Analysis
-
max time kernel
150s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05/03/2023, 01:25
Static task
static1
Behavioral task
behavioral1
Sample
8e4936a8044f833fa8b5e67067208e8b81c0ca55844122013afe82a0af3b6eb6.exe
Resource
win7-20230220-en
General
-
Target
8e4936a8044f833fa8b5e67067208e8b81c0ca55844122013afe82a0af3b6eb6.exe
-
Size
1.1MB
-
MD5
6b0f9cfb69941d168fef11869e4c42b9
-
SHA1
54d5d783279109aca3abb09354aa99f02fc0994b
-
SHA256
8e4936a8044f833fa8b5e67067208e8b81c0ca55844122013afe82a0af3b6eb6
-
SHA512
d0cfb2311ce78df30d8726964c8424c930a0a9302edc74dbe413d48fd21812ba747c9abcdb0a41940c7165806debac70483f3c1ed8dfacc4f99362a54ce261d1
-
SSDEEP
24576:j9dh2f8JfV2CeDzuPNy3k1aBH4fxQvy4:hdh2EJfB0zuPNykwt4JWy4
Malware Config
Extracted
formbook
4.1
md25
spicyappleshop.com
nearcut.africa
hairgrowrasa.com
jbo298.com
ibxs-key.com
agenrusia777.day
dimaxcf.com
onceuponatimedigital.com
datappg.online
graknip.online
ch-ac.ru
czubao.com
ercdocupdates.com
leveldhealth.com
sportsawards.rsvp
denvillemanagementinc.com
azwildchildco.com
2399130.com
ganhardinheironainternet.fun
barbelltoy.com
4039167.com
missing.africa
haleboss.net
courttips.com
dayulplus.com
bonheur-factor.com
grupordm.com
ilovedonoey.com
coastalcreativegraphics.com
elektraaanleggen.com
id2567.ru
3eqrt.xyz
elektryczni.club
keycanna.online
ca-account.website
5gahzbda.com
bittabantervapes.com
primalmedicalgroup.com
bestvalueforyou.info
cctvzgyxl.com
couches-sofas-56679.com
checknin.africa
cora-reports.com
infosantepoumon.com
craigstreeservice.com
umomcoach.africa
allshousedesign.com
stillparentspodcast.co.uk
firstflix.xyz
7kd2l.bond
genzwallet.com
chute.one
efefrace.buzz
iamoputanvir.live
hackermind-server.com
evermylk.co.uk
decoders.dev
capricornxsz.xyz
inove9variedades.com
bettermedia.online
fight-like-hell.com
polopoo.net
dukia.africa
joyaapparel.com
freedomraves.ch
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral1/memory/520-72-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/520-81-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1068-85-0x0000000000090000-0x00000000000BF000-memory.dmp formbook behavioral1/memory/1068-87-0x0000000000090000-0x00000000000BF000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 912 set thread context of 520 912 8e4936a8044f833fa8b5e67067208e8b81c0ca55844122013afe82a0af3b6eb6.exe 32 PID 520 set thread context of 1360 520 RegSvcs.exe 8 PID 1068 set thread context of 1360 1068 rundll32.exe 8 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2040 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 912 8e4936a8044f833fa8b5e67067208e8b81c0ca55844122013afe82a0af3b6eb6.exe 912 8e4936a8044f833fa8b5e67067208e8b81c0ca55844122013afe82a0af3b6eb6.exe 912 8e4936a8044f833fa8b5e67067208e8b81c0ca55844122013afe82a0af3b6eb6.exe 912 8e4936a8044f833fa8b5e67067208e8b81c0ca55844122013afe82a0af3b6eb6.exe 520 RegSvcs.exe 520 RegSvcs.exe 1764 powershell.exe 1068 rundll32.exe 1068 rundll32.exe 1068 rundll32.exe 1068 rundll32.exe 1068 rundll32.exe 1068 