Analysis
-
max time kernel
150s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
10/03/2023, 10:55
Static task
static1
Behavioral task
behavioral1
Sample
d8d8a2af9b26764004323afcb393879266daaf40afd026894b311424b50d8ff5.exe
Resource
win7-20230220-en
General
-
Target
d8d8a2af9b26764004323afcb393879266daaf40afd026894b311424b50d8ff5.exe
-
Size
241KB
-
MD5
02eefca081505168a313a927977e02e5
-
SHA1
4ff60a4b15d4ed1cc3733676a25b929962d64d4b
-
SHA256
d8d8a2af9b26764004323afcb393879266daaf40afd026894b311424b50d8ff5
-
SHA512
0f8a33342682c1e8a4c3b096c91e26cf9b18d48a28e0eaae2af450e637b3e6a00a075a6fd315ef7737e88a132005877e7af5959240452642ddadefee65ac537e
-
SSDEEP
6144:NYa6Juz8BMG9jCpNLw3ODiHVmyfvYUeEu0UIE:NYf5RiNymryfvYUi0UT
Malware Config
Extracted
formbook
4.1
gt48
flusskiesel.studio
txweiqi.com
bestsnowboardingincolorado.com
aceroyrodio.com
antoniafredrik.se
iskugo.club
lifehightech.com
emotionalsupporthedgehogs.com
911527.com
familyblinn.online
family-doctor-90847.com
importadosjl.shop
arobaz-solutions.com
ibobetgogo.com
trippincreative.com
funnyjokeday.com
doktorhizmeti.xyz
contentteam.co.uk
iyaarirealestate.com
atomikoldschools.com
investsanad.com
fxlifestylesignals.com
eliteresponsecourierservice.net
maismp3.net
crisbartoli.art
fore-te.com
delxom.xyz
frenchitup.online
hs8c.space
handsqialeft.com
paidprocessingvisa.com
dreamstatestudio.com
6thshop.com
kopenhagnn.com
creazionimilly.com
fantom.properties
51haojjw.com
e51385aa.com
itax-accounting.com
dggdsb.com
chartistryforex.com
hks4661.com
dispensingvape.com
bettercaching.com
drain-pipe-cleaning-89025.com
jyothish.tech
catchitcap.com
bensevent.com
pricepnc.com
karamargaretofficial.online
agnahsablgvl.com
lojaslombos.com
derite.africa
cestodgo.com
lovelettersfrom.com
blackconference.co.uk
berrypet.site
limestonecg.com
kidday.shop
demonstratemicrof.online
albertopchamo.com
20nho-matsu.xyz
eyespinebrainandgi.com
evobanco-online.com
igorbox.com
Signatures
-
Formbook payload 5 IoCs
resource yara_rule behavioral1/memory/1208-69-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1208-76-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1208-79-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1460-82-0x00000000000C0000-0x00000000000EF000-memory.dmp formbook behavioral1/memory/1460-84-0x00000000000C0000-0x00000000000EF000-memory.dmp formbook -
Executes dropped EXE 2 IoCs
pid Process 1444 jclbq.exe 1208 jclbq.exe -
Loads dropped DLL 3 IoCs
pid Process 1560 d8d8a2af9b26764004323afcb393879266daaf40afd026894b311424b50d8ff5.exe 1560 d8d8a2af9b26764004323afcb393879266daaf40afd026894b311424b50d8ff5.exe 1444 jclbq.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1444 set thread context of 1208 1444 jclbq.exe 27 PID 1208 set thread context of 1356 1208 jclbq.exe 16 PID 1208 set thread context of 1356 1208 jclbq.exe 16 PID 1460 set thread context of 1356 1460 netsh.exe 16 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 1208 jclbq.exe 1208 jclbq.exe 1208 jclbq.exe 1460 netsh.exe 1460 netsh.exe 1460 netsh.exe 1460 netsh.exe 1460 netsh.exe 1460 netsh.exe 1460 netsh.exe 1460 netsh.exe 1460 netsh.exe 1460 netsh.exe 1460 netsh.exe 1460 netsh.exe 1460 netsh.exe 1460 netsh.exe 1460 netsh.exe 1460 netsh.exe 1460 netsh.exe 1460 netsh.exe 1460 netsh.exe 1460 netsh.exe 1460 netsh.exe 1460 netsh.exe 1460 netsh.exe 1460 netsh.exe 1460 netsh.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1356 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 1444 jclbq.exe 1208 jclbq.exe 1208 jclbq.exe 1208 jclbq.exe 1208 jclbq.exe 1460 netsh.exe 1460 netsh.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1208 jclbq.exe Token: SeDebugPrivilege 1460 netsh.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1356 Explorer.EXE 1356 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1356 Explorer.EXE 1356 Explorer.