Analysis
-
max time kernel
151s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
07-12-2022 14:14
Static task
static1
Behavioral task
behavioral1
Sample
RFQ _#CIF FOR Hyderabad.exe
Resource
win7-20221111-en
General
-
Target
RFQ _#CIF FOR Hyderabad.exe
-
Size
893KB
-
MD5
38e553f81a142579ea9a4e61a5c02c14
-
SHA1
44cb7f3254aa1991bd49039f9cfaec4ac3cf87b2
-
SHA256
090b0e38780c07da32a7d9119c754e34b398845b94fbe8ea544fc9ab8d81ac80
-
SHA512
3bc489194086f1abc40e077657d50835d6a71fe94314592aa47c806340ae3d5dd4f53bb8bc969c7d22cd2403fd395a8283a4573abb1475709dd7543c72b65203
-
SSDEEP
12288:roQgKZ/nXt7virmWhlGLaQYIV7m2HUOZE2SqvXD0LLc7VrfOJvFTkfDtd9201ZRk:DBHEdqf0KOJvFTkf5L2GRahex3zLu
Malware Config
Extracted
formbook
4.1
d94i
drain-pipe-cleaning-74655.com
culligandiiy.com
lknja.shop
salon-atmosfera.ru
steamgeneratorboilers.com
drain-pipe-cleaning-30896.com
dinoton.fun
feed-v.com
aym-brum.co.uk
bxztil.xyz
infinite-transformation.com
caticmicro.com
abrahamgranda.com
cleaninggem.com
hi5279.com
jainsdigitalservices.com
cglsuperset.com
kephatonrx.com
babyhandmold.com
braceelet.com
binotel.online
hengyangwangc.com
177787.com
dapperexperiences.com
perfectlyvintage.co.uk
ivoneartes.com
freightbyu.com
hotelvillaverdehn.com
igor-paixao.com
packmask.co.uk
lotuslandticketspice.com
mgkmanufacturing.com
casamollyshop.com
euterpe-paris-violin.com
imfeelingluckyongoogle.com
1wwxbc.top
9pdygwqg.com
akinsoftayvalik.xyz
kicoat.com
badgescottage.co.uk
bigbagsale.shop
scintillatecreative.com
thisguycancook.africa
truevision.africa
aapainternational.com
andrea-fuchs.com
thetrendshop.co.uk
pinkshea.co.uk
historiafilia.com
imaginationlbrary.com
electionfactsnc.com
cyberparkbhutani.com
freshcouponz.com
altyazili90.xyz
lidraulico.info
cardedeuweb.com
chacossandalsuk.com
10bconsulting.com
koziime.com
peek-a.boo
iuwamz.top
stonebridgetops.co.uk
heck-akunwso.xyz
helveticabold.co.uk
schoolcut.org.uk
Signatures
-
Formbook payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/1096-68-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1096-69-0x000000000041F160-mapping.dmp formbook behavioral1/memory/1096-71-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1096-80-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/924-83-0x0000000000080000-0x00000000000AF000-memory.dmp formbook behavioral1/memory/924-88-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Suspicious use of SetThreadContext 4 IoCs
Processes:
RFQ _#CIF FOR Hyderabad.exeMSBuild.exesystray.exedescription pid process target process PID 1652 set thread context of 1096 1652 RFQ _#CIF FOR Hyderabad.exe MSBuild.exe PID 1096 set thread context of 1248 1096 MSBuild.exe Explorer.EXE PID 1096 set thread context of 1248 1096 MSBuild.exe Explorer.EXE PID 924 set thread context of 1248 924 systray.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 26 IoCs
Processes:
