Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2023, 05:30
Static task
static1
Behavioral task
behavioral1
Sample
E-dekont.exe
Resource
win7-20230220-en
General
-
Target
E-dekont.exe
-
Size
286KB
-
MD5
7f453b503f828a474ca684b065498d01
-
SHA1
b82a91e97e1c0a23b993db56f9f6049a96580b34
-
SHA256
7cdb9e0fde39ad1578dbd905a88c8b6492a608349c0fed0c79879f5a086108e9
-
SHA512
167c0afb30cd84f7a2980f1713012f5722b00a642977cb1c7d6f353698a8d74c11cfb367585d1a93b3ff4defee526017d71240bb1331baaf2169062e258f73a3
-
SSDEEP
6144:hT5Uzm0s9s3LWwHCZwX+A6UXqc0LrWK5OcraEUq2YWPOjJlaq8+:hT55Ns3LNi+uAz6c0LrWSaxHmX8+
Malware Config
Extracted
formbook
4.1
be83
woodlandscancercare.org.uk
hosting-delightful.lol
bilpreco.com
diplomk-v-habarovske.com
dzgck.com
jsdappraisals.com
digitalnishant.com
bluevibesgift.com
wowchershoo.co.uk
eudoriaofficial.online
ourcampaign2024.net
barlogcode.com
calmingscents.biz
thewaterfallproject.africa
www-1911.com
cigapp.online
wooddroppers.africa
casmiya.com
haruminailbar.com
drivermindset.com
kittysew.com
codinformer.com
carextra247.co.uk
hackldesign.com
jollyshopping.shop
ibufalari.com
cloudcapgear.com
afro.fitness
liverightseniorcareinc.com
imetmyselfinyou.com
easy-exchange.net
crowesnestvenue.com
bigszeieveryone.com
excavatorsmachines.com
39gaokk.com
cedarcreekmartinsville.com
lcllog.com
buylikeking.com
ag1elite.com
burnoutstudio.co.uk
aldafiq.com
foxdamold.com
doanses2022.click
bellanight.net
mouhc.online
carlosarenas.online
datifybase.com
allinahealthaetna.rsvp
alanmockler.com
jeevesalarm.com
fixmaster.africa
goxoasantander.com
austinmotorvillage.net
homespreadmechanics.com
irvinedigitalrealty.com
lacigalerouge.com
bjhybaobiao.com
channamphat.com
hotelmalabarresort.com
honstarnet.com
3dseal.online
heureka-health.ch
efefwonder.buzz
migswelders.com
777584.com
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/3840-160-0x0000000000400000-0x0000000001654000-memory.dmp formbook behavioral2/memory/3840-165-0x0000000000400000-0x0000000001654000-memory.dmp formbook behavioral2/memory/4236-171-0x0000000000E00000-0x0000000000E2F000-memory.dmp formbook behavioral2/memory/4236-173-0x0000000000E00000-0x0000000000E2F000-memory.dmp formbook -
Checks QEMU agent file 2 TTPs 2 IoCs
Checks presence of QEMU agent, possibly to detect virtualization.
description ioc Process File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe E-dekont.exe File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe E-dekont.exe -
Loads dropped DLL 1 IoCs
pid Process 3100 E-dekont.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Nonreprehensibly.Ber E-dekont.exe File opened for modification C:\Windows\SysWOW64\Agaver\Ngtelsers.ini E-dekont.exe File opened for modification C:\Windows\SysWOW64\Tilkmpendes\Saxofonen.ini E-dekont.exe File opened for modification C:\Windows\SysWOW64\Kbelyst\Intraselection\Strbemrkning23\Arcadianly.Blo132 E-dekont.exe File opened for modification C:\Windows\SysWOW64\Weeds\Vederstyggeligste211\Dybgang.Aur E-dekont.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 3840 E-dekont.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3100 E-dekont.exe 3840 E-dekont.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3100 set thread context of 3840 3100 E-dekont.exe 92 PID 3840 set thread context of 756 3840 E-dekont.exe 49 PID 4236 set thread context of 756 4236 raserver.exe 49 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Fonts\Underdrain\skatteskemaers\Shodden\Kartonnagefabrikken.lnk E-dekont.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 3840 E-dekont.exe 3840 E-dekont.exe 3840 E-dekont.exe 3840 E-dekont.exe 4236 raserver.exe 4236 raserver.exe 4236 raserver.exe 4236 raserver.exe 4236 raserver.exe 4236 raserver.exe 4236 raserver.exe 4236 raserver.exe 4236 raserver.exe 4236 raserver.exe 4236 raserver.exe 4236 raserver.exe 4236 raserver.exe 4236 raserver.exe 4236 raserver.exe 4236 raserver.exe 4236 raserver.exe 4236 raserver.exe 4236 raserver.exe 4236 raserver.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 756 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 3100 E-dekont.exe 3840 E-dekont.exe 3840 E-dekont.exe 3840 E-dekont.exe 4236 raserver.exe 4236 raserver.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3840 E-dekont.exe Token: SeDebugPrivilege 4236 raserver.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3100 wrote to memory of 3840 3100 E-dekont.exe 92 PID 3100 wrote to memory of 3840 3100 E-dekont.exe 92 PID 3100 wrote to memory of 3840 3100 E-dekont.exe 92 PID 3100 wrote to memory of 3840 3100 E-dekont.exe 92 PID 756 wrote to memory of 4236 756 Explorer.EXE 95 PID 756 wrote to memory of 4236 756 Explorer.EXE 95 PID 756 wrote to memory of 4236 756 Explorer.EXE 95 PID 4236 wrote to memory of 1824 4236 raserver.exe 96 PID 4236 wrote to memory of 1824 4236 raserver.exe 96 PID 4236 wrote to memory of 1824 4236 raserver.exe 96
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Users\Admin\AppData\Local\Temp\E-dekont.exe"C:\Users\Admin\AppData\Local\Temp\E-dekont.exe"2⤵
- Checks QEMU agent file
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Users\Admin\AppData\Local\Temp\E-dekont.exe"C:\Users\Admin\AppData\Local\Temp\E-dekont.exe"3⤵
- Checks QEMU agent file
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3840
-
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:3300
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:1804
-
-
C:\Windows\SysWOW64\raserver.exe"C:\Windows\SysWOW64\raserver.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\E-dekont.exe"3⤵PID:1824
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD5d968cb2b98b83c03a9f02dd9b8df97dc
SHA1d784c9b7a92dce58a5038beb62a48ff509e166a0
SHA256a4ec98011ef99e595912718c1a1bf1aa67bfc2192575729d42f559d01f67b95c
SHA5122ee41dc68f329a1519a8073ece7d746c9f3bf45d8ef3b915deb376af37e26074134af5f83c8af0fe0ab227f0d1acca9f37e5ca7ae37c46c3bcc0331fe5e2b97e
-
Filesize
31B
MD53000f7f0f12b7139ea28160c52098e25
SHA19d032395f38d341881019b996e591160d542054b
SHA256467b09ff26622746d205628ae325ec9838461bc5fe741b3757bb39ddec87ecb1
SHA512a76a2f1e3686e2ffd03388ec7dbcd4afa6ae53ccd3aa40c6fbbf0c994eee5e2685d0c412f15ec4506c1175f5a84712e1a8b7ae32e6a0327e1ba47321a59e0ee2