Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
10-03-2023 06:42
Static task
static1
Behavioral task
behavioral1
Sample
3580ae39b6b33aa67838c5c1ca91b6aebf91e470360fb13072497e85df748871.js
Resource
win7-20230220-en
General
-
Target
3580ae39b6b33aa67838c5c1ca91b6aebf91e470360fb13072497e85df748871.js
-
Size
341KB
-
MD5
59b4d0fb62bea58db86b5f9b82382f21
-
SHA1
57bae158e509b8e23c3347efeaf00553920b8bf6
-
SHA256
3580ae39b6b33aa67838c5c1ca91b6aebf91e470360fb13072497e85df748871
-
SHA512
d09975b8ecf9de689bf7e9cebfa9430940b6f465e00a15b4baeb839c598c61cac380263db96f027ef4328b705a773c3a4543961ba1806cc31c86a2fd82f29e6e
-
SSDEEP
6144:D9w3fOYrR6SInG2u3Wp4cwRDyTlMiAaJ/jpPiWUiSFtroVSSM1tZQfm:YWaR6SInGj3WN6DyhMiASjpPhSFtroVI
Malware Config
Extracted
formbook
4.1
a24e
flormarine.co.uk
theglazingsquad.uk
konarkpharma.com
maxpropertyfinanceuk.co.uk
jackson-ifc.com
yvonneazevedoimoveis.net
baystella.com
arexbaba.online
trihgd.xyz
filth520571.com
cikpkg.cfd
jakesupport.com
8863365.com
duniaslot777.online
lop3a.com
berkut-clan.ru
lernnavigator.com
elenaisaprincess.co.uk
daimadaquan.xyz
mychirocart.net
auroraalerts.uk
dunaphotography.com
netspirit.africa
alborhaneye.com
dwentalplans.com
95878.se
family-doctor-49371.com
grafonord.se
avimpactfit.com
growthlabus.com
kidney-life.com
delightfulappearance.com
valleymistst.co.uk
getasalaryraise.com
hongqiqu.vip
arkadiumstore.com
gaskansaja.click
getv3apparel.com
3888my.com
flaginyard.com
applehci.com
politouniversity.com
health-23.com
asciana.com
estheticdoctorturkey.com
bkes-2023.info
6bitly.com
abopappas.online
faridfabrics.com
td0.online
seosquid.co.uk
0731ye.net
alliotcloud.top
gxin-cn.com
96yz857.xyz
tekniik.co.uk
histarfamily.com
industrailglasstech.com
ioqpht6c.store
dacodig.com
emaliaolkusz1907.com
hjd533.com
dentalblueprints.com
amberdrichardson.com
balloonbanarasdecorator.com
Signatures
-
Formbook payload 5 IoCs
resource yara_rule behavioral2/files/0x000200000001f724-139.dat formbook behavioral2/files/0x000200000001f724-141.dat formbook behavioral2/files/0x000200000001f724-143.dat formbook behavioral2/memory/2068-149-0x0000000001330000-0x000000000135F000-memory.dmp formbook behavioral2/memory/2068-151-0x0000000001330000-0x000000000135F000-memory.dmp formbook -
Blocklisted process makes network request 16 IoCs
flow pid Process 12 3712 wscript.exe 25 3712 wscript.exe 38 3712 wscript.exe 48 3712 wscript.exe 59 3712 wscript.exe 60 3712 wscript.exe 67 3712 wscript.exe 68 3712 wscript.exe 76 3712 wscript.exe 90 3712 wscript.exe 93 3712 wscript.exe 96 3712 wscript.exe 101 3712 wscript.exe 103 3712 wscript.exe 104 3712 wscript.exe 108 3712 wscript.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SfehVeXIsQ.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SfehVeXIsQ.js wscript.exe -
Executes dropped EXE 1 IoCs
pid Process 1056 BIG BRO.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1056 set thread context of 3184 1056 BIG BRO.exe 46 PID 2068 set thread context of 3184 2068 wscript.exe 46 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 1056 BIG BRO.exe 1056 BIG BRO.exe 1056 BIG BRO.exe 1056 BIG BRO.exe 2068 wscript.exe 2068 wscript.exe 2068 wscript.exe 2068 wscript.exe 2068 wscript.exe 2068 wscript.exe 2068 wscript.exe 2068 wscript.exe 2068 wscript.exe 2068 wscript.exe 2068 wscript.exe 2068 wscript.exe 2068 wscript.exe 2068 wscript.exe 2068 wscript.exe 2068 wscript.exe 2068 wscript.exe 2068 wscript.exe 2068 wscript.exe 2068 wscript.exe 2068 wscript.exe 2068 wscript.exe 2068 wscript.exe 2068 wscript.exe 2068 wscript.exe 2068 wscript.exe 2068 wscript.exe 2068 wscript.exe 2068 wscript.exe 2068 wscript.exe 2068 wscript.exe 2068 wscript.exe 2068 wscript.exe 2068 wscript.exe 2068 wscript.exe 2068 wscript.exe 2068 wscript.exe 2068 wscript.exe 2068 wscript.exe 2068 wscript.exe 2068 wscript.exe 2068 wscript.exe 2068 wscript.exe 2068 wscript.exe 2068 wscript.exe 2068 wscript.exe 2068 wscript.exe 2068 wscript.exe 2068 wscript.exe 2068 wscript.exe 2068 wscript.exe 2068 wscript.exe 2068 wscript.exe 2068 wscript.exe 2068 wscript.exe 2068 wscript.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3184 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1056 BIG BRO.exe 1056 BIG BRO.exe 1056 BIG BRO.exe 2068 wscript.exe 2068 wscript.exe -
