Analysis
-
max time kernel
149s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
16/03/2023, 12:14
Static task
static1
Behavioral task
behavioral1
Sample
z79Payment_Invoice.exe
Resource
win7-20230220-en
General
-
Target
z79Payment_Invoice.exe
-
Size
279KB
-
MD5
ab6b2dcefead1e07ced28e7ba26116f2
-
SHA1
dd97e6eff8cd76a423dd7dc19345924ccc532d23
-
SHA256
99879f576330744c038ac59de64f244284adb5329a1047f8e3313082ebd0a2c6
-
SHA512
267747bdc01d5207a18b5b1d0722af2342cf0550e8b54aa79f5cfdecefe7755eefd4e0d23df3037336228374eb10e6957438b100b77310b39bc1369cb660853c
-
SSDEEP
6144:mYa6ySxvmDOC0ThsaSCvAGVwtQVOStS//bqZ3vFaoWc:mYfp1IebV6Q4SakTWc
Malware Config
Extracted
formbook
4.1
nu06
cutmentor.net
alexwright.xyz
gymbastic.com
creperie-lalios.com
equipmentblock.com
zwangerschapvanweektotweek.net
asimulationcompany.com
g9technoinnovation.com
bestbirdies.xyz
addhair.online
get-breakfastburns.com
aex-studentki.guru
jhpx888.com
gemologic.dev
thegreencarshop.co.uk
alessandromargonari.com
cosmosynz.click
letstalkreparation.com
bka-i.com
hervelegerdressshop.co.uk
xn--5hqsa64xi8tdhd1xsp5oyyi.com
jobstrendpk.com
pavilionroofingservices.co.uk
gonulserezart.com
iby923.xyz
languageforall.africa
helloular3.com
faster1.one
lborient.com
bzhxqm.com
smartmetersystems.co.uk
icfc2019.com
handymantroop.com
mychefacademy.com
credit-cards-70626.com
letmewowyou.com
cityguide.africa
dismissalnoise.com
edu-degrees-89998.com
estebanecheverry.com
celsopaula.com
jihuajl.com
pyvob.xyz
gdbdkj.com
ballinc.online
amadeussalem.net
ievc-technologies.com
arrindellnotary.com
laneseempowerment.com
bullreward.com
evaluatemyathlete.com
seu-qzs.com
hexmexico.com
coiffeur-kosmetik-basel1.ch
1wacdu.top
hoot.software
goldhillmesatimes.com
jobsnailikely.com
cyberlavender.com
ldgyb.com
crunchtimemotion.com
xn--74q746a2tj.net
heikeshuwu.com
fotel.xyz
eltres-iot.info
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/2444-142-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/2444-150-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/212-152-0x0000000001200000-0x000000000122F000-memory.dmp formbook behavioral2/memory/212-154-0x0000000001200000-0x000000000122F000-memory.dmp formbook -
Executes dropped EXE 2 IoCs
pid Process 848 hchnl.exe 2444 hchnl.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 848 set thread context of 2444 848 hchnl.exe 87 PID 2444 set thread context of 2616 2444 hchnl.exe 47 PID 212 set thread context of 2616 212 cmstp.exe 47 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 2444 hchnl.exe 2444 hchnl.exe 2444 hchnl.exe 2444 hchnl.exe 212 cmstp.exe 212 cmstp.exe 212 cmstp.exe 212 cmstp.exe 212 cmstp.exe 212 cmstp.exe 212 cmstp.exe 212 cmstp.exe 212 cmstp.exe 212 cmstp.exe 212 cmstp.exe 212 cmstp.exe 212 cmstp.exe 212 cmstp.exe 212 cmstp.exe 212 cmstp.exe 212 cmstp.exe 212 cmstp.exe 212 cmstp.exe 212 cmstp.exe 212 cmstp.exe 212 cmstp.exe 212 cmstp.exe 212 cmstp.exe 212 cmstp.exe 212 cmstp.exe 212 cmstp.exe 212 cmstp.exe 212 cmstp.exe 212 cmstp.exe 212 cmstp.exe 212 cmstp.exe 212 cmstp.exe 212 cmstp.exe 212 cmstp.exe 212 cmstp.exe 212 cmstp.exe 212 cmstp.exe 212 cmstp.exe 212 cmstp.exe 212 cmstp.exe 212 cmstp.exe 212 cmstp.exe 212 cmstp.exe 212 cmstp.exe 212 cmstp.exe 212 cmstp.exe 212 cmstp.exe 212 cmstp.exe 212 cmstp.exe 212 cmstp.exe 212 cmstp.exe 212 cmstp.exe 212 cmstp.exe 212 cmstp.exe 212 cmstp.