Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05/01/2023, 02:22
Static task
static1
Behavioral task
behavioral1
Sample
Quotation RF181-2022.exe
Resource
win7-20220901-en
General
-
Target
Quotation RF181-2022.exe
-
Size
753KB
-
MD5
26d76b2a70a33f7d5a80e7508c281dcb
-
SHA1
0de31ba488c53a8220590f2cfc94fde22b10e96b
-
SHA256
3bdedad14e8d65032fccc3e16af3107b17fa664afb2f4c0cf081a8cdfb196f05
-
SHA512
be7a9aa6b431ce601a4969252d67843a1d30b2151be83d7bd6c1bd9406d7955756d1577acfb86eb5343e9d94d1d25ab9d421f3f0d7a3ecaa7cb99239c765df44
-
SSDEEP
12288:0JKsuO5p809sj0xMY6IIy4PryaZSQ8ORO1oTznmbhMWg3g43XR8:0JK+p8xjRfsuNwUEiTznmbng3R3XR8
Malware Config
Extracted
formbook
4.1
oi05
fluidavail.online
blchain.tech
kyocera.website
sangmine.xyz
thepolicyjacket.info
ssvhelpman.net
y-t-design.com
eminentabroad.com
codingcamp.store
bester.capital
tanjiya23.site
bheniamyn.dev
top5monitor.com
bit-prim.trade
airstreamsocialclub.com
darkwarspod.com
zazisalesdistribution.com
vivolentlo.online
daftburo.net
elemangelsin.xyz
chasewildfire.buzz
olioubnajo.buzz
agoura.dental
ky4352.com
finechoice.mobi
studioarchadroit.com
5009townesouth.com
tik454register.xyz
divaresesaat.xyz
projektwrestling.com
krystalclearmemories.net
vinaychhaparia.com
sodexosupplychain.info
uudai.store
demontya.site
cloudydad.cloud
mewzom.online
20010906.xyz
epuken.link
saludaldia.tech
generto.com
mbenzmotorsport.com
voidssl.life
elbetolacakbirgece10.com
cdncleaningservices.com
kuzs248.top
verus.website
wisefocus.net
xn--nergie-de-gaia-9jb.com
wowsportsbet.com
vhkopiu.top
shopify-postmaster15.info
lysiimmobilier.site
princess.express
betebrands.com
6tldsuoacvrlwc1g4i.top
labucarimini.net
hogushinotakumi.com
turnhappy.shop
geenpaii.xyz
pyrrhadev.xyz
minhasaudeelevada.com
oblk.pics
recursosdijitales.com
vivencie.shop
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/744-143-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/744-156-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/3332-163-0x0000000000990000-0x00000000009BF000-memory.dmp formbook behavioral2/memory/3332-170-0x0000000000990000-0x00000000009BF000-memory.dmp formbook -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation Quotation RF181-2022.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4260 set thread context of 744 4260 Quotation RF181-2022.exe 93 PID 744 set thread context of 3044 744 Quotation RF181-2022.exe 70 PID 3332 set thread context of 3044 3332 wscript.exe 70 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4368 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 4632 powershell.exe 744 Quotation RF181-2022.exe 744 Quotation RF181-2022.exe 744 Quotation RF181-2022.exe 744 Quotation RF181-2022.exe 4632 powershell.exe 3332 wscript.exe 3332 wscript.exe 3332 wscript.exe 3332 wscript.exe 3332 wscript.exe 3332 wscript.exe 3332 wscript.exe 3332 wscript.exe 3332 wscript.exe 3332 wscript.exe 3332 wscript.exe 3332 wscript.exe 3332 wscript.exe 3332 wscript.exe 3332 wscript.exe 3332 wscript.exe 3332 wscript.exe 3332 wscript.exe 3332 wscript.exe 3332 wscript.exe 3332 wscript.exe 3332 wscript.exe 3332 wscript.exe 3332 wscript.exe 3332 wscript.exe 3332 wscript.exe 3332 wscript.exe 3332 wscript.exe 3332 wscript.exe 3332 wscript.exe 3332 wscript.exe 3332 wscript.exe 3332 wscript.exe 3332 wscript.exe 3332 wscript.exe 3332 wscript.exe 3332 wscript.exe 3332 wscript.exe 3332 wscript.exe 3332 wscript.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3044 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 744 Quotation RF181-2022.exe 744 Quotation RF181-2022.exe 744 Quotation RF181-2022.exe 3332 wscript.exe 3332 wscript.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 4632 powershell.exe Token: SeDebugPrivilege 744 Quotation RF181-2022.exe Token: SeDebugPrivilege 3332 wscript.exe Token: SeShutdownPrivilege 3044 Explorer.EXE Token: SeCreatePagefilePrivilege 3044 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4260 wrote to memory of 4632 4260 Quotation RF181-2022.exe 89 PID 4260 wrote to memory of 4632 4260 Quotation RF181-2022.exe 89 PID 4260 wrote to memory of 4632 4260 Quotation RF181-2022.exe 89 PID 4260 wrote to memory of 4368 4260 Quotation RF181-2022.exe 91 PID 4260 wrote to memory of 4368 4260 Quotation RF181-2022.exe 91 PID 4260 wrote to memory of 4368 4260 Quotation RF181-2022.exe 91 PID 4260 wrote to memory of 744 4260 Quotation RF181-2022.exe 93 PID 4260 wrote to memory of 744 4260 Quotation RF181-2022.exe 93 PID 4260 wrote to memory of 744 4260 Quotation RF181-2022.exe 93 PID 4260 wrote to memory of 744 4260 Quotation RF181-2022.exe 93 PID 4260 wrote to memory of 744 4260 Quotation RF181-2022.exe 93 PID 4260 wrote to memory of 744 4260 Quotation RF181-2022.exe 93 PID 3044 wrote to memory of 3332 3044 Explorer.EXE 94 PID 3044 wrote to memory of 3332 3044 Explorer.EXE 94 PID 3044 wrote to memory of 3332 3044 Explorer.EXE 94 PID 3332 wrote to memory of 2840 3332 wscript.exe 95 PID 3332 wrote to memory of 2840 3332 wscript.exe 95 PID 3332 wrote to memory of 2840 3332 wscript.exe 95
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\Quotation RF181-2022.exe"C:\Users\Admin\AppData\Local\Temp\Quotation RF181-2022.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\orLJIiAOHl.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4632
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\orLJIiAOHl" /XML "C:\Users\Admin\AppData\Local\Temp\tmp56DA.tmp"3⤵
- Creates scheduled task(s)
PID:4368
-
-
C:\Users\Admin\AppData\Local\Temp\Quotation RF181-2022.exe"C:\Users\Admin\AppData\Local\Temp\Quotation RF181-2022.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:744
-
-
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Quotation RF181-2022.exe"3⤵PID:2840
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD572f5039a8f5e730b2d107a7b8bdd6189
SHA13ec70d5782f626e5f2cb478b81af54e9432e26d7
SHA256ddc2ee3e4e8cac20a00df4b838cf3f2a0f1edbcf4c746b6dcbe848f810a8950d
SHA5128ef53cba07b818871357c8531d32ebca923f50b4a3d93b0f174211348c34149eabf7fb8ad9c313d0289f3f7c44635aef75d113b59c074a3db0d36d945c713456