RFQ _#CIF FOR Hyderabad.exeMSBuild.exepowershell.exesystray.exepid process 1652 RFQ _#CIF FOR Hyderabad.exe 1652 RFQ _#CIF FOR Hyderabad.exe 1652 RFQ _#CIF FOR Hyderabad.exe 1652 RFQ _#CIF FOR Hyderabad.exe 1652 RFQ _#CIF FOR Hyderabad.exe 1652 RFQ _#CIF FOR Hyderabad.exe 1652 RFQ _#CIF FOR Hyderabad.exe 1652 RFQ _#CIF FOR Hyderabad.exe 1652 RFQ _#CIF FOR Hyderabad.exe 1652 RFQ _#CIF FOR Hyderabad.exe 1652 RFQ _#CIF FOR Hyderabad.exe 1652 RFQ _#CIF FOR Hyderabad.exe 1652 RFQ _#CIF FOR Hyderabad.exe 1652 RFQ _#CIF FOR Hyderabad.exe 1652 RFQ _#CIF FOR Hyderabad.exe 1652 RFQ _#CIF FOR Hyderabad.exe 1096 MSBuild.exe 1096 MSBuild.exe 652 powershell.exe 1096 MSBuild.exe 924 systray.exe 924 systray.exe 924 systray.exe 924 systray.exe 924 systray.exe 924 systray.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
MSBuild.exesystray.exepid process 1096 MSBuild.exe 1096 MSBuild.exe 1096 MSBuild.exe 1096 MSBuild.exe 924 systray.exe 924 systray.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
RFQ _#CIF FOR Hyderabad.exepowershell.exeMSBuild.exesystray.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 1652 RFQ _#CIF FOR Hyderabad.exe Token: SeDebugPrivilege 652 powershell.exe Token: SeDebugPrivilege 1096 MSBuild.exe Token: SeDebugPrivilege 924 systray.exe Token: SeShutdownPrivilege 1248 Explorer.EXE -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
RFQ _#CIF FOR Hyderabad.exeExplorer.EXEsystray.exedescription pid process target process PID 1652 wrote to memory of 652 1652 RFQ _#CIF FOR Hyderabad.exe powershell.exe PID 1652 wrote to memory of 652 1652 RFQ _#CIF FOR Hyderabad.exe powershell.exe PID 1652 wrote to memory of 652 1652 RFQ _#CIF FOR Hyderabad.exe powershell.exe PID 1652 wrote to memory of 652 1652 RFQ _#CIF FOR Hyderabad.exe powershell.exe PID 1652 wrote to memory of 1176 1652 RFQ _#CIF FOR Hyderabad.exe schtasks.exe PID 1652 wrote to memory of 1176 1652 RFQ _#CIF FOR Hyderabad.exe schtasks.exe PID 1652 wrote to memory of 1176 1652 RFQ _#CIF FOR Hyderabad.exe schtasks.exe PID 1652 wrote to memory of 1176 1652 RFQ _#CIF FOR Hyderabad.exe schtasks.exe PID 1652 wrote to memory of 1096 1652 RFQ _#CIF FOR Hyderabad.exe MSBuild.exe PID 1652 wrote to memory of 1096 1652 RFQ _#CIF FOR Hyderabad.exe MSBuild.exe PID 1652 wrote to memory of 1096 1652 RFQ _#CIF FOR Hyderabad.exe MSBuild.exe PID 1652 wrote to memory of 1096 1652 RFQ _#CIF FOR Hyderabad.exe MSBuild.exe PID 1652 wrote to memory of 1096 1652 RFQ _#CIF FOR Hyderabad.exe MSBuild.exe PID 1652 wrote to memory of 1096 1652 RFQ _#CIF FOR Hyderabad.exe MSBuild.exe PID 1652 wrote to memory of 1096 1652 RFQ _#CIF FOR Hyderabad.exe MSBuild.exe PID 1248 wrote to memory of 924 1248 Explorer.EXE systray.exe PID 1248 wrote to memory of 924 1248 Explorer.EXE systray.exe PID 1248 wrote to memory of 924 1248 Explorer.EXE systray.exe PID 1248 wrote to memory of 924 1248 Explorer.EXE systray.exe PID 924 wrote to memory of 308 924 systray.exe cmd.exe PID 924 wrote to memory of 308 924 systray.exe cmd.exe PID 924 wrote to memory of 308 924 systray.exe cmd.exe PID 924 wrote to memory of 308 924 systray.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\RFQ _#CIF FOR Hyderabad.exe"C:\Users\Admin\AppData\Local\Temp\RFQ _#CIF FOR Hyderabad.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\JbpIuJYQjTRdxr.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JbpIuJYQjTRdxr" /XML "C:\Users\Admin\AppData\Local\Temp\tmp6D54.tmp"3⤵
