeFilesize
11KB
MD5d3749f4e6710b8d5beb987f07a5e8580
SHA117d39d416576972ecdf7deb2dce4275941497a29
SHA256edfa8cf65bbe6a0ad70cfc86a451b4ac86d034efc77f4e117151faa48af2d73f
SHA5126c53523743ddec06f36fe941180c755a3d32c6c6fe85fe15fa7b159ded7d3d32202b6dd4e58f470e567feeac5ab46f3c6cc09a5d57a4b307baf786aa0365c5cd
-
\Users\Admin\AppData\Local\Temp\ycayuhnew.exeFilesize
11KB
MD5d3749f4e6710b8d5beb987f07a5e8580
SHA117d39d416576972ecdf7deb2dce4275941497a29
SHA256edfa8cf65bbe6a0ad70cfc86a451b4ac86d034efc77f4e117151faa48af2d73f
SHA5126c53523743ddec06f36fe941180c755a3d32c6c6fe85fe15fa7b159ded7d3d32202b6dd4e58f470e567feeac5ab46f3c6cc09a5d57a4b307baf786aa0365c5cd
-
\Users\Admin\AppData\Local\Temp\ycayuhnew.exeFilesize
11KB
MD5d3749f4e6710b8d5beb987f07a5e8580
SHA117d39d416576972ecdf7deb2dce4275941497a29
SHA256edfa8cf65bbe6a0ad70cfc86a451b4ac86d034efc77f4e117151faa48af2d73f
SHA5126c53523743ddec06f36fe941180c755a3d32c6c6fe85fe15fa7b159ded7d3d32202b6dd4e58f470e567feeac5ab46f3c6cc09a5d57a4b307baf786aa0365c5cd
-
memory/276-54-0x00000000753C1000-0x00000000753C3000-memory.dmpFilesize
8KB
-
memory/1220-68-0x0000000007060000-0x000000000716B000-memory.dmpFilesize
1.0MB
-
memory/1220-78-0x0000000007170000-0x000000000729F000-memory.dmpFilesize
1.2MB
-
memory/1220-76-0x0000000007170000-0x000000000729F000-memory.dmpFilesize
1.2MB
-
memory/1344-74-0x0000000000000000-mapping.dmp
-
memory/1740-65-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1740-67-0x00000000001D0000-0x00000000001E5000-memory.dmpFilesize
84KB
-
memory/1740-66-0x0000000000A80000-0x0000000000D83000-memory.dmpFilesize
3.0MB
-
memory/1740-63-0x000000000041F080-mapping.dmp
-
memory/2028-69-0x0000000000000000-mapping.dmp
-
memory/2028-71-0x0000000000B50000-0x0000000000C54000-memory.dmpFilesize
1.0MB
-
memory/2028-72-0x00000000000C0000-0x00000000000EF000-memory.dmpFilesize
188KB
-
memory/2028-73-0x0000000002060000-0x0000000002363000-memory.dmpFilesize
3.0MB
-
memory/2028-75-0x00000000008E0000-0x0000000000974000-memory.dmpFilesize
592KB
-
memory/2028-77-0x00000000000C0000-0x00000000000EF000-memory.dmpFilesize
188KB
-
memory/2036-56-0x0000000000000000-mapping.dmp