Analysis
-
max time kernel
53s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
21-03-2023 14:35
Static task
static1
Behavioral task
behavioral1
Sample
2ee6aac96667a49df963edc8384038b0859d689ab4377e74ac7f45086010c732.exe
Resource
win7-20230220-en
General
-
Target
2ee6aac96667a49df963edc8384038b0859d689ab4377e74ac7f45086010c732.exe
-
Size
749KB
-
MD5
6561c71692329e5c4b10948e273ac496
-
SHA1
f01d729fbd8934730fd7531fa00649089e531616
-
SHA256
2ee6aac96667a49df963edc8384038b0859d689ab4377e74ac7f45086010c732
-
SHA512
73fe44ecf169bf6b35b7b3732caf201a6d949739cd5b627137f63dfef68e20ee9132def26672ecd9689a636d269a3e14853b6d771312c764ef23b2a05f762fa5
-
SSDEEP
12288:i97mYMUnFW/N5b9hsF+U5u0RX4up4Aev8lZLse1bdHnL+2CzomKsciaicxJnj:i97UrIF+UloE4AevUZhniZzL2iKv
Malware Config
Extracted
formbook
4.1
jr22
941zhe.com
lunarportal.space
xn--osmaniyeiek-t9ab.online
trejoscar.com
nrnursery.com
quizcannot.cfd
seedstockersthailand.com
watsonwindow.com
wjfholdings.com
weziclondon.com
naruot.xyz
yeji.plus
classicmenstore.com
oharatravel.com
therapyplankits.com
keviegreshonpt.com
qdlyner.com
seithupaarungal.com
casinorates.online
8ug4as.icu
foamyfallscarwash.com
padelfaculty.com
theenergysavingcentre.com
dorpp.com
scoresendirect.online
yuqintw.com
erenortopedi.com
skymagickey.com
infinitepuremind.com
watchtamilmovie.com
southplainsinsurance.net
intentionaldating.app
certaproarkansas.com
blidai.com
thehoneybeeworks.com
followplace.com
sipsterbyananeke.com
37300.uk
bluebirdbuyers.com
composewithme.com
moneymundo.com
daftarakun.xyz
samsonm.com
nurse-jobs-in-us-35896.com
cancerbloodspecialistsga.net
feelfeminineagain.com
residentialcaretraining.com
allprocleanouts.com
englishsongs.online
bookkeepingdeerfield.com
bendcollegeadvisor.com
boaiqixian.com
vixensgolfcarts.com
igarrido.net
rsconstructiontrading.com
lakewayturf.com
carelesstees.com
silviaheni.xyz
iaqieqq.com
campingspiel.com
diacute.com
thaigeneratortg.com
autoreenter.com
meclishaber.xyz
airbnbtransfers.com
Signatures
-
Formbook payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/364-75-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
2ee6aac96667a49df963edc8384038b0859d689ab4377e74ac7f45086010c732.exedescription pid process target process PID 908 set thread context of 364 908 2ee6aac96667a49df963edc8384038b0859d689ab4377e74ac7f45086010c732.exe 2ee6aac96667a49df963edc8384038b0859d689ab4377e74ac7f45086010c732.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
powershell.exepowershell.exe2ee6aac96667a49df963edc8384038b0859d689ab4377e74ac7f45086010c732.exepid process 1964 powershell.exe 568 powershell.exe 364 2ee6aac96667a49df963edc8384038b0859d689ab4377e74ac7f45086010c732.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 1964 powershell.exe Token: SeDebugPrivilege 568 powershell.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
2ee6aac96667a49df963edc8384038b0859d689ab4377e74ac7f45086010c732.exedescription pid process target process PID 908 wrote to memory of 568 908 2ee6aac96667a49df963edc8384038b0859d689ab4377e74ac7f45086010c732.exe powershell.exe PID 908 wrote to memory of 568 908 2ee6aac96667a49df963edc8384038b0859d689ab4377e74ac7f45086010c732.exe powershell.exe PID 908 wrote to memory of 568 908 2ee6aac96667a49df963edc8384038b0859d689ab4377e74ac7f45086010c732.exe powershell.exe PID 908 wrote to memory of 568 908 2ee6aac96667a49df963edc8384038b0859d689ab4377e74ac7f45086010c732.exe powershell.exe PID 908 wrote to memory of 1964 908 2ee6aac96667a49df963edc8384038b0859d689ab4377e74ac7f45086010c732.exe powershell.exe PID 908 wrote to memory of 1964 908 2ee6aac96667a49df963edc8384038b0859d689ab4377e74ac7f45086010c732.exe powershell.exe PID 908 wrote to memory of 1964 908 2ee6aac96667a49df963edc8384038b0859d689ab4377e74ac7f45086010c732.exe powershell.exe PID 908 