Analysis
-
max time kernel
318s -
max time network
323s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2022 20:21
Static task
static1
Behavioral task
behavioral1
Sample
a2b43ba6d6a6af9f0fa07cab1a1ffd64.exe
Resource
win7-20220812-en
General
-
Target
a2b43ba6d6a6af9f0fa07cab1a1ffd64.exe
-
Size
413KB
-
MD5
a2b43ba6d6a6af9f0fa07cab1a1ffd64
-
SHA1
0d63ee2545439dff61486e040fb8d921bee79ae3
-
SHA256
9a67166c5a81302300022d5fcf029600356460fcf3ce82fa37db08b131a0459f
-
SHA512
2a1105023880ae650ba67f2d657f3c0fe8c1a84c40a5a9ac5303f0c666226c454c40893f79073e816d14d873a3b583803934f9540a9ee7a604318affb1b427bb
-
SSDEEP
6144:LBnmyK4O/ekC2y6gPWJ6OC4tp8k4Hg2Y5nkjtPPraKFMP4wzSl7dlP7O/9Dj:Q7e6gPPOCm8kSIsPWK2Ptzo7dpy
Malware Config
Extracted
formbook
4.1
8rmt
3472cc.com
takecareyourhair.com
kontolajigasd21.xyz
daihaitrinh.net
syncmostlatestinfo-file.info
lovesolutionsastrologist.info
angelapryan.com
rio727casino.com
jjsgagets.com
devyatkina.online
thegoldenbeautyqatar.com
czytaj-unas24live.monster
timepoachers.com
gayxxxporn.site
72308.xyz
kristanolivo.com
hijrahfwd.com
bmfighters.com
alfamx.website
handfulofbabesbows.com
nationalsocialism.link
mega-recarga-arg.com
rytstack.com
kfav77.xyz
rrexec.net
linetl.top
freedomcleaningusa.com
abofahad3478.tokyo
teamvalvolineeurope.com
kyty4265.com
afrikannaland.info
dharmatradinguae.com
bqylc.buzz
lifeprojectmanager.pro
streeteli.site
68fk.vip
wasemanntrucking.com
auracreitarusblog.com
dfgzyt.cyou
tecnotuto.net
ookkvip.com
247repairs.info
tyvwotnmrlpjgl.biz
courtneymporter.com
gildainterior.com
papiska.xyz
sparrow.run
tyh-group.com
april-zodiac-sign.info
kiaf1.site
cooleyes.live
partasa.com
connecticutinteriors.com
thelovehandles.us
netinseg.website
diaryranch.xyz
serenaderange.com
milano.icu
vapeseasy.com
hengruncosmetics.com
vlashon.com
masberlian.ink
djayadiwangsa.store
nicneni.xyz
ym2668.top
Signatures
-
Formbook payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/4160-139-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4160-143-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4836-146-0x0000000000A50000-0x0000000000A7F000-memory.dmp formbook -
Executes dropped EXE 2 IoCs
Processes:
ycayuhnew.exeycayuhnew.exepid process 4672 ycayuhnew.exe 4160 ycayuhnew.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
ycayuhnew.exeycayuhnew.execontrol.exedescription pid process target process PID 4672 set thread context of 4160 4672 ycayuhnew.exe ycayuhnew.exe PID 4160 set thread context of 2572 4160 ycayuhnew.exe Explorer.EXE PID 4836 set thread context of 2572 4836 control.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 30 IoCs
Processes:
ycayuhnew.execontrol.exepid process 4160 ycayuhnew.exe 4160 ycayuhnew.exe 4160 ycayuhnew.exe 4160 ycayuhnew.exe 4836 control.exe 4836 control.exe 4836 control.exe 4836 control.exe 4836 control.exe 4836 control.exe 4836 control.exe 4836 control.exe 4836 control.exe 4836 control.exe 4836 control.exe 4836 control.exe 4836 control.exe 4836 control.exe 4836 control.exe 4836 control.exe 4836 control.exe 4836 control.exe 4836 control.exe 4836 control.exe 4836 control.exe 4836 control.exe 4836 control.exe 4836 control.exe 4836 control.exe 4836 control.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 2572 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
