Analysis
-
max time kernel
205s -
max time network
209s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
07-12-2022 11:54
Static task
static1
Behavioral task
behavioral1
Sample
FATURA ÖDEMESİ.exe
Resource
win7-20220901-en
General
-
Target
FATURA ÖDEMESİ.exe
-
Size
857KB
-
MD5
66ed7ba0a4ca21ace023480e4015a9e3
-
SHA1
5de079ca99452414f7c68a985e9b114a16bf3f94
-
SHA256
b66fc3c8f01ea488838e57cda4157b5ec8d3398b321fcc68bdb9d7ce397486f5
-
SHA512
4319d634180de8a14f2bdb652a132ef1649ce05018b8f86f47b09ded7c5b20fd1691648539095276c46f7e35823b5f81d0d2dd8af353a523788828c81acbf1f1
-
SSDEEP
12288:y+oQgKZ/nXt7virmWhlGLaQYIIjmas5JGXylk+mphdWvzAtpexqlI9aDc7nH6Py:y/u/PlbmperA5IBH6Pq/M9
Malware Config
Extracted
formbook
4.1
gs25
real-food.store
marketdatalibrary.com
jolidens.space
ydental.info
tattoosbyjayinked.com
buytradesellpei.com
61983.xyz
identitysolver.xyz
mgfang.com
teizer.one
staychillax.com
ylanzarote.com
workte.net
maukigato.shop
coolbag.site
btya1r.com
dkhaohao.shop
zugaro.xyz
boon168.com
xn--80aeegahlwtdkp.com
ofiarx.com
militaryees.com
moshrifmontagebau.com
usesportcompany.com
savagesocietyclothing.com
wethedreamrs.com
allhealthzdorovoiscilenie.sbs
legacycrossingbroker.com
dompietro.com
hallconciergerie.com
xn--289a95vn5cmx6a.com
siervostinting.com
windesk.info
braxton.construction
scarefullym.shop
organicyummyvegan.com
maniza.shop
moviesmod.one
wenmingsm.com
techgist.tech
infodescansovital.click
adsfuture.shop
54844.site
opensea.creditcard
yassinshield.com
daubacthanhdeneasy.online
governmentmarketstrategies.com
socioeconomical.pics
blackmail.guide
tdrevolution.net
mega-pornx.info
favrity.com
cuocsongtot2022.site
touchlyfe.com
track-usps.info
kitchentimeremodeling.com
jettylearn.com
hookguy.buzz
cojo.world
negocio-naweb.store
kern3361ren1.site
smithbryan.website
jlxseat.top
rocksology.net
crownglassware.info
Signatures
-
Formbook payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4520-144-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
FATURA ÖDEMESİ.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation FATURA ÖDEMESİ.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
FATURA ÖDEMESİ.exeRegSvcs.exedescription pid process target process PID 2376 set thread context of 4520 2376 FATURA ÖDEMESİ.exe RegSvcs.exe PID 4520 set thread context of 2584 4520 RegSvcs.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 30 IoCs
Processes:
FATURA ÖDEMESİ.exepowershell.exeRegSvcs.exepid process 2376 FATURA ÖDEMESİ.exe 2376 FATURA ÖDEMESİ.exe 2376 FATURA ÖDEMESİ.exe 2376 FATURA ÖDEMESİ.exe 2376 FATURA ÖDEMESİ.exe 2376 FATURA ÖDEMESİ.exe 2376 FATURA ÖDEMESİ.exe 2376 FATURA ÖDEMESİ.exe 2376 FATURA ÖDEMESİ.exe 2376 FATURA ÖDEMESİ.exe 2376 FATURA ÖDEMESİ.exe 2376 FATURA ÖDEMESİ.exe 2376 FATURA ÖDEMESİ.exe 2376 FATURA ÖDEMESİ.exe 2376 FATURA ÖDEMESİ.exe 2376 FATURA ÖDEMESİ.exe 2376 FATURA ÖDEMESİ.exe 2376 FATURA ÖDEMESİ.exe 2376 FATURA ÖDEMESİ.exe 2376 FATURA ÖDEMESİ.exe 2376 FATURA ÖDEMESİ.exe 2376 FATURA ÖDEMESİ.exe 2376 FATURA ÖDEMESİ.exe 2376 FATURA ÖDEMESİ.exe 4260 powershell.exe 4260 powershell.exe 4520 RegSvcs.exe 4520 RegSvcs.exe 4520 RegSvcs.exe 4520 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
