Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
30/03/2023, 01:40
Static task
static1
Behavioral task
behavioral1
Sample
29cabc4d11ff9dc55301ff8d60eb06d1e1ec9c2509910ceda522e84ab4e240f8.exe
Resource
win7-20230220-en
General
-
Target
29cabc4d11ff9dc55301ff8d60eb06d1e1ec9c2509910ceda522e84ab4e240f8.exe
-
Size
294KB
-
MD5
9a28fed41f2ac3aff59ffdde4a752434
-
SHA1
08c829e972d92ff9d6386c25014dcda629165ecf
-
SHA256
29cabc4d11ff9dc55301ff8d60eb06d1e1ec9c2509910ceda522e84ab4e240f8
-
SHA512
b602bc23d493432093d80a75812d41543f77aea591ee68472bdc7f5e9f4a867989ab09b8cd775ddae2e73585bf776c1358c70fb6aca78388c6729b56ce9e8b40
-
SSDEEP
6144:/Ya6uP3tS22mHJp2HJpuK9dw4ax7C+nfZu5tCt4J4p5yXc/DOaK:/YY/tS2xUqKc4al3ns5ktS44YqaK
Malware Config
Extracted
formbook
4.1
ke03
fastartcustom.com
ikanggabus.xyz
aevum.ru
lacarretapps.com
arcaneacquisitions.net
fuulyshop.com
bloodbahis278.com
bullardrvpark.com
cowboy-hostel.xyz
empireoba.com
the-windsor-h.africa
help-desk-td.com
dofirosols.life
efefarmy.buzz
kewwrf.top
autoran.co.uk
moodysanalytics.boo
kulturemarket.com
ffwpu-kenya.com
heykon.com
blueskyauberge.com
hiroseringyou.com
capitolau.com
apiverity.com
ashcroftbathco.co.uk
khalifa-dubai.com
emailstodollars.com
efeffluttering.buzz
digitapursuit.com
baburg.com
betterworldmarketing.shop
kopaczynska.com
damonandlovell.com
jingchuangroup.com
duodianji.com
shengguangxinxi.com
lifestylemotoring.co.uk
bartoncourt.org.uk
girldatefy.com
conradrawford.click
nextratedmusic.africa
jehucapital.com
aceproductions.net
almasrd.com
complstein.com
cb5dj.com
glifingcr.com
beatsbyche.com
bejaiasoisobservateur.com
lqdwqy.top
frykuv.xyz
huxiaotangtattoo.com
installinverter.africa
credeo.uk
ciaottanperu.com
ilovemeta.vip
hpid.co.uk
67812.vet
avs-omsk.online
starshiptroopers.net
cryptoplaza.app
lingshiol.com
honorglasspackaging.com
cannabismapsny.com
bakkenmetkinderen.com
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/1448-142-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/1448-147-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/1148-155-0x0000000000C10000-0x0000000000C3F000-memory.dmp formbook behavioral2/memory/1148-156-0x0000000000C10000-0x0000000000C3F000-memory.dmp formbook -
Executes dropped EXE 2 IoCs
pid Process 2384 mytnrk.exe 1448 mytnrk.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2384 set thread context of 1448 2384 mytnrk.exe 86 PID 1448 set thread context of 2704 1448 mytnrk.exe 32 PID 1148 set thread context of 2704 1148 cmstp.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 1448 mytnrk.exe 1448 mytnrk.exe 1448 mytnrk.exe 1448 mytnrk.exe 1148 cmstp.exe 1148 cmstp.exe 1148 cmstp.exe 1148 cmstp.exe 1148 cmstp.exe 1148 cmstp.exe 1148 cmstp.exe 1148 cmstp.exe 1148 cmstp.exe 1148 cmstp.exe 1148 cmstp.exe 1148 cmstp.exe 1148 cmstp.exe 1148 cmstp.exe 1148 cmstp.exe 1148 cmstp.exe 1148 cmstp.exe 1148 cmstp.exe 1148 cmstp.exe 1148 cmstp.exe 1148 cmstp.exe 1148 cmstp.exe 1148 cmstp.exe 1148 cmstp.exe 1148 cmstp.exe 1148 cmstp.exe 1148 cmstp.exe 1148 cmstp.exe 1148 cmstp.exe 1148 cmstp.exe 1148 cmstp.exe 1148 cmstp.exe 1148 cmstp.exe 1148 cmstp.exe 1148 cmstp.exe 1148 cmstp.exe 1148 cmstp.exe 1148 cmstp.exe 1148 cmstp.exe 1148 cmstp.exe 1148 cmstp.exe 1148 cmstp.exe 1148 cmstp.exe 1148 cmstp.exe 1148 cmstp.exe 1148 cmstp.exe 1148 cmstp.exe 1148 cmstp.exe 1148 cmstp.exe 1148 cmstp.exe 1148 cmstp.exe 1148 cmstp.exe 1148 cmstp.exe 1148 cmstp.exe 1148 cmstp.exe 1148 cmstp.exe 1148 cmstp.exe 1148 cmstp.