- Creates scheduled task(s)
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\systray.exe"C:\Windows\SysWOW64\systray.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp6D54.tmpFilesize
1KB
MD5ccbc60d7c7304c35cee982de78007d26
SHA1aabfb848bfd288fc2113c56550594b62fc94bdf9
SHA2561115b295da3aae8bd3670e31398a045025323a66da025d674ac89a49a51d04ad
SHA5125e7c2840b6be239f230329f64172d2ed37a751fd15595c0033b7b54d8811b5e06f23c915fec94633b3779cb9ef2fe4dce4ee78a97403120c29179418328d211b
-
memory/308-84-0x0000000000000000-mapping.dmp
-
memory/652-75-0x000000006E890000-0x000000006EE3B000-memory.dmpFilesize
5.7MB
-
memory/652-59-0x0000000000000000-mapping.dmp
-
memory/652-64-0x000000006E890000-0x000000006EE3B000-memory.dmpFilesize
5.7MB
-
memory/924-88-0x0000000000080000-0x00000000000AF000-memory.dmpFilesize
188KB
-
memory/924-85-0x0000000000830000-0x00000000008C3000-memory.dmpFilesize
588KB
-
memory/924-83-0x0000000000080000-0x00000000000AF000-memory.dmpFilesize
188KB
-
memory/924-82-0x0000000001F30000-0x0000000002233000-memory.dmpFilesize
3.0MB
-
memory/924-81-0x0000000000B20000-0x0000000000B25000-memory.dmpFilesize
20KB
-
memory/924-79-0x0000000000000000-mapping.dmp
-
memory/1096-73-0x0000000000180000-0x0000000000194000-memory.dmpFilesize
80KB
-
memory/1096-65-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1096-69-0x000000000041F160-mapping.dmp
-
memory/1096-71-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1096-72-0x00000000008F0000-0x0000000000BF3000-memory.dmpFilesize
3.0MB
-
memory/1096-68-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1096-66-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1096-77-0x00000000001E0000-0x00000000001F4000-memory.dmpFilesize
80KB
-
memory/1096-80-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1176-60-0x0000000000000000-mapping.dmp
-
memory/1248-74-0x0000000006C80000-0x0000000006DA6000-memory.dmpFilesize
1.1MB
-
memory/1248-78-0x0000000007510000-0x00000000076A8000-memory.dmpFilesize
1.6MB
-
memory/1248-86-0x0000000008080000-0x00000000081EA000-memory.dmpFilesize
1.4MB
-
memory/1248-87-0x0000000007510000-0x00000000076A8000-memory.dmpFilesize
1.6MB
-
memory/1248-89-0x0000000008080000-0x00000000081EA000-memory.dmpFilesize
1.4MB
-
memory/1652-63-0x0000000005D80000-0x0000000005DE0000-memory.dmpFilesize
384KB
-
memory/1652-54-0x0000000000030000-0x0000000000116000-memory.dmpFilesize
920KB
-
memory/1652-58-0x0000000005EE0000-0x0000000005F78000-memory.dmpFilesize
608KB
-
memory/1652-57-0x00000000004D0000-0x00000000004DE000-memory.dmpFilesize
56KB
-
memory/1652-56-0x00000000004C0000-0x00000000004D6000-memory.dmpFilesize
88KB
-
memory/1652-55-0x0000000074FD1000-0x0000000074FD3000-memory.dmpFilesize
8KB