Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
18/05/2023, 01:56
Static task
static1
Behavioral task
behavioral1
Sample
roro0031.exe
Resource
win7-20230220-en
General
-
Target
roro0031.exe
-
Size
237KB
-
MD5
789ffc3fb85f6fcc0fac74b1bf9da5ab
-
SHA1
feedb638a90d022693df2c4c38840763ae8174f9
-
SHA256
8ad73d8062a6715edf2a53572bc01a3a7e07afe8ab4c8c5d39db6e9ede73b7d0
-
SHA512
a96eb299ab7321396a7eff9c2e21cc9462110b6f4bdfe98b6e08e4a7eac9d1bd11c2d9acbf7d7717e376980ffe0eb0016beb3b6e625c21f0c9dfe099953c65d3
-
SSDEEP
3072:HfY/TU9fE9PEtuHbD3GG60AWl32YOR9czoSNNpjjsmcaC6jU746jr4+DoStvxQxA:/Ya6Rz3OQOR9cpep4R4oStSI8s2rpSZJ
Malware Config
Extracted
formbook
4.1
re29
barnstorm-music.com
gazzettadellapuglia.com
baratieistore.space
cdrjdkj.com
carlissablog.com
langlalang.com
2886365.com
aq993.cyou
jwjwjwjw.com
car-deals-80304.com
dikevolesas.info
buycialistablets.online
theplantgranny.net
detoxshopbr.store
imans.biz
fightingcock.co.uk
loveforfurbabies.com
eastcoastbeveragegroup.com
alaaeldinsoft.com
microshel.com
deal-markt.com
hypothetical.systems
baxhakutrade.com
chiehhsikaoportfolio.com
brandsmania.net
follred.com
6566x14.app
defi88.com
h-skyseo.com
imagina-onshop.com
bambooleavescompany.com
cmojohnny.com
1whxgd.top
infernaljournal.app
kk156.net
chokolatk.com
guoshan-0800777216.com
funparty.rsvp
helenfallon.com
digitalmagazine.online
idealcutandtrim.com
bricoitalia.net
ecwid-store-copy.net
iljamusic.com
uvcon.africa
hoodiesupplycol.com
iilykt.top
continuousvoltage.com
josephajaogo.africa
baba-robot.ru
1wsfcg.top
hagfiw.xyz
firstcitizncb.com
calamitouscrochet.shop
829727.com
eleonorasdaycare.com
lafourmiprovencal.ch
corollacompany.africa
acorsgroup.com
jabberglotty.com
akhlit.com
kompetenceboersen.online
fxtcb8.site
whetegeneralprojects.africa
senriki.net
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral1/memory/1916-69-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1916-73-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1484-79-0x0000000000080000-0x00000000000AF000-memory.dmp formbook behavioral1/memory/1484-81-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Executes dropped EXE 2 IoCs
pid Process 1552 msufmq.exe 1916 msufmq.exe -
Loads dropped DLL 3 IoCs
pid Process 1676 roro0031.exe 1676 roro0031.exe 1552 msufmq.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1552 set thread context of 1916 1552 msufmq.exe 29 PID 1916 set thread context of 1208 1916 msufmq.exe 12 PID 1484 set thread context of 1208 1484 ipconfig.exe 12 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 1484 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 1916 msufmq.exe 1916 msufmq.exe 1484 ipconfig.exe 1484 ipconfig.exe 1484 ipconfig.exe 1484 ipconfig.exe 1484 ipconfig.exe 1484 ipconfig.exe 1484 ipconfig.exe 1484 ipconfig.exe 1484 ipconfig.exe 1484 ipconfig.exe 1484 ipconfig.exe 1484 ipconfig.exe 1484 ipconfig.exe 1484 ipconfig.exe 1484 ipconfig.exe 1484 ipconfig.exe 1484 ipconfig.exe 1484 ipconfig.exe 1484 ipconfig.exe 1484 ipconfig.exe 1484 ipconfig.exe 1484 ipconfig.exe 1484 ipconfig.exe 1484 ipconfig.exe 1484 ipconfig.exe 1484 ipconfig.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1208 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 1552 msufmq.exe 1916 msufmq.exe 1916 msufmq.exe 1916 msufmq.exe 1484 ipconfig.exe 1484 ipconfig.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1916 msufmq.exe Token: SeDebugPrivilege 1484 ipconfig.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1208 Explorer.EXE 1208 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1208 Explorer.EXE 1208 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1208 Explorer.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1676 wrote to memory of 1552 1676 roro0031.exe 28 PID 1676 wrote to memory of 1552 1676 roro0031.exe 28 PID 1676 wrote to memory of 1552 1676 roro0031.exe 28 PID 1676 wrote to memory of 1552 1676 roro0031.exe 28 PID 1552 wrote to memory of 1916 1552 msufmq.exe 29 PID 1552 wrote to memory of 1916 1552 msufmq.exe 29 PID 1552 wrote to memory of 1916 1552 msufmq.exe 29 PID 1552 wrote to memory of 1916 1552 msufmq.exe 29 PID 1552 wrote to memory of 1916 1552 msufmq.exe 29 PID 1208 wrote to memory of 1484 1208 Explorer.EXE 30 PID 1208 wrote to memory of 1484 1208 Explorer.EXE 30 PID 1208 wrote to memory of 1484 1208 Explorer.EXE 30 PID 1208 wrote to memory of 1484 1208 Explorer.EXE 30 PID 1484 wrote to memory of 1156 1484 ipconfig.exe 31 PID 1484 wrote to memory of 1156 1484 ipconfig.exe 31 PID 1484 wrote to memory of 1156 1484 ipconfig.exe 31 PID 1484 wrote to memory of 1156 1484 ipconfig