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2704 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2384 mytnrk.exe 1448 mytnrk.exe 1448 mytnrk.exe 1448 mytnrk.exe 1148 cmstp.exe 1148 cmstp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1448 mytnrk.exe Token: SeDebugPrivilege 1148 cmstp.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1796 wrote to memory of 2384 1796 29cabc4d11ff9dc55301ff8d60eb06d1e1ec9c2509910ceda522e84ab4e240f8.exe 84 PID 1796 wrote to memory of 2384 1796 29cabc4d11ff9dc55301ff8d60eb06d1e1ec9c2509910ceda522e84ab4e240f8.exe 84 PID 1796 wrote to memory of 2384 1796 29cabc4d11ff9dc55301ff8d60eb06d1e1ec9c2509910ceda522e84ab4e240f8.exe 84 PID 2384 wrote to memory of 1448 2384 mytnrk.exe 86 PID 2384 wrote to memory of 1448 2384 mytnrk.exe 86 PID 2384 wrote to memory of 1448 2384 mytnrk.exe 86 PID 2384 wrote to memory of 1448 2384 mytnrk.exe 86 PID 2704 wrote to memory of 1148 2704 Explorer.EXE 87 PID 2704 wrote to memory of 1148 2704 Explorer.EXE 87 PID 2704 wrote to memory of 1148 2704 Explorer.EXE 87 PID 1148 wrote to memory of 224 1148 cmstp.exe 91 PID 1148 wrote to memory of 224 1148 cmstp.exe 91 PID 1148 wrote to memory of 224 1148 cmstp.exe 91
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\29cabc4d11ff9dc55301ff8d60eb06d1e1ec9c2509910ceda522e84ab4e240f8.exe"C:\Users\Admin\AppData\Local\Temp\29cabc4d11ff9dc55301ff8d60eb06d1e1ec9c2509910ceda522e84ab4e240f8.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Users\Admin\AppData\Local\Temp\mytnrk.exe"C:\Users\Admin\AppData\Local\Temp\mytnrk.exe" C:\Users\Admin\AppData\Local\Temp\glfpuulw.z3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\mytnrk.exe"C:\Users\Admin\AppData\Local\Temp\mytnrk.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1448
-
-
-
-
C:\Windows\SysWOW64\cmstp.exe"C:\Windows\SysWOW64\cmstp.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\mytnrk.exe"3⤵PID:224
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD52ee419dc53f08be430810aaa0510ea8e
SHA154bcf8ea219d741e4121bfca103c6ae5060c228c
SHA25612db54564a97c4b88d5ca583f472892b964e8ac8db7b23de39425e8752693fe3
SHA51200ac999faae8edcfe9a1ed0c4fb6a7fdb13ac243e37f6ebc6a747344d410625f506006783ba6bcb90e1232f17fccfb1847588bc14c012c5f26edd59249da2767
-
Filesize
205KB
MD5da6e42ef3c53e014f423714ad8062380
SHA12a4f9831e2263548cbc98c47246d39a58c090bf1
SHA2560dfe99276cb678876076233c14e3379591680439933df1173c44be632c8beb4a
SHA512d7ebefbd80d20d7a7a1d3841b1be025b3dc0e0ebcbee29cb3cc76c5024d116f2f435eb89f54dd40f27340c270a8f83fb51246cf7313a151d05d555b7b045513a
-
Filesize
147KB
MD5b545eeb0fc5312fa44c44656405c4650
SHA1b4d549feb61e5584f304ec0c80c07de240824663
SHA2562b31311b62da5ef612b3c8060456914fb0e23e095a79ad21b0c9e05569016910
SHA512f5682d6c5aca028d12765680d9ef0d0579d69b87ff3dbd16d6c50e4a04d696d65db6073c3c51b5212c0c67ec2903fbcb47f52f6dd51841a89015da4350ef11d8
-
Filesize
147KB
MD5b545eeb0fc5312fa44c44656405c4650
SHA1b4d549feb61e5584f304ec0c80c07de240824663
SHA2562b31311b62da5ef612b3c8060456914fb0e23e095a79ad21b0c9e05569016910
SHA512f5682d6c5aca028d12765680d9ef0d0579d69b87ff3dbd16d6c50e4a04d696d65db6073c3c51b5212c0c67ec2903fbcb47f52f6dd51841a89015da4350ef11d8
-
Filesize
147KB
MD5b545eeb0fc5312fa44c44656405c4650
SHA1b4d549feb61e5584f304ec0c80c07de240824663
SHA2562b31311b62da5ef612b3c8060456914fb0e23e095a79ad21b0c9e05569016910
SHA512f5682d6c5aca028d12765680d9ef0d0579d69b87ff3dbd16d6c50e4a04d696d65db6073c3c51b5212c0c67ec2903fbcb47f52f6dd51841a89015da4350ef11d8