Analysis
-
max time kernel
148s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05-04-2023 13:16
Static task
static1
Behavioral task
behavioral1
Sample
813a7be3fa8ab0b17f948d72a113a29b.exe
Resource
win7-20230220-en
General
-
Target
813a7be3fa8ab0b17f948d72a113a29b.exe
-
Size
354KB
-
MD5
813a7be3fa8ab0b17f948d72a113a29b
-
SHA1
e1358bfd4233eacb9edd86b8d2189c06d25119e1
-
SHA256
7cfe9185c121eeb52ee3f946c6773e9779d64a4860bd34efb3adf55485dedace
-
SHA512
ac7f117eef90f51e6973cc0db2f31abb089a24c25a027771180559d0e2d6577cd7a3b7553311f673614d4d0c43d7fc77aa8cbb2e62d9c30eb28e243234d00db0
-
SSDEEP
6144:/Ya6eJV6XVBQkWePa7WcsJcG93Ow7UmWaPpwTDDvQ8mVlisMlAZSl:/YAJVPkWDps+w3OwAmWa6THQHHfMlUSl
Malware Config
Extracted
formbook
4.1
sa79
aidigify.com
angelavamundson.xyz
glicotoday.fun
agencyforbuyers.com
blacklifecoachquiz.com
4e6aqw.site
huawei1990.com
diyetcay.online
chesirechefs.co.uk
generalhospitaleu.africa
hfewha.xyz
lemons2cents.com
rahilprakash.com
kave.tech
netlexfrance.net
youthexsa.africa
car-covers-40809.com
bambooactive.store
fotobugil48.com
kuhler.club
ftyon.xyz
cramyact1.info
finefrenchcaviar.co.uk
158029.xyz
doneswanneeds.com
campanianetwork.online
trade.boo
totaltrace.co.uk
grandgoldrange.africa
oliviahodges04.uk
eckiahe.club
imagebeuty.com
kutxa-incidencias.info
goodnewz.africa
alampsoldes.com
xuanliuchushaqi.com
leaf-spa.net
artblocks.bio
estres0.com
hcoltun.xyz
boostonsquelette.com
bettygrablerm.com
tulipbaddie.com
binosresidence.africa
sunnyola.com
guangxisangna.com
8888m.net
alaamriproducts.com
busy-people-gifts.com
i-sell-fun.com
grandnatali.ru
allstarssport.co.uk
cloud-spartan.co.uk
vitamincbd.africa
winelandsphotography.africa
ndyc.africa
cvbetter.co.uk
bestinvestment-trust.info
lblpackagestore.com
grabacionescaseras.com
fixmypothole.com
combatwash.com
brittnybuttondesign.net
eerieytorrent.com
heguangxueyuan.com
Signatures
-
Formbook payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/472-65-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/472-70-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1884-78-0x0000000000070000-0x000000000009F000-memory.dmp formbook behavioral1/memory/1884-80-0x0000000000070000-0x000000000009F000-memory.dmp formbook -
Executes dropped EXE 2 IoCs
Processes:
sxtur.exesxtur.exepid process 940 sxtur.exe 472 sxtur.exe -
Loads dropped DLL 2 IoCs
Processes:
813a7be3fa8ab0b17f948d72a113a29b.exesxtur.exepid process 1488 813a7be3fa8ab0b17f948d72a113a29b.exe 940 sxtur.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
sxtur.exesxtur.execscript.exedescription pid process target process PID 940 set thread context of 472 940 sxtur.exe sxtur.exe PID 472 set thread context of 1292 472 sxtur.exe Explorer.EXE PID 1884 set thread context of 1292 1884 cscript.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 27 IoCs
Processes:
sxtur.execscript.exepid process 472 sxtur.exe 472 sxtur.exe 1884 cscript.exe 1884 cscript.exe 1884 cscript.exe 1884 cscript.exe 1884 cscript.exe 1884 cscript.exe 1884 cscript.exe 1884 cscript.exe 1884 cscript.exe 1884 cscript.exe 1884 cscript.exe 1884 cscript.exe 1884 cscript.exe 1884 cscript.exe 1884 cscript.exe 1884 cscript.exe 1884 cscript.exe 1884 cscript.exe 1884 cscript.exe 1884 cscript.exe 1884 cscript.exe 1884 cscript.exe 1884 cscript.exe 1884 cscript.exe 1884 cscript.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 1292 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
