Analysis
-
max time kernel
149s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04-01-2023 07:25
Static task
static1
Behavioral task
behavioral1
Sample
b561c766f16984cad7bd9303131d69da7cae866a.exe
Resource
win7-20220812-en
General
-
Target
b561c766f16984cad7bd9303131d69da7cae866a.exe
-
Size
445KB
-
MD5
7f86f5c4f81ec48b4b6bfc92b29ec751
-
SHA1
b561c766f16984cad7bd9303131d69da7cae866a
-
SHA256
63ec01839919b7f832954e17b9259a74fe90e0217f178dbd5f7661454af4c91f
-
SHA512
d040eb130075902d49536dca8b1abe4bc49ff6421884a793da73f956bf614806949b89ce602168bdc5a55af111871ee4120654f136914e4e63d2170557806cb3
-
SSDEEP
12288:3Y7shrtvJ4uNMIL/TJF/DaYVgl5NVx1fFHD02SJZ:3Yu1KA1I/FXngPZ
Malware Config
Extracted
formbook
4.1
vr84
intouchenergy.co.uk
lalumalkaliram.com
hillgreenholidays.co.uk
fluentliteracy.com
buildingworkerpower.com
by23577.com
gate-ch375019.online
jayess-decor.com
larkslife.com
swsnacks.co.uk
bigturtletiny.com
egggge.xyz
olastore.africa
lightshowsnewengland.com
daily-lox.com
empireoba.com
91302events.com
lawrencecountyfirechiefs.com
abrahamslibrary.com
cleaner365.online
getmicrostock.net
lightyearsmgmt.com
dentanorma.store
jbproductions.net
acideastern.com
jayess-decor.com
harpy.life
arcadiatownhomesut.com
407loans.com
kxzi803.com
flirtmate.network
mogi.africa
goohodao.xyz
rijnaq.xyz
valourcollection.africa
lateliergc.com
tsunamieng.africa
ctjhpw3.vip
dikevolesav.info
everyclick.africa
595255.biz
aissw.com
digitalpro.africa
giantcourtyard.com
windkind.net
gp5757.com
kino-plasmat.com
led-lighting-90688.com
cyzhan.top
connectionsluxury.com
14782.se
alekseevich1.ru
3wmsr.com
checkssuanalong.com
coveringattorney.com
alshshamil.com
justkillem.com
jmd58.net
e0pvb3.shop
fireballmedia5.com
markallenit.com
dampymatter.com
hrunmall2193.com
faithfultransitions.com
fyndme.net
Signatures
-
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/972-65-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1720-72-0x00000000001D0000-0x00000000001FF000-memory.dmp formbook behavioral1/memory/1720-76-0x00000000001D0000-0x00000000001FF000-memory.dmp formbook -
Executes dropped EXE 2 IoCs
pid Process 1176 tbelmde.exe 972 tbelmde.exe -
Loads dropped DLL 2 IoCs
pid Process 1612 b561c766f16984cad7bd9303131d69da7cae866a.exe 1176 tbelmde.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1176 set thread context of 972 1176 tbelmde.exe 28 PID 972 set thread context of 1412 972 tbelmde.exe 11 PID 1720 set thread context of 1412 1720 cscript.exe 11 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 972 tbelmde.exe 972 tbelmde.exe 1720 cscript.exe 1720 cscript.exe 1720 cscript.exe 1720 cscript.exe 1720 cscript.exe 1720 cscript.exe 1720 cscript.exe 1720 cscript.exe 1720 cscript.exe 1720 cscript.exe 1720 cscript.exe 1720 cscript.exe 1720 cscript.exe 1720 cscript.exe 1720 cscript.exe 1720 cscript.exe 1720 cscript.exe 1720 cscript.exe 1720 cscript.exe 1720 cscript.exe 1720 cscript.exe 1720 cscript.exe 1720 cscript.exe 1720 cscript.exe 1720 cscript.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 1176 tbelmde.exe 972 tbelmde.exe 972 tbelmde.exe 972 tbelmde.exe 1720 cscript.exe 1720 cscript.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 972 tbelmde.exe Token: SeDebugPrivilege 1720 cscript.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1412 Explorer.EXE 1412 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1412 Explorer.EXE 1412 Explorer.