Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
10-03-2023 06:42
Static task
static1
Behavioral task
behavioral1
Sample
3580ae39b6b33aa67838c5c1ca91b6aebf91e470360fb13072497e85df748871.js
Resource
win7-20230220-en
General
-
Target
3580ae39b6b33aa67838c5c1ca91b6aebf91e470360fb13072497e85df748871.js
-
Size
341KB
-
MD5
59b4d0fb62bea58db86b5f9b82382f21
-
SHA1
57bae158e509b8e23c3347efeaf00553920b8bf6
-
SHA256
3580ae39b6b33aa67838c5c1ca91b6aebf91e470360fb13072497e85df748871
-
SHA512
d09975b8ecf9de689bf7e9cebfa9430940b6f465e00a15b4baeb839c598c61cac380263db96f027ef4328b705a773c3a4543961ba1806cc31c86a2fd82f29e6e
-
SSDEEP
6144:D9w3fOYrR6SInG2u3Wp4cwRDyTlMiAaJ/jpPiWUiSFtroVSSM1tZQfm:YWaR6SInGj3WN6DyhMiASjpPhSFtroVI
Malware Config
Extracted
formbook
4.1
a24e
flormarine.co.uk
theglazingsquad.uk
konarkpharma.com
maxpropertyfinanceuk.co.uk
jackson-ifc.com
yvonneazevedoimoveis.net
baystella.com
arexbaba.online
trihgd.xyz
filth520571.com
cikpkg.cfd
jakesupport.com
8863365.com
duniaslot777.online
lop3a.com
berkut-clan.ru
lernnavigator.com
elenaisaprincess.co.uk
daimadaquan.xyz
mychirocart.net
auroraalerts.uk
dunaphotography.com
netspirit.africa
alborhaneye.com
dwentalplans.com
95878.se
family-doctor-49371.com
grafonord.se
avimpactfit.com
growthlabus.com
kidney-life.com
delightfulappearance.com
valleymistst.co.uk
getasalaryraise.com
hongqiqu.vip
arkadiumstore.com
gaskansaja.click
getv3apparel.com
3888my.com
flaginyard.com
applehci.com
politouniversity.com
health-23.com
asciana.com
estheticdoctorturkey.com
bkes-2023.info
6bitly.com
abopappas.online
faridfabrics.com
td0.online
seosquid.co.uk
0731ye.net
alliotcloud.top
gxin-cn.com
96yz857.xyz
tekniik.co.uk
histarfamily.com
industrailglasstech.com
ioqpht6c.store
dacodig.com
emaliaolkusz1907.com
hjd533.com
dentalblueprints.com
amberdrichardson.com
balloonbanarasdecorator.com
Signatures
-
Formbook payload 5 IoCs
resource yara_rule behavioral1/files/0x000a0000000122ff-60.dat formbook behavioral1/files/0x000a0000000122ff-62.dat formbook behavioral1/files/0x000a0000000122ff-69.dat formbook behavioral1/memory/1300-70-0x0000000000080000-0x00000000000AF000-memory.dmp formbook behavioral1/memory/1300-72-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Blocklisted process makes network request 16 IoCs
flow pid Process 4 1044 wscript.exe 5 1044 wscript.exe 6 1044 wscript.exe 9 1044 wscript.exe 11 1044 wscript.exe 12 1044 wscript.exe 16 1044 wscript.exe 17 1044 wscript.exe 18 1044 wscript.exe 22 1044 wscript.exe 26 1044 wscript.exe 27 1044 wscript.exe 29 1044 wscript.exe 33 1044 wscript.exe 36 1044 wscript.exe 40 1044 wscript.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SfehVeXIsQ.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SfehVeXIsQ.js wscript.exe -
Executes dropped EXE 1 IoCs
pid Process 668 BIG BRO.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 668 set thread context of 1252 668 BIG BRO.exe 16 PID 1300 set thread context of 1252 1300 wininit.exe 16 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 668 BIG BRO.exe 668 BIG BRO.exe 1300 wininit.exe 1300 wininit.exe 1300 wininit.exe 1300 wininit.exe 1300 wininit.exe 1300 wininit.exe 1300 wininit.exe 1300 wininit.exe 1300 wininit.exe 1300 wininit.exe 1300 wininit.exe 1300 wininit.exe 1300 wininit.exe 1300 wininit.exe 1300 wininit.exe 1300 wininit.exe 1300 wininit.exe 1300 wininit.exe 1300 wininit.exe 1300 wininit.exe 1300 wininit.exe 1300 wininit.exe 1300 wininit.exe 1300 wininit.exe 1300 wininit.exe 1300 wininit.