Suspicious use of AdjustPrivilegeToken 20 IoCs
description pid Process Token: SeDebugPrivilege 1056 BIG BRO.exe Token: SeShutdownPrivilege 3184 Explorer.EXE Token: SeCreatePagefilePrivilege 3184 Explorer.EXE Token: SeDebugPrivilege 2068 wscript.exe Token: SeShutdownPrivilege 3184 Explorer.EXE Token: SeCreatePagefilePrivilege 3184 Explorer.EXE Token: SeShutdownPrivilege 3184 Explorer.EXE Token: SeCreatePagefilePrivilege 3184 Explorer.EXE Token: SeShutdownPrivilege 3184 Explorer.EXE Token: SeCreatePagefilePrivilege 3184 Explorer.EXE Token: SeShutdownPrivilege 3184 Explorer.EXE Token: SeCreatePagefilePrivilege 3184 Explorer.EXE Token: SeShutdownPrivilege 3184 Explorer.EXE Token: SeCreatePagefilePrivilege 3184 Explorer.EXE Token: SeShutdownPrivilege 3184 Explorer.EXE Token: SeCreatePagefilePrivilege 3184 Explorer.EXE Token: SeShutdownPrivilege 3184 Explorer.EXE Token: SeCreatePagefilePrivilege 3184 Explorer.EXE Token: SeShutdownPrivilege 3184 Explorer.EXE Token: SeCreatePagefilePrivilege 3184 Explorer.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4108 wrote to memory of 3712 4108 wscript.exe 86 PID 4108 wrote to memory of 3712 4108 wscript.exe 86 PID 4108 wrote to memory of 1056 4108 wscript.exe 87 PID 4108 wrote to memory of 1056 4108 wscript.exe 87 PID 4108 wrote to memory of 1056 4108 wscript.exe 87 PID 3184 wrote to memory of 2068 3184 Explorer.EXE 88 PID 3184 wrote to memory of 2068 3184 Explorer.EXE 88 PID 3184 wrote to memory of 2068 3184 Explorer.EXE 88 PID 2068 wrote to memory of 4316 2068 wscript.exe 89 PID 2068 wrote to memory of 4316 2068 wscript.exe 89 PID 2068 wrote to memory of 4316 2068 wscript.exe 89
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\3580ae39b6b33aa67838c5c1ca91b6aebf91e470360fb13072497e85df748871.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\SfehVeXIsQ.js"2⤵
- Blocklisted process makes network request
- Drops startup file
PID:3712
-
-
C:\Users\Admin\AppData\Local\Temp\BIG BRO.exe"C:\Users\Admin\AppData\Local\Temp\BIG BRO.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1056
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\BIG BRO.exe"3⤵PID:4316
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
185KB
MD5a20ea9350fa5aa4d9641723f3dfc1b31
SHA1c23cf2953ea071eac81740a687473442c66e73de
SHA25601afe1517575e1fd7f60e86702fc11a97cfc74718e520c6016eef42fa164b4ae
SHA512296b4ace0af1f33abb8c3c0262999b07c8ad6e9a4c075959b43335992f1058865581b2c7d362dc824ed787f61dc9c62338778cd28e12add2ac34b086ca62e035
-
Filesize
185KB
MD5a20ea9350fa5aa4d9641723f3dfc1b31
SHA1c23cf2953ea071eac81740a687473442c66e73de
SHA25601afe1517575e1fd7f60e86702fc11a97cfc74718e520c6016eef42fa164b4ae
SHA512296b4ace0af1f33abb8c3c0262999b07c8ad6e9a4c075959b43335992f1058865581b2c7d362dc824ed787f61dc9c62338778cd28e12add2ac34b086ca62e035
-
Filesize
185KB
MD5a20ea9350fa5aa4d9641723f3dfc1b31
SHA1c23cf2953ea071eac81740a687473442c66e73de
SHA25601afe1517575e1fd7f60e86702fc11a97cfc74718e520c6016eef42fa164b4ae
SHA512296b4ace0af1f33abb8c3c0262999b07c8ad6e9a4c075959b43335992f1058865581b2c7d362dc824ed787f61dc9c62338778cd28e12add2ac34b086ca62e035
-
Filesize
5KB
MD5ef7a0bcfc54e28b9a81af747b834c898
SHA147f605a45958a0beab476be0ef3b97434f7b999e
SHA25624fc05651edf06401a27a583f1dbe295881a16f9f98a04321319f3873a8569a4
SHA512c975ac3784e346a0ed4f754177f25d256b41bd0bf707f37f0e04e3d15022db5e6d9bfbe50719b8ac483f9b7406a0a3a2782a28f279a046f61faffb863ec5da31