ycayuhnew.exeycayuhnew.execontrol.exepid process 4672 ycayuhnew.exe 4160 ycayuhnew.exe 4160 ycayuhnew.exe 4160 ycayuhnew.exe 4836 control.exe 4836 control.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
Processes:
ycayuhnew.execontrol.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 4160 ycayuhnew.exe Token: SeDebugPrivilege 4836 control.exe Token: SeShutdownPrivilege 2572 Explorer.EXE Token: SeCreatePagefilePrivilege 2572 Explorer.EXE Token: SeShutdownPrivilege 2572 Explorer.EXE Token: SeCreatePagefilePrivilege 2572 Explorer.EXE Token: SeShutdownPrivilege 2572 Explorer.EXE Token: SeCreatePagefilePrivilege 2572 Explorer.EXE Token: SeShutdownPrivilege 2572 Explorer.EXE Token: SeCreatePagefilePrivilege 2572 Explorer.EXE Token: SeShutdownPrivilege 2572 Explorer.EXE Token: SeCreatePagefilePrivilege 2572 Explorer.EXE -
Suspicious use of UnmapMainImage 2 IoCs
Processes:
Explorer.EXEpid process 2572 Explorer.EXE 2572 Explorer.EXE -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
a2b43ba6d6a6af9f0fa07cab1a1ffd64.exeycayuhnew.exeExplorer.EXEcontrol.exedescription pid process target process PID 1612 wrote to memory of 4672 1612 a2b43ba6d6a6af9f0fa07cab1a1ffd64.exe ycayuhnew.exe PID 1612 wrote to memory of 4672 1612 a2b43ba6d6a6af9f0fa07cab1a1ffd64.exe ycayuhnew.exe PID 1612 wrote to memory of 4672 1612 a2b43ba6d6a6af9f0fa07cab1a1ffd64.exe ycayuhnew.exe PID 4672 wrote to memory of 4160 4672 ycayuhnew.exe ycayuhnew.exe PID 4672 wrote to memory of 4160 4672 ycayuhnew.exe ycayuhnew.exe PID 4672 wrote to memory of 4160 4672 ycayuhnew.exe ycayuhnew.exe PID 4672 wrote to memory of 4160 4672 ycayuhnew.exe ycayuhnew.exe PID 2572 wrote to memory of 4836 2572 Explorer.EXE control.exe PID 2572 wrote to memory of 4836 2572 Explorer.EXE control.exe PID 2572 wrote to memory of 4836 2572 Explorer.EXE control.exe PID 4836 wrote to memory of 1392 4836 control.exe cmd.exe PID 4836 wrote to memory of 1392 4836 control.exe cmd.exe PID 4836 wrote to memory of 1392 4836 control.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a2b43ba6d6a6af9f0fa07cab1a1ffd64.exe"C:\Users\Admin\AppData\Local\Temp\a2b43ba6d6a6af9f0fa07cab1a1ffd64.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\ycayuhnew.exe"C:\Users\Admin\AppData\Local\Temp\ycayuhnew.exe" C:\Users\Admin\AppData\Local\Temp\rjyyjwcs.j3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\ycayuhnew.exe"C:\Users\Admin\AppData\Local\Temp\ycayuhnew.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\control.exe"C:\Windows\SysWOW64\control.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\ycayuhnew.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\dxlnbanzq.eFilesize
185KB
MD5f6710918e3ecdba55aa451fb1b08742d
SHA14ef0c29c55d0d532ceb1a5a324b62ff98d08dd70
SHA256cc573825aba59339f11629b7fe1ed9adf098e5f12004f441948fe45fcc12a5a7
SHA512fc35b518211c758cc7f00820a6dd8d5b8543b5e069cb3f837859b98c40027256c11459dfff85dde653a1137cd20c3e5a6bc1cfd3f7b82a094fe94e16d549a4f2
-
C:\Users\Admin\AppData\Local\Temp\rjyyjwcs.jFilesize
5KB
MD545cbfd24b9943772008f524a20e0a56f
SHA1b4b00712aa448298ed165890245d8c916d2d0f64
SHA256afef884e713661b15d8639ac7268b667742ebe67b0e031e7d617f2dd2d5813ff
SHA5124f01cb3c9eb01dcd9e359322605d88e1c0d4b1dde3ecabc594dcb7ab44b6e937880c13cf595cff506df317cb7c928c2d30ebfb3249548ff3832c19a802e07f0d
-
C:\Users\Admin\AppData\Local\Temp\ycayuhnew.exeFilesize
11KB
MD5d3749f4e6710b8d5beb987f07a5e8580