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1252 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 668 BIG BRO.exe 668 BIG BRO.exe 668 BIG BRO.exe 1300 wininit.exe 1300 wininit.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 668 BIG BRO.exe Token: SeDebugPrivilege 1300 wininit.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1252 Explorer.EXE 1252 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1252 Explorer.EXE 1252 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1996 wrote to memory of 1044 1996 wscript.exe 28 PID 1996 wrote to memory of 1044 1996 wscript.exe 28 PID 1996 wrote to memory of 1044 1996 wscript.exe 28 PID 1996 wrote to memory of 668 1996 wscript.exe 29 PID 1996 wrote to memory of 668 1996 wscript.exe 29 PID 1996 wrote to memory of 668 1996 wscript.exe 29 PID 1996 wrote to memory of 668 1996 wscript.exe 29 PID 1252 wrote to memory of 1300 1252 Explorer.EXE 31 PID 1252 wrote to memory of 1300 1252 Explorer.EXE 31 PID 1252 wrote to memory of 1300 1252 Explorer.EXE 31 PID 1252 wrote to memory of 1300 1252 Explorer.EXE 31 PID 1300 wrote to memory of 832 1300 wininit.exe 32 PID 1300 wrote to memory of 832 1300 wininit.exe 32 PID 1300 wrote to memory of 832 1300 wininit.exe 32 PID 1300 wrote to memory of 832 1300 wininit.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\3580ae39b6b33aa67838c5c1ca91b6aebf91e470360fb13072497e85df748871.js2⤵
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\SfehVeXIsQ.js"3⤵
- Blocklisted process makes network request
- Drops startup file
PID:1044
-
-
C:\Users\Admin\AppData\Local\Temp\BIG BRO.exe"C:\Users\Admin\AppData\Local\Temp\BIG BRO.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:668
-
-
-
C:\Windows\SysWOW64\wininit.exe"C:\Windows\SysWOW64\wininit.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\BIG BRO.exe"3⤵PID:832
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
185KB
MD5a20ea9350fa5aa4d9641723f3dfc1b31
SHA1c23cf2953ea071eac81740a687473442c66e73de
SHA25601afe1517575e1fd7f60e86702fc11a97cfc74718e520c6016eef42fa164b4ae
SHA512296b4ace0af1f33abb8c3c0262999b07c8ad6e9a4c075959b43335992f1058865581b2c7d362dc824ed787f61dc9c62338778cd28e12add2ac34b086ca62e035
-
Filesize
185KB
MD5a20ea9350fa5aa4d9641723f3dfc1b31
SHA1c23cf2953ea071eac81740a687473442c66e73de
SHA25601afe1517575e1fd7f60e86702fc11a97cfc74718e520c6016eef42fa164b4ae
SHA512296b4ace0af1f33abb8c3c0262999b07c8ad6e9a4c075959b43335992f1058865581b2c7d362dc824ed787f61dc9c62338778cd28e12add2ac34b086ca62e035
-
Filesize
185KB
MD5a20ea9350fa5aa4d9641723f3dfc1b31
SHA1c23cf2953ea071eac81740a687473442c66e73de
SHA25601afe1517575e1fd7f60e86702fc11a97cfc74718e520c6016eef42fa164b4ae
SHA512296b4ace0af1f33abb8c3c0262999b07c8ad6e9a4c075959b43335992f1058865581b2c7d362dc824ed787f61dc9c62338778cd28e12add2ac34b086ca62e035
-
Filesize
5KB
MD5ef7a0bcfc54e28b9a81af747b834c898
SHA147f605a45958a0beab476be0ef3b97434f7b999e
SHA25624fc05651edf06401a27a583f1dbe295881a16f9f98a04321319f3873a8569a4
SHA512c975ac3784e346a0ed4f754177f25d256b41bd0bf707f37f0e04e3d15022db5e6d9bfbe50719b8ac483f9b7406a0a3a2782a28f279a046f61faffb863ec5da31