Analysis
-
max time kernel
148s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
19/12/2022, 14:33
Static task
static1
Behavioral task
behavioral1
Sample
INQ_7654323.exe
Resource
win7-20221111-en
General
-
Target
INQ_7654323.exe
-
Size
852KB
-
MD5
ca9bd64aa59c0c99e6be3f8fc78b2fa8
-
SHA1
832400c4d1e54231c9ef43c24576bc0ea35388ce
-
SHA256
80b80845ee4a8518871ba71bba822baf33341129eb94c1f512684c613133c3bf
-
SHA512
fdeacd8bbeb522f0e8b911a35a800b8d749b0a47cdea1dedc1469c584b9ee6cc6e9a616b8d70343cfeff49fe2d336625a104d678b73bc238c196127a0b0b799a
-
SSDEEP
12288:gdMX2iNjuR28n5Cj7MWnh9e5rW89I1bbLbV96x2cHss/S+P:gWX1Vu88no7Ad9EDbVIx2cHs6Sq
Malware Config
Extracted
formbook
4.1
oi05
fluidavail.online
blchain.tech
kyocera.website
sangmine.xyz
thepolicyjacket.info
ssvhelpman.net
y-t-design.com
eminentabroad.com
codingcamp.store
bester.capital
tanjiya23.site
bheniamyn.dev
top5monitor.com
bit-prim.trade
airstreamsocialclub.com
darkwarspod.com
zazisalesdistribution.com
vivolentlo.online
daftburo.net
elemangelsin.xyz
chasewildfire.buzz
olioubnajo.buzz
agoura.dental
ky4352.com
finechoice.mobi
studioarchadroit.com
5009townesouth.com
tik454register.xyz
divaresesaat.xyz
projektwrestling.com
krystalclearmemories.net
vinaychhaparia.com
sodexosupplychain.info
uudai.store
demontya.site
cloudydad.cloud
mewzom.online
20010906.xyz
epuken.link
saludaldia.tech
generto.com
mbenzmotorsport.com
voidssl.life
elbetolacakbirgece10.com
cdncleaningservices.com
kuzs248.top
verus.website
wisefocus.net
xn--nergie-de-gaia-9jb.com
wowsportsbet.com
vhkopiu.top
shopify-postmaster15.info
lysiimmobilier.site
princess.express
betebrands.com
6tldsuoacvrlwc1g4i.top
labucarimini.net
hogushinotakumi.com
turnhappy.shop
geenpaii.xyz
pyrrhadev.xyz
minhasaudeelevada.com
oblk.pics
recursosdijitales.com
vivencie.shop
Signatures
-
Formbook payload 6 IoCs
resource yara_rule behavioral1/memory/644-68-0x000000000041F100-mapping.dmp formbook behavioral1/memory/644-67-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/644-71-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/644-79-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1620-81-0x0000000000080000-0x00000000000AF000-memory.dmp formbook behavioral1/memory/1620-86-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 1652 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1424 set thread context of 644 1424 INQ_7654323.exe 33 PID 644 set thread context of 1236 644 INQ_7654323.exe 16 PID 644 set thread context of 1236 644 INQ_7654323.exe 16 PID 1620 set thread context of 1236 1620 netsh.exe 16 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1696 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 1424 INQ_7654323.exe 1424 INQ_7654323.exe 1904 powershell.exe 644 INQ_7654323.exe 644 INQ_7654323.exe 644 INQ_7654323.exe 1620 netsh.exe 1620 netsh.exe 1620 netsh.exe 1620 netsh.exe 1620 netsh.exe 1620 netsh.exe 1620 netsh.exe 1620 netsh.exe 1620 netsh.exe 1620 netsh.exe 1620 netsh.exe 1620 netsh.exe 1620 netsh.exe 1620 netsh.exe 1620 netsh.exe 1620 netsh.exe 1620 netsh.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1236 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 644 INQ_7654323.exe 644 INQ_7654323.exe 644 INQ_7654323.exe 644 INQ_7654323.exe 1620 netsh.exe 1620 netsh.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1424 INQ_7654323.exe Token: SeDebugPrivilege 1904 powershell.exe Token: SeDebugPrivilege 644 INQ_7654323.exe Token: SeDebugPrivilege 1620 netsh.