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2616 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 848 hchnl.exe 2444 hchnl.exe 2444 hchnl.exe 2444 hchnl.exe 212 cmstp.exe 212 cmstp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2444 hchnl.exe Token: SeDebugPrivilege 212 cmstp.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 4516 wrote to memory of 848 4516 z79Payment_Invoice.exe 86 PID 4516 wrote to memory of 848 4516 z79Payment_Invoice.exe 86 PID 4516 wrote to memory of 848 4516 z79Payment_Invoice.exe 86 PID 848 wrote to memory of 2444 848 hchnl.exe 87 PID 848 wrote to memory of 2444 848 hchnl.exe 87 PID 848 wrote to memory of 2444 848 hchnl.exe 87 PID 848 wrote to memory of 2444 848 hchnl.exe 87 PID 2616 wrote to memory of 212 2616 Explorer.EXE 88 PID 2616 wrote to memory of 212 2616 Explorer.EXE 88 PID 2616 wrote to memory of 212 2616 Explorer.EXE 88 PID 212 wrote to memory of 1748 212 cmstp.exe 91 PID 212 wrote to memory of 1748 212 cmstp.exe 91 PID 212 wrote to memory of 1748 212 cmstp.exe 91
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\z79Payment_Invoice.exe"C:\Users\Admin\AppData\Local\Temp\z79Payment_Invoice.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Users\Admin\AppData\Local\Temp\hchnl.exe"C:\Users\Admin\AppData\Local\Temp\hchnl.exe" C:\Users\Admin\AppData\Local\Temp\tjvca.en3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Users\Admin\AppData\Local\Temp\hchnl.exe"C:\Users\Admin\AppData\Local\Temp\hchnl.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2444
-
-
-
-
C:\Windows\SysWOW64\cmstp.exe"C:\Windows\SysWOW64\cmstp.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\hchnl.exe"3⤵PID:1748
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
205KB
MD5758d252482cb5e9d0fabdd1a823693ce
SHA14d400d5aeb7cf0d51783eb5ca28148cb59dec62e
SHA256a73214dc5d911d5c63b02452e901960be43b211fac89b118fb384a6231e8f592
SHA5129a555a01683e61e4c0ecac509a0ea4f01e0a7b270411687db0ef482d45f78f291ecdfb16da1a1e0ebac0734062015e992e4617e7c186748473ed1c672f3b6d3f
-
Filesize
58KB
MD5b452944769013ab23fefa20383f5d5e9
SHA113b1850c2538925c2b63dcb332411f054a2144a3
SHA256c9749bbe3d3516f7d4c62212fdd943ec620c212301e224425b1e783d97e988a3
SHA51274ca7637c18ca5230d345d4a5ed4f24e2da85354c3d938447af095c625ceb51962ea55d3e261f320603918f3c1b648c257a5920b8a8a9ea793d759503e0a2929
-
Filesize
58KB
MD5b452944769013ab23fefa20383f5d5e9
SHA113b1850c2538925c2b63dcb332411f054a2144a3
SHA256c9749bbe3d3516f7d4c62212fdd943ec620c212301e224425b1e783d97e988a3
SHA51274ca7637c18ca5230d345d4a5ed4f24e2da85354c3d938447af095c625ceb51962ea55d3e261f320603918f3c1b648c257a5920b8a8a9ea793d759503e0a2929
-
Filesize
58KB
MD5b452944769013ab23fefa20383f5d5e9
SHA113b1850c2538925c2b63dcb332411f054a2144a3
SHA256c9749bbe3d3516f7d4c62212fdd943ec620c212301e224425b1e783d97e988a3
SHA51274ca7637c18ca5230d345d4a5ed4f24e2da85354c3d938447af095c625ceb51962ea55d3e261f320603918f3c1b648c257a5920b8a8a9ea793d759503e0a2929
-
Filesize
5KB
MD5346a4e38ddc6825496883e1b8a10f86e
SHA1034628b066c6d47b4b2b8ee5bc06243f27429f28
SHA2564e0a805ef4afbac34de98431a3e978f1bed993736f63e946eb546093c37a4b3e
SHA512d9bd7d23551adda608f7d925426956be77af9ef4fadb34c1ca87ccd50352330c8a55d86606038820d13f4f44e05db731ce714aa9dc193b985461cf9b52e96323