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1560 wrote to memory of 1444 1560 d8d8a2af9b26764004323afcb393879266daaf40afd026894b311424b50d8ff5.exe 26 PID 1560 wrote to memory of 1444 1560 d8d8a2af9b26764004323afcb393879266daaf40afd026894b311424b50d8ff5.exe 26 PID 1560 wrote to memory of 1444 1560 d8d8a2af9b26764004323afcb393879266daaf40afd026894b311424b50d8ff5.exe 26 PID 1560 wrote to memory of 1444 1560 d8d8a2af9b26764004323afcb393879266daaf40afd026894b311424b50d8ff5.exe 26 PID 1444 wrote to memory of 1208 1444 jclbq.exe 27 PID 1444 wrote to memory of 1208 1444 jclbq.exe 27 PID 1444 wrote to memory of 1208 1444 jclbq.exe 27 PID 1444 wrote to memory of 1208 1444 jclbq.exe 27 PID 1444 wrote to memory of 1208 1444 jclbq.exe 27 PID 1356 wrote to memory of 1460 1356 Explorer.EXE 28 PID 1356 wrote to memory of 1460 1356 Explorer.EXE 28 PID 1356 wrote to memory of 1460 1356 Explorer.EXE 28 PID 1356 wrote to memory of 1460 1356 Explorer.EXE 28 PID 1460 wrote to memory of 1752 1460 netsh.exe 29 PID 1460 wrote to memory of 1752 1460 netsh.exe 29 PID 1460 wrote to memory of 1752 1460 netsh.exe 29 PID 1460 wrote to memory of 1752 1460 netsh.exe 29
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Users\Admin\AppData\Local\Temp\d8d8a2af9b26764004323afcb393879266daaf40afd026894b311424b50d8ff5.exe"C:\Users\Admin\AppData\Local\Temp\d8d8a2af9b26764004323afcb393879266daaf40afd026894b311424b50d8ff5.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\jclbq.exe"C:\Users\Admin\AppData\Local\Temp\jclbq.exe" C:\Users\Admin\AppData\Local\Temp\ejjzna.c3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\jclbq.exe"C:\Users\Admin\AppData\Local\Temp\jclbq.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1208
-
-
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\SysWOW64\netsh.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\jclbq.exe"3⤵PID:1752
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD556c8c7c799f71bdc89f7b5461aff5018
SHA17d43fc76f38bf06c329d76e5e1d7c55f5274c30e
SHA256347ce10f202d8b74459e9f20bca828374f7b6e2ff8f02b09d1b6661f12468c1f
SHA512d3e93413bb4e9d3ec0298e49316464ea403799061a770d736c92124c70f4de5cda778116fe52fd3cae001a9c60e366419da42bc34d8cfedae182f00cef82e420
-
Filesize
6KB
MD51020517dbcbe5fa0f2293cf76783b960
SHA1144aeb681338abb7e6f0aab2631bf36353beaf36
SHA2566b17509d84603c59e6c7cb1159159bb5671628b5d723ea3861f5f539ed314fa4
SHA512692015fee1d560dff70ffbda4994090550e4cf04136fd95f46ef27d3c18015ac8bb2beee9b862d44441ed7f479743385a38cd1c37891c775dbf7873a43372c5b
-
Filesize
6KB
MD51020517dbcbe5fa0f2293cf76783b960
SHA1144aeb681338abb7e6f0aab2631bf36353beaf36
SHA2566b17509d84603c59e6c7cb1159159bb5671628b5d723ea3861f5f539ed314fa4
SHA512692015fee1d560dff70ffbda4994090550e4cf04136fd95f46ef27d3c18015ac8bb2beee9b862d44441ed7f479743385a38cd1c37891c775dbf7873a43372c5b
-
Filesize
6KB
MD51020517dbcbe5fa0f2293cf76783b960
SHA1144aeb681338abb7e6f0aab2631bf36353beaf36
SHA2566b17509d84603c59e6c7cb1159159bb5671628b5d723ea3861f5f539ed314fa4
SHA512692015fee1d560dff70ffbda4994090550e4cf04136fd95f46ef27d3c18015ac8bb2beee9b862d44441ed7f479743385a38cd1c37891c775dbf7873a43372c5b
-
Filesize
6KB
MD51020517dbcbe5fa0f2293cf76783b960
SHA1144aeb681338abb7e6f0aab2631bf36353beaf36
SHA2566b17509d84603c59e6c7cb1159159bb5671628b5d723ea3861f5f539ed314fa4
SHA512692015fee1d560dff70ffbda4994090550e4cf04136fd95f46ef27d3c18015ac8bb2beee9b862d44441ed7f479743385a38cd1c37891c775dbf7873a43372c5b
-
Filesize
205KB
MD5cf37a36f916cd28fe01a4171bdd9cb45
SHA174cb49a570a1e3f774d269966018eb7d9faaa52c
SHA256d3163724fa7b29418fb87d302d25c04a8ba1084df9f592bdfefc65e4e183d462
SHA5127f30b3d059190fd114528f7d28002c6472a5c2731e3ee7a09f2d3dc2646b493e28ac02365588f09eccfdaaa1b0a549917449643ca2221c579ef7345d849774e6
-
Filesize
6KB
MD51020517dbcbe5fa0f2293cf76783b960
SHA1144aeb681338abb7e6f0aab2631bf36353beaf36
SHA2566b17509d84603c59e6c7cb1159159bb5671628b5d723ea3861f5f539ed314fa4
SHA512692015fee1d560dff70ffbda4994090550e4cf04136fd95f46ef27d3c18015ac8bb2beee9b862d44441ed7f479743385a38cd1c37891c775dbf7873a43372c5b
-
Filesize
6KB
MD51020517dbcbe5fa0f2293cf76783b960
SHA1144aeb681338abb7e6f0aab2631bf36353beaf36
SHA2566b17509d84603c59e6c7cb1159159bb5671628b5d723ea3861f5f539ed314fa4
SHA512692015fee1d560dff70ffbda4994090550e4cf04136fd95f46ef27d3c18015ac8bb2beee9b862d44441ed7f479743385a38cd1c37891c775dbf7873a43372c5b
-
Filesize
6KB
MD51020517dbcbe5fa0f2293cf76783b960
SHA1144aeb681338abb7e6f0aab2631bf36353beaf36
SHA2566b17509d84603c59e6c7cb1159159bb5671628b5d723ea3861f5f539ed314fa4
SHA512692015fee1d560dff70ffbda4994090550e4cf04136fd95f46ef27d3c18015ac8bb2beee9b862d44441ed7f479743385a38cd1c37891c775dbf7873a43372c5b