sxtur.exesxtur.execscript.exepid process 940 sxtur.exe 472 sxtur.exe 472 sxtur.exe 472 sxtur.exe 1884 cscript.exe 1884 cscript.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
sxtur.execscript.exedescription pid process Token: SeDebugPrivilege 472 sxtur.exe Token: SeDebugPrivilege 1884 cscript.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid process 1292 Explorer.EXE 1292 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Explorer.EXEpid process 1292 Explorer.EXE 1292 Explorer.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
813a7be3fa8ab0b17f948d72a113a29b.exesxtur.exeExplorer.EXEcscript.exedescription pid process target process PID 1488 wrote to memory of 940 1488 813a7be3fa8ab0b17f948d72a113a29b.exe sxtur.exe PID 1488 wrote to memory of 940 1488 813a7be3fa8ab0b17f948d72a113a29b.exe sxtur.exe PID 1488 wrote to memory of 940 1488 813a7be3fa8ab0b17f948d72a113a29b.exe sxtur.exe PID 1488 wrote to memory of 940 1488 813a7be3fa8ab0b17f948d72a113a29b.exe sxtur.exe PID 940 wrote to memory of 472 940 sxtur.exe sxtur.exe PID 940 wrote to memory of 472 940 sxtur.exe sxtur.exe PID 940 wrote to memory of 472 940 sxtur.exe sxtur.exe PID 940 wrote to memory of 472 940 sxtur.exe sxtur.exe PID 940 wrote to memory of 472 940 sxtur.exe sxtur.exe PID 1292 wrote to memory of 1884 1292 Explorer.EXE cscript.exe PID 1292 wrote to memory of 1884 1292 Explorer.EXE cscript.exe PID 1292 wrote to memory of 1884 1292 Explorer.EXE cscript.exe PID 1292 wrote to memory of 1884 1292 Explorer.EXE cscript.exe PID 1884 wrote to memory of 1756 1884 cscript.exe cmd.exe PID 1884 wrote to memory of 1756 1884 cscript.exe cmd.exe PID 1884 wrote to memory of 1756 1884 cscript.exe cmd.exe PID 1884 wrote to memory of 1756 1884 cscript.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\813a7be3fa8ab0b17f948d72a113a29b.exe"C:\Users\Admin\AppData\Local\Temp\813a7be3fa8ab0b17f948d72a113a29b.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\sxtur.exe"C:\Users\Admin\AppData\Local\Temp\sxtur.exe" C:\Users\Admin\AppData\Local\Temp\bkbzrok.e3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\sxtur.exe"C:\Users\Admin\AppData\Local\Temp\sxtur.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cscript.exe"C:\Windows\SysWOW64\cscript.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\sxtur.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\bkbzrok.eFilesize
5KB
MD5f2e927e979fd2a40edeae0302ecec08c
SHA1a668c67838605c4b1175321759c7c1b849d76415
SHA256af31445bb4f2e7ae53ec7f3eae9362f3f0f016c27adc6909f219342da05a1614
SHA512dea78adcb81e29f3db7428b3652f623bfef3327dc0a186441f07c7b3a4be0c80c130e85e04fe2bace5cd746e94160b213660ba3341c00097d4714c531ae2d9a7
-
C:\Users\Admin\AppData\Local\Temp\sxtur.exeFilesize
284KB
MD50ed509e2adbb9012d9f4fe787bff8676
SHA169d50c8a20ae5c4c1a035dd36657c2141b4f754c
SHA2560cdb9859d9c9493ffc74e3b33ad4fe2cb6e3506460b1a24f5d2fdb4e8b0a841d