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1236 Explorer.EXE 1236 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1236 Explorer.EXE 1236 Explorer.EXE -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 1424 wrote to memory of 1904 1424 INQ_7654323.exe 28 PID 1424 wrote to memory of 1904 1424 INQ_7654323.exe 28 PID 1424 wrote to memory of 1904 1424 INQ_7654323.exe 28 PID 1424 wrote to memory of 1904 1424 INQ_7654323.exe 28 PID 1424 wrote to memory of 1696 1424 INQ_7654323.exe 30 PID 1424 wrote to memory of 1696 1424 INQ_7654323.exe 30 PID 1424 wrote to memory of 1696 1424 INQ_7654323.exe 30 PID 1424 wrote to memory of 1696 1424 INQ_7654323.exe 30 PID 1424 wrote to memory of 748 1424 INQ_7654323.exe 32 PID 1424 wrote to memory of 748 1424 INQ_7654323.exe 32 PID 1424 wrote to memory of 748 1424 INQ_7654323.exe 32 PID 1424 wrote to memory of 748 1424 INQ_7654323.exe 32 PID 1424 wrote to memory of 644 1424 INQ_7654323.exe 33 PID 1424 wrote to memory of 644 1424 INQ_7654323.exe 33 PID 1424 wrote to memory of 644 1424 INQ_7654323.exe 33 PID 1424 wrote to memory of 644 1424 INQ_7654323.exe 33 PID 1424 wrote to memory of 644 1424 INQ_7654323.exe 33 PID 1424 wrote to memory of 644 1424 INQ_7654323.exe 33 PID 1424 wrote to memory of 644 1424 INQ_7654323.exe 33 PID 1236 wrote to memory of 1620 1236 Explorer.EXE 42 PID 1236 wrote to memory of 1620 1236 Explorer.EXE 42 PID 1236 wrote to memory of 1620 1236 Explorer.EXE 42 PID 1236 wrote to memory of 1620 1236 Explorer.EXE 42 PID 1620 wrote to memory of 1652 1620 netsh.exe 43 PID 1620 wrote to memory of 1652 1620 netsh.exe 43 PID 1620 wrote to memory of 1652 1620 netsh.exe 43 PID 1620 wrote to memory of 1652 1620 netsh.exe 43
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\INQ_7654323.exe"C:\Users\Admin\AppData\Local\Temp\INQ_7654323.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\AfSEmpqyeaOiU.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1904
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AfSEmpqyeaOiU" /XML "C:\Users\Admin\AppData\Local\Temp\tmp94E1.tmp"3⤵
- Creates scheduled task(s)
PID:1696
-
-
C:\Users\Admin\AppData\Local\Temp\INQ_7654323.exe"C:\Users\Admin\AppData\Local\Temp\INQ_7654323.exe"3⤵PID:748
-
-
C:\Users\Admin\AppData\Local\Temp\INQ_7654323.exe"C:\Users\Admin\AppData\Local\Temp\INQ_7654323.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:644
-
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:1020
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:1604
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:1760
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:1780
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2004
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:1492
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:632
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:1476
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\SysWOW64\netsh.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\INQ_7654323.exe"3⤵
- Deletes itself
PID:1652
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5400c180ff0a9b13ac1f81252d61ddf1e
SHA1a6a34babba48176fc40c6d4015cda8ef8afd22be
SHA256bf9bbaee283b0ad9cebbc7d5c495a9fc73089017dcab839c5cad73daf0a0f717
SHA51223825274eb9cde2b15dc19949bfae1da17ae2687de412f50068c5d7e24da1b6fd853c28ca47a3f2948c7554eaf71290389b687664c54208cdda1ee8a4e487a88