rundll32.exe 1068 rundll32.exe 1068 rundll32.exe 1068 rundll32.exe 1068 rundll32.exe 1068 rundll32.exe 1068 rundll32.exe 1068 rundll32.exe 1068 rundll32.exe 1068 rundll32.exe 1068 rundll32.exe 1068 rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1360 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 520 RegSvcs.exe 520 RegSvcs.exe 520 RegSvcs.exe 1068 rundll32.exe 1068 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 912 8e4936a8044f833fa8b5e67067208e8b81c0ca55844122013afe82a0af3b6eb6.exe Token: SeDebugPrivilege 520 RegSvcs.exe Token: SeDebugPrivilege 1764 powershell.exe Token: SeDebugPrivilege 1068 rundll32.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1360 Explorer.EXE 1360 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1360 Explorer.EXE 1360 Explorer.EXE -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 912 wrote to memory of 1764 912 8e4936a8044f833fa8b5e67067208e8b81c0ca55844122013afe82a0af3b6eb6.exe 26 PID 912 wrote to memory of 1764 912 8e4936a8044f833fa8b5e67067208e8b81c0ca55844122013afe82a0af3b6eb6.exe 26 PID 912 wrote to memory of 1764 912 8e4936a8044f833fa8b5e67067208e8b81c0ca55844122013afe82a0af3b6eb6.exe 26 PID 912 wrote to memory of 1764 912 8e4936a8044f833fa8b5e67067208e8b81c0ca55844122013afe82a0af3b6eb6.exe 26 PID 912 wrote to memory of 2040 912 8e4936a8044f833fa8b5e67067208e8b81c0ca55844122013afe82a0af3b6eb6.exe 28 PID 912 wrote to memory of 2040 912 8e4936a8044f833fa8b5e67067208e8b81c0ca55844122013afe82a0af3b6eb6.exe 28 PID 912 wrote to memory of 2040 912 8e4936a8044f833fa8b5e67067208e8b81c0ca55844122013afe82a0af3b6eb6.exe 28 PID 912 wrote to memory of 2040 912 8e4936a8044f833fa8b5e67067208e8b81c0ca55844122013afe82a0af3b6eb6.exe 28 PID 912 wrote to memory of 780 912 8e4936a8044f833fa8b5e67067208e8b81c0ca55844122013afe82a0af3b6eb6.exe 30 PID 912 wrote to memory of 780 912 8e4936a8044f833fa8b5e67067208e8b81c0ca55844122013afe82a0af3b6eb6.exe 30 PID 912 wrote to memory of 780 912 8e4936a8044f833fa8b5e67067208e8b81c0ca55844122013afe82a0af3b6eb6.exe 30 PID 912 wrote to memory of 780 912 8e4936a8044f833fa8b5e67067208e8b81c0ca55844122013afe82a0af3b6eb6.exe 30 PID 912 wrote to memory of 780 912 8e4936a8044f833fa8b5e67067208e8b81c0ca55844122013afe82a0af3b6eb6.exe 30 PID 912 wrote to memory of 780 912 8e4936a8044f833fa8b5e67067208e8b81c0ca55844122013afe82a0af3b6eb6.exe 30 PID 912 wrote to memory of 780 912 8e4936a8044f833fa8b5e67067208e8b81c0ca55844122013afe82a0af3b6eb6.exe 30 PID 912 wrote to memory of 1116 912 8e4936a8044f833fa8b5e67067208e8b81c0ca55844122013afe82a0af3b6eb6.exe 31 PID 912 wrote to memory of 1116 912 8e4936a8044f833fa8b5e67067208e8b81c0ca55844122013afe82a0af3b6eb6.exe 31 PID 912 wrote to memory of 1116 912 8e4936a8044f833fa8b5e67067208e8b81c0ca55844122013afe82a0af3b6eb6.exe 31 PID 912 wrote to memory of 1116 912 8e4936a8044f833fa8b5e67067208e8b81c0ca55844122013afe82a0af3b6eb6.exe 31 PID 912 wrote to memory of 1116 912 8e4936a8044f833fa8b5e67067208e8b81c0ca55844122013afe82a0af3b6eb6.exe 