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1612 wrote to memory of 1176 1612 b561c766f16984cad7bd9303131d69da7cae866a.exe 27 PID 1612 wrote to memory of 1176 1612 b561c766f16984cad7bd9303131d69da7cae866a.exe 27 PID 1612 wrote to memory of 1176 1612 b561c766f16984cad7bd9303131d69da7cae866a.exe 27 PID 1612 wrote to memory of 1176 1612 b561c766f16984cad7bd9303131d69da7cae866a.exe 27 PID 1176 wrote to memory of 972 1176 tbelmde.exe 28 PID 1176 wrote to memory of 972 1176 tbelmde.exe 28 PID 1176 wrote to memory of 972 1176 tbelmde.exe 28 PID 1176 wrote to memory of 972 1176 tbelmde.exe 28 PID 1176 wrote to memory of 972 1176 tbelmde.exe 28 PID 1412 wrote to memory of 1720 1412 Explorer.EXE 36 PID 1412 wrote to memory of 1720 1412 Explorer.EXE 36 PID 1412 wrote to memory of 1720 1412 Explorer.EXE 36 PID 1412 wrote to memory of 1720 1412 Explorer.EXE 36 PID 1720 wrote to memory of 1824 1720 cscript.exe 37 PID 1720 wrote to memory of 1824 1720 cscript.exe 37 PID 1720 wrote to memory of 1824 1720 cscript.exe 37 PID 1720 wrote to memory of 1824 1720 cscript.exe 37
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Users\Admin\AppData\Local\Temp\b561c766f16984cad7bd9303131d69da7cae866a.exe"C:\Users\Admin\AppData\Local\Temp\b561c766f16984cad7bd9303131d69da7cae866a.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\tbelmde.exe"C:\Users\Admin\AppData\Local\Temp\tbelmde.exe" C:\Users\Admin\AppData\Local\Temp\lxirk.jhb3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Users\Admin\AppData\Local\Temp\tbelmde.exe"C:\Users\Admin\AppData\Local\Temp\tbelmde.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:972
-
-
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2044
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:1964
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:1096
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2004
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2016
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2020
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:1736
-
-
C:\Windows\SysWOW64\cscript.exe"C:\Windows\SysWOW64\cscript.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\tbelmde.exe"3⤵PID:1824
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
205KB
MD57e6daa507120f5d554a44c601bbfba58
SHA14018d5a2de62d2013a6c898828f8a74e814d5c1d
SHA256ca29d66f49018a38a180092513e189a53577092219ff4c8d119b30055913cbe1
SHA512896aaa9adaa33227e0abbac98aa43f4ae2c66d8efc41ba50d452ceea170508f6a049af6621e452eec3b215895cdb0e719c3c9afd34e257b77ff133e591aab1d4
-
Filesize
5KB
MD57611d59c10c085fe2b6f33cb8bc797b9
SHA18e6a6c47f32c48d1892b664b734c324cd70e0fb0
SHA2561391af011ebe5d6d3bbfd08ad339779d49b65f28260aef59bb4fb490b77c03ab
SHA5122f59ffdc86c719e780b7f07102dd1f3ee53d20f9f1f5464c0ac94495a8da25ddefe94e97499ab7c0da1a5d6bcd71d549da2bfef3d4d85e5d132c6a38534dcf65
-
Filesize
12KB
MD52a653d1ff961008fca702200878c9bf1
SHA1676dbca890fedf5e3fec6e8df688dbf0ef8436f2
SHA256e1fc47c2cbfda644718c2e519fcc103b8cb43b11b878183648be966082485bba
SHA51215b136b5561d3922113855a9caebe7b4b0813a4b7b28cc7cababa1f546bcb37217155273a7aa4d8ee0e4b54cf480383c4cd002dddf8f416de2e2a4b74ac697d8
-
Filesize
12KB
MD52a653d1ff961008fca702200878c9bf1
SHA1676dbca890fedf5e3fec6e8df688dbf0ef8436f2
SHA256e1fc47c2cbfda644718c2e519fcc103b8cb43b11b878183648be966082485bba
SHA51215b136b5561d3922113855a9caebe7b4b0813a4b7b28cc7cababa1f546bcb37217155273a7aa4d8ee0e4b54cf480383c4cd002dddf8f416de2e2a4b74ac697d8
-
Filesize
12KB
MD52a653d1ff961008fca702200878c9bf1
SHA1676dbca890fedf5e3fec6e8df688dbf0ef8436f2
SHA256e1fc47c2cbfda644718c2e519fcc103b8cb43b11b878183648be966082485bba
SHA51215b136b5561d3922113855a9caebe7b4b0813a4b7b28cc7cababa1f546bcb37217155273a7aa4d8ee0e4b54cf480383c4cd002dddf8f416de2e2a4b74ac697d8
-
Filesize
12KB
MD52a653d1ff961008fca702200878c9bf1
SHA1676dbca890fedf5e3fec6e8df688dbf0ef8436f2
SHA256e1fc47c2cbfda644718c2e519fcc103b8cb43b11b878183648be966082485bba
SHA51215b136b5561d3922113855a9caebe7b4b0813a4b7b28cc7cababa1f546bcb37217155273a7aa4d8ee0e4b54cf480383c4cd002dddf8f416de2e2a4b74ac697d8
-
Filesize
12KB
MD52a653d1ff961008fca702200878c9bf1
SHA1676dbca890fedf5e3fec6e8df688dbf0ef8436f2
SHA256e1fc47c2cbfda644718c2e519fcc103b8cb43b11b878183648be966082485bba
SHA51215b136b5561d3922113855a9caebe7b4b0813a4b7b28cc7cababa1f546bcb37217155273a7aa4d8ee0e4b54cf480383c4cd002dddf8f416de2e2a4b74ac697d8