SHA512b188e985c0f3b5d435fe4bd1516f853341e979e6106b0b9e1a96fa22dce858027d938104c100a452d63c5f8924f626a0ec73cec6f064a3218db0ae144cf6bd03
-
C:\Users\Admin\AppData\Local\Temp\sxtur.exeFilesize
284KB
MD50ed509e2adbb9012d9f4fe787bff8676
SHA169d50c8a20ae5c4c1a035dd36657c2141b4f754c
SHA2560cdb9859d9c9493ffc74e3b33ad4fe2cb6e3506460b1a24f5d2fdb4e8b0a841d
SHA512b188e985c0f3b5d435fe4bd1516f853341e979e6106b0b9e1a96fa22dce858027d938104c100a452d63c5f8924f626a0ec73cec6f064a3218db0ae144cf6bd03
-
C:\Users\Admin\AppData\Local\Temp\sxtur.exeFilesize
284KB
MD50ed509e2adbb9012d9f4fe787bff8676
SHA169d50c8a20ae5c4c1a035dd36657c2141b4f754c
SHA2560cdb9859d9c9493ffc74e3b33ad4fe2cb6e3506460b1a24f5d2fdb4e8b0a841d
SHA512b188e985c0f3b5d435fe4bd1516f853341e979e6106b0b9e1a96fa22dce858027d938104c100a452d63c5f8924f626a0ec73cec6f064a3218db0ae144cf6bd03
-
C:\Users\Admin\AppData\Local\Temp\xrxmv.sFilesize
205KB
MD5f937bb46c48dd2a7c7ed33bc685e80f0
SHA1206902e0631bb128111efe674a801c95e1b1cdb5
SHA2566b92a11204eeffd8d0b4c81636da1b82fba55b41b689cb07cb9089c260d8c2eb
SHA5121125ac12481ab7afb70e5a6cdfe09f3c83e80b5fc1ebace33e65bab9ba69afaa6cfb82d9f64381d8a172d783f97daf4fb6bd5f597130abf45f2fd9b6cb2ae1ec
-
\Users\Admin\AppData\Local\Temp\sxtur.exeFilesize
284KB
MD50ed509e2adbb9012d9f4fe787bff8676
SHA169d50c8a20ae5c4c1a035dd36657c2141b4f754c
SHA2560cdb9859d9c9493ffc74e3b33ad4fe2cb6e3506460b1a24f5d2fdb4e8b0a841d
SHA512b188e985c0f3b5d435fe4bd1516f853341e979e6106b0b9e1a96fa22dce858027d938104c100a452d63c5f8924f626a0ec73cec6f064a3218db0ae144cf6bd03
-
\Users\Admin\AppData\Local\Temp\sxtur.exeFilesize
284KB
MD50ed509e2adbb9012d9f4fe787bff8676
SHA169d50c8a20ae5c4c1a035dd36657c2141b4f754c
SHA2560cdb9859d9c9493ffc74e3b33ad4fe2cb6e3506460b1a24f5d2fdb4e8b0a841d
SHA512b188e985c0f3b5d435fe4bd1516f853341e979e6106b0b9e1a96fa22dce858027d938104c100a452d63c5f8924f626a0ec73cec6f064a3218db0ae144cf6bd03
-
memory/472-71-0x00000000008E0000-0x0000000000BE3000-memory.dmpFilesize
3.0MB
-
memory/472-70-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/472-65-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/472-72-0x0000000000340000-0x0000000000354000-memory.dmpFilesize
80KB
-
memory/1292-84-0x0000000006520000-0x00000000065E7000-memory.dmpFilesize
796KB
-
memory/1292-73-0x00000000063B0000-0x000000000651D000-memory.dmpFilesize
1.4MB
-
memory/1292-92-0x000007FF07910000-0x000007FF0791A000-memory.dmpFilesize
40KB
-
memory/1292-69-0x0000000002E30000-0x0000000002F30000-memory.dmpFilesize
1024KB
-
memory/1292-88-0x0000000006520000-0x00000000065E7000-memory.dmpFilesize
796KB
-
memory/1292-85-0x0000000006520000-0x00000000065E7000-memory.dmpFilesize
796KB
-
memory/1884-77-0x0000000000D40000-0x0000000000D62000-memory.dmpFilesize
136KB
-
memory/1884-83-0x0000000000A50000-0x0000000000AE3000-memory.dmpFilesize
588KB
-
memory/1884-80-0x0000000000070000-0x000000000009F000-memory.dmpFilesize
188KB
-
memory/1884-78-0x0000000000070000-0x000000000009F000-memory.dmpFilesize
188KB
-
memory/1884-79-0x0000000002170000-0x0000000002473000-memory.dmpFilesize
3.0MB
-
memory/1884-74-0x0000000000D40000-0x0000000000D62000-memory.dmpFilesize
136KB