Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
13/01/2023, 13:25
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220812-en
General
-
Target
tmp.exe
-
Size
913KB
-
MD5
debe170f50f06aebab1d2f73f38c7e1c
-
SHA1
4cb00e909a171eaf77e95ec8beace8940d9256bd
-
SHA256
bb4e86fa92499e118e502b2e0bc81d0389048c678e2ce9b2ffef5c81f489eb05
-
SHA512
f56cad6bb311fde24294f39450e0fe75a70c9cffbd6ac525b554e11006401b51b18fef1c686f78da32dc29207b5e315b97fdb1c03a7b2f4b2b19a4164438f390
-
SSDEEP
24576:sb8FUqa9ywhtVZWKqINBKXJCPXgVOKPPPD:/5a9B/bqIi8/gAiPD
Malware Config
Extracted
formbook
4.1
g2fg
snowcrash.website
pointman.us
newheartvalve.care
drandl.com
sandspringsramblers.com
programagubernamental.online
boja.us
mvrsnike.com
mentallyillmotherhood.com
facom.us
programagubernamental.store
izivente.com
roller-v.fr
amazonbioactives.com
metaverseapple.xyz
5gt-mobilevsverizon.com
gtwebsolutions.co
scottdunn.life
usdp.trade
pikmin.run
cardano-dogs.com
bf2hgfy.xyz
teslafoot.com
rubertquintana.com
wellsfargroewards.com
santel.us
couponatonline.com
theunitedhomeland.com
pmstnly.com
strlocal.com
shelleysmucker.com
youser.online
emansdesign.com
usnikeshoesbot.top
starfish.press
scotwork.us
metamorgana.com
onyxbx.net
rivas.company
firstcoastalfb.com
onpurposetraumainformedcare.com
celimot.xyz
jecunikepemej.rest
lenovolatenightit.com
unitedsterlingcompanyky.com
safety2venture.us
facebookismetanow.com
scottdunn.review
mentallyillmotherhood.com
firstincargo.com
vikavivi.com
investmenofpairs.club
nexans.cloud
farcloud.fr
ivermectinforhumans.quest
5gmalesdf.sbs
majenta.info
6vvvvvwmetam.top
metafirstclass.com
firstcoinnews.com
btcetffutures.online
funinfortmyers.com
mangoirslk.top
metaversebasicprivacy.com
blancheshelley.xyz
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/4656-143-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4656-159-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/2364-164-0x0000000000AF0000-0x0000000000B1F000-memory.dmp formbook behavioral2/memory/2364-168-0x0000000000AF0000-0x0000000000B1F000-memory.dmp formbook -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation tmp.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2016 set thread context of 4656 2016 tmp.exe 96 PID 4656 set thread context of 2080 4656 tmp.exe 33 PID 2364 set thread context of 2080 2364 control.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3952 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 4288 powershell.exe 4656 tmp.exe 4656 tmp.exe 4656 tmp.exe 4656 tmp.exe 4288 powershell.exe 2364 control.exe 2364 control.exe 2364 control.exe 2364 control.exe 2364 control.exe 2364 control.exe 2364 control.exe 2364 control.exe 2364 control.exe 2364 control.exe 2364 control.exe 2364 control.exe 2364 control.exe 2364 control.exe 2364 control.exe 2364 control.exe 2364 control.exe 2364 control.exe 2364 control.exe 2364 control.exe 2364 control.exe 2364 control.exe 2364 control.exe 2364 control.exe 2364 control.exe 2364 control.exe 2364 control.exe 2364 control.exe 2364 control.exe 2364 control.exe 2364 control.exe 2364 control.exe 2364 control.exe 2364 control.exe 2364 control.exe 2364 control.exe 2364 control.exe 2364 control.exe 2364 control.exe 2364 control.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2080 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 4656 tmp.exe 4656 tmp.exe 4656 tmp.exe 2364 control.exe 2364 control.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 4288 powershell.exe Token: SeDebugPrivilege 4656 tmp.exe Token: SeDebugPrivilege 2364 control.exe Token: SeShutdownPrivilege 2080 Explorer.EXE Token: SeCreatePagefilePrivilege 2080 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2016 wrote to memory of 4288 2016 tmp.exe 92 PID 2016 wrote to memory of 4288 2016 tmp.exe 92 PID 2016 wrote to memory of 4288 2016 tmp.exe 92 PID 2016 wrote to memory of 3952 2016 tmp.exe 94 PID 2016 wrote to memory of 3952 2016 tmp.exe 94 PID 2016 wrote to memory of 3952 2016 tmp.exe 94 PID 2016 wrote to memory of 4656 2016 tmp.exe 96 PID 2016 wrote to memory of 4656 2016 tmp.exe 96 PID 2016 wrote to memory of 4656 2016 tmp.exe 96 PID 2016 wrote to memory of 4656 2016 tmp.exe 96 PID 2016 wrote to memory of 4656 2016 tmp.exe 96 PID 2016 wrote to memory of 4656 2016 tmp.exe 96 PID 2080 wrote to memory of 2364 2080 Explorer.EXE 97 PID 2080 wrote to memory of 2364 2080 Explorer.EXE 97 PID 2080 wrote to memory of 2364 2080 Explorer.EXE 97 PID 2364 wrote to memory of 1252 2364 control.exe 98 PID 2364 wrote to memory of 1252 2364 control.exe 98 PID 2364 wrote to memory of 1252 2364 control.exe 98
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\rQEtqJzJtbIAJ.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4288
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rQEtqJzJtbIAJ" /XML "C:\Users\Admin\AppData\Local\Temp\tmp918.tmp"3⤵
- Creates scheduled task(s)
PID:3952
-
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4656
-
-
-
C:\Windows\SysWOW64\control.exe"C:\Windows\SysWOW64\control.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\tmp.exe"3⤵PID:1252
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5493df40b408fdda8c9a3a6d56918cec5
SHA1f9482ed40cd05d67f43049e241881e33799287ba
SHA25615497bf6e640f686577111d2566a96b6b243b5717a8cc46ce0b1ae20f0a4246d
SHA512df8b1905bfdb7e85ee40f4030f16e35bf7ad05c5054b9ccdc797da563edae2f99670bfac8aad677203562b46663ad27f365d23029b90ad556650ee266bf66ff3