wrote to memory of 1964 908 2ee6aac96667a49df963edc8384038b0859d689ab4377e74ac7f45086010c732.exe powershell.exe PID 908 wrote to memory of 824 908 2ee6aac96667a49df963edc8384038b0859d689ab4377e74ac7f45086010c732.exe schtasks.exe PID 908 wrote to memory of 824 908 2ee6aac96667a49df963edc8384038b0859d689ab4377e74ac7f45086010c732.exe schtasks.exe PID 908 wrote to memory of 824 908 2ee6aac96667a49df963edc8384038b0859d689ab4377e74ac7f45086010c732.exe schtasks.exe PID 908 wrote to memory of 824 908 2ee6aac96667a49df963edc8384038b0859d689ab4377e74ac7f45086010c732.exe schtasks.exe PID 908 wrote to memory of 364 908 2ee6aac96667a49df963edc8384038b0859d689ab4377e74ac7f45086010c732.exe 2ee6aac96667a49df963edc8384038b0859d689ab4377e74ac7f45086010c732.exe PID 908 wrote to memory of 364 908 2ee6aac96667a49df963edc8384038b0859d689ab4377e74ac7f45086010c732.exe 2ee6aac96667a49df963edc8384038b0859d689ab4377e74ac7f45086010c732.exe PID 908 wrote to memory of 364 908 2ee6aac96667a49df963edc8384038b0859d689ab4377e74ac7f45086010c732.exe 2ee6aac96667a49df963edc8384038b0859d689ab4377e74ac7f45086010c732.exe PID 908 wrote to memory of 364 908 2ee6aac96667a49df963edc8384038b0859d689ab4377e74ac7f45086010c732.exe 2ee6aac96667a49df963edc8384038b0859d689ab4377e74ac7f45086010c732.exe PID 908 wrote to memory of 364 908 2ee6aac96667a49df963edc8384038b0859d689ab4377e74ac7f45086010c732.exe 2ee6aac96667a49df963edc8384038b0859d689ab4377e74ac7f45086010c732.exe PID 908 wrote to memory of 364 908 2ee6aac96667a49df963edc8384038b0859d689ab4377e74ac7f45086010c732.exe 2ee6aac96667a49df963edc8384038b0859d689ab4377e74ac7f45086010c732.exe PID 908 wrote to memory of 364 908 2ee6aac96667a49df963edc8384038b0859d689ab4377e74ac7f45086010c732.exe 2ee6aac96667a49df963edc8384038b0859d689ab4377e74ac7f45086010c732.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ee6aac96667a49df963edc8384038b0859d689ab4377e74ac7f45086010c732.exe"C:\Users\Admin\AppData\Local\Temp\2ee6aac96667a49df963edc8384038b0859d689ab4377e74ac7f45086010c732.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\2ee6aac96667a49df963edc8384038b0859d689ab4377e74ac7f45086010c732.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:568 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\mcTvsw.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1964 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\mcTvsw" /XML "C:\Users\Admin\AppData\Local\Temp\tmpEC14.tmp"2⤵
- Creates scheduled task(s)
PID:824 -
C:\Users\Admin\AppData\Local\Temp\2ee6aac96667a49df963edc8384038b0859d689ab4377e74ac7f45086010c732.exe"C:\Users\Admin\AppData\Local\Temp\2ee6aac96667a49df963edc8384038b0859d689ab4377e74ac7f45086010c732.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:364
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD508ca3f884ba2623e03ad54b9b73c63c2
SHA1308f433aa75a9ba689178a3413f538aa2169d159
SHA256a9a1e9b9526d25db3a178776df2a4cd570027a12861ac36fd7b7d82e51f93ea0
SHA51279b6d96d2b62f3862be02e0ef73220b37efd0181acb4e0ac6ea64ace0896709f0a052a27b5f05595e0f2e902e55d225d9dd253d6e2ef113c8edd674d2f20718a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\T5ZMDY1UI0R7MH1ANXVZ.temp
Filesize7KB
MD5ce08c6954497d37dfe616c7228e3ed97
SHA1fd7c905c11e2d62dddba4ac44a3c1222474f2d8f
SHA2563e1a0cf1e2844476b63fad0c97ad996218e422f0d232f3ba55451bd6db12a5a2
SHA512870a22fb6e937ecdac9694e1ab6f8210e8376b2b5500b0c0ff2eb2e224273009f4907d9efeebc3eeba615bf58f27c919f34e187437b4f4dbad104aed794b2be5
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5ce08c6954497d37dfe616c7228e3ed97
SHA1fd7c905c11e2d62dddba4ac44a3c1222474f2d8f
SHA2563e1a0cf1e2844476b63fad0c97ad996218e422f0d232f3ba55451bd6db12a5a2
SHA512870a22fb6e937ecdac9694e1ab6f8210e8376b2b5500b0c0ff2eb2e224273009f4907d9efeebc3eeba615bf58f27c919f34e187437b4f4dbad104aed794b2be5