31 PID 912 wrote to memory of 1116 912 8e4936a8044f833fa8b5e67067208e8b81c0ca55844122013afe82a0af3b6eb6.exe 31 PID 912 wrote to memory of 1116 912 8e4936a8044f833fa8b5e67067208e8b81c0ca55844122013afe82a0af3b6eb6.exe 31 PID 912 wrote to memory of 520 912 8e4936a8044f833fa8b5e67067208e8b81c0ca55844122013afe82a0af3b6eb6.exe 32 PID 912 wrote to memory of 520 912 8e4936a8044f833fa8b5e67067208e8b81c0ca55844122013afe82a0af3b6eb6.exe 32 PID 912 wrote to memory of 520 912 8e4936a8044f833fa8b5e67067208e8b81c0ca55844122013afe82a0af3b6eb6.exe 32 PID 912 wrote to memory of 520 912 8e4936a8044f833fa8b5e67067208e8b81c0ca55844122013afe82a0af3b6eb6.exe 32 PID 912 wrote to memory of 520 912 8e4936a8044f833fa8b5e67067208e8b81c0ca55844122013afe82a0af3b6eb6.exe 32 PID 912 wrote to memory of 520 912 8e4936a8044f833fa8b5e67067208e8b81c0ca55844122013afe82a0af3b6eb6.exe 32 PID 912 wrote to memory of 520 912 8e4936a8044f833fa8b5e67067208e8b81c0ca55844122013afe82a0af3b6eb6.exe 32 PID 912 wrote to memory of 520 912 8e4936a8044f833fa8b5e67067208e8b81c0ca55844122013afe82a0af3b6eb6.exe 32 PID 912 wrote to memory of 520 912 8e4936a8044f833fa8b5e67067208e8b81c0ca55844122013afe82a0af3b6eb6.exe 32 PID 912 wrote to memory of 520 912 8e4936a8044f833fa8b5e67067208e8b81c0ca55844122013afe82a0af3b6eb6.exe 32 PID 1360 wrote to memory of 1068 1360 Explorer.EXE 33 PID 1360 wrote to memory of 1068 1360 Explorer.EXE 33 PID 1360 wrote to memory of 1068 1360 Explorer.EXE 33 PID 1360 wrote to memory of 1068 1360 Explorer.EXE 33 PID 1360 wrote to memory of 1068 1360 Explorer.EXE 33 PID 1360 wrote to memory of 1068 1360 Explorer.EXE 33 PID 1360 wrote to memory of 1068 1360 Explorer.EXE 33 PID 1068 wrote to memory of 1668 1068 rundll32.exe 34 PID 1068 wrote to memory of 1668 1068 rundll32.exe 34 PID 1068 wrote to memory of 1668 1068 rundll32.exe 34 PID 1068 wrote to memory of 1668 1068 rundll32.exe 34
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\8e4936a8044f833fa8b5e67067208e8b81c0ca55844122013afe82a0af3b6eb6.exe"C:\Users\Admin\AppData\Local\Temp\8e4936a8044f833fa8b5e67067208e8b81c0ca55844122013afe82a0af3b6eb6.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\KWWHHQhTOU.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1764
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KWWHHQhTOU" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5C44.tmp"3⤵
- Creates scheduled task(s)
PID:2040
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵PID:780
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵PID:1116
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:520
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵PID:1668
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD563a8fa69bfabe74b68dcf6d783df4d3b
SHA19f11fe51406ac54f471dc97c04327c85e98419a7
SHA25684c2c0cc250330a2a38f02b2b871f4a33f16b8f30af64e7ae0e1b4423480f942
SHA512d0c93fb1d09562695965b439766de4de1d93fb6dc2976aa66e94464b29c79c6b7ceb92a888930a2992ba995c0c3d062ca29f3df829c818a0fc123f75d7e30e43