RegSvcs.exepid process 4520 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
FATURA ÖDEMESİ.exepowershell.exeRegSvcs.exedescription pid process Token: SeDebugPrivilege 2376 FATURA ÖDEMESİ.exe Token: SeDebugPrivilege 4260 powershell.exe Token: SeDebugPrivilege 4520 RegSvcs.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
FATURA ÖDEMESİ.exeExplorer.EXEdescription pid process target process PID 2376 wrote to memory of 4260 2376 FATURA ÖDEMESİ.exe powershell.exe PID 2376 wrote to memory of 4260 2376 FATURA ÖDEMESİ.exe powershell.exe PID 2376 wrote to memory of 4260 2376 FATURA ÖDEMESİ.exe powershell.exe PID 2376 wrote to memory of 2736 2376 FATURA ÖDEMESİ.exe schtasks.exe PID 2376 wrote to memory of 2736 2376 FATURA ÖDEMESİ.exe schtasks.exe PID 2376 wrote to memory of 2736 2376 FATURA ÖDEMESİ.exe schtasks.exe PID 2376 wrote to memory of 4952 2376 FATURA ÖDEMESİ.exe RegSvcs.exe PID 2376 wrote to memory of 4952 2376 FATURA ÖDEMESİ.exe RegSvcs.exe PID 2376 wrote to memory of 4952 2376 FATURA ÖDEMESİ.exe RegSvcs.exe PID 2376 wrote to memory of 4520 2376 FATURA ÖDEMESİ.exe RegSvcs.exe PID 2376 wrote to memory of 4520 2376 FATURA ÖDEMESİ.exe RegSvcs.exe PID 2376 wrote to memory of 4520 2376 FATURA ÖDEMESİ.exe RegSvcs.exe PID 2376 wrote to memory of 4520 2376 FATURA ÖDEMESİ.exe RegSvcs.exe PID 2376 wrote to memory of 4520 2376 FATURA ÖDEMESİ.exe RegSvcs.exe PID 2376 wrote to memory of 4520 2376 FATURA ÖDEMESİ.exe RegSvcs.exe PID 2584 wrote to memory of 2632 2584 Explorer.EXE colorcpl.exe PID 2584 wrote to memory of 2632 2584 Explorer.EXE colorcpl.exe PID 2584 wrote to memory of 2632 2584 Explorer.EXE colorcpl.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\FATURA ÖDEMESİ.exe"C:\Users\Admin\AppData\Local\Temp\FATURA ÖDEMESİ.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\FajjkkDL.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4260
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\FajjkkDL" /XML "C:\Users\Admin\AppData\Local\Temp\tmp985E.tmp"3⤵
- Creates scheduled task(s)
PID:2736
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵PID:4952
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4520
-
-
-
C:\Windows\SysWOW64\colorcpl.exe"C:\Windows\SysWOW64\colorcpl.exe"2⤵PID:2632
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5aa6a796dc7918683a4590e4831cb3353
SHA1f8b025bd0f3fef4b5f9ffe68a183c29ddca3b249
SHA256f3f6699a6c4286f83b9f6659a40a8719bf2127ca619ae421e22bf5bb90c36f37
SHA512f6033b2eff0d33aa3a2f29e2925e879f9daeb92e605fbbea9764b64557c55f49079bf1136e12a29ffa865adeb19904eb4b370fd9e4d429467a7167d5f3ee7cc9