SHA117d39d416576972ecdf7deb2dce4275941497a29
SHA256edfa8cf65bbe6a0ad70cfc86a451b4ac86d034efc77f4e117151faa48af2d73f
SHA5126c53523743ddec06f36fe941180c755a3d32c6c6fe85fe15fa7b159ded7d3d32202b6dd4e58f470e567feeac5ab46f3c6cc09a5d57a4b307baf786aa0365c5cd
-
C:\Users\Admin\AppData\Local\Temp\ycayuhnew.exeFilesize
11KB
MD5d3749f4e6710b8d5beb987f07a5e8580
SHA117d39d416576972ecdf7deb2dce4275941497a29
SHA256edfa8cf65bbe6a0ad70cfc86a451b4ac86d034efc77f4e117151faa48af2d73f
SHA5126c53523743ddec06f36fe941180c755a3d32c6c6fe85fe15fa7b159ded7d3d32202b6dd4e58f470e567feeac5ab46f3c6cc09a5d57a4b307baf786aa0365c5cd
-
C:\Users\Admin\AppData\Local\Temp\ycayuhnew.exeFilesize
11KB
MD5d3749f4e6710b8d5beb987f07a5e8580
SHA117d39d416576972ecdf7deb2dce4275941497a29
SHA256edfa8cf65bbe6a0ad70cfc86a451b4ac86d034efc77f4e117151faa48af2d73f
SHA5126c53523743ddec06f36fe941180c755a3d32c6c6fe85fe15fa7b159ded7d3d32202b6dd4e58f470e567feeac5ab46f3c6cc09a5d57a4b307baf786aa0365c5cd
-
memory/1392-148-0x0000000000000000-mapping.dmp
-
memory/2572-159-0x0000000008300000-0x000000000848C000-memory.dmpFilesize
1.5MB
-
memory/2572-160-0x0000000002370000-0x0000000002380000-memory.dmpFilesize
64KB
-
memory/2572-168-0x0000000000A90000-0x0000000000AA0000-memory.dmpFilesize
64KB
-
memory/2572-167-0x0000000000A90000-0x0000000000AA0000-memory.dmpFilesize
64KB
-
memory/2572-142-0x00000000080B0000-0x0000000008237000-memory.dmpFilesize
1.5MB
-
memory/2572-166-0x0000000000A90000-0x0000000000AA0000-memory.dmpFilesize
64KB
-
memory/2572-165-0x0000000000A90000-0x0000000000AA0000-memory.dmpFilesize
64KB
-
memory/2572-164-0x0000000000A90000-0x0000000000AA0000-memory.dmpFilesize
64KB
-
memory/2572-163-0x0000000000A90000-0x0000000000AA0000-memory.dmpFilesize
64KB
-
memory/2572-162-0x0000000000A90000-0x0000000000AA0000-memory.dmpFilesize
64KB
-
memory/2572-161-0x0000000000A90000-0x0000000000AA0000-memory.dmpFilesize
64KB
-
memory/2572-149-0x0000000002370000-0x0000000002380000-memory.dmpFilesize
64KB
-
memory/2572-150-0x0000000002370000-0x0000000002380000-memory.dmpFilesize
64KB
-
memory/2572-151-0x0000000000AA0000-0x0000000000AB0000-memory.dmpFilesize
64KB
-
memory/2572-152-0x0000000000AA0000-0x0000000000AB0000-memory.dmpFilesize
64KB
-
memory/2572-153-0x0000000000AA0000-0x0000000000AB0000-memory.dmpFilesize
64KB
-
memory/2572-154-0x0000000000AA0000-0x0000000000AB0000-memory.dmpFilesize
64KB
-
memory/2572-155-0x0000000000AA0000-0x0000000000AB0000-memory.dmpFilesize
64KB
-
memory/2572-156-0x0000000000AA0000-0x0000000000AB0000-memory.dmpFilesize
64KB
-
memory/2572-158-0x0000000008300000-0x000000000848C000-memory.dmpFilesize
1.5MB
-
memory/4160-139-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/4160-137-0x0000000000000000-mapping.dmp
-
memory/4160-143-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/4160-141-0x00000000015C0000-0x00000000015D5000-memory.dmpFilesize
84KB
-
memory/4160-140-0x0000000001620000-0x000000000196A000-memory.dmpFilesize
3.3MB
-
memory/4672-132-0x0000000000000000-mapping.dmp
-
memory/4836-157-0x0000000002740000-0x00000000027D4000-memory.dmpFilesize
592KB
-
memory/4836-147-0x00000000028E0000-0x0000000002C2A000-memory.dmpFilesize
3.3MB
-
memory/4836-146-0x0000000000A50000-0x0000000000A7F000-memory.dmpFilesize
188KB
-
memory/4836-145-0x0000000000400000-0x0000000000427000-memory.dmpFilesize
156KB
-
memory/4836-144-0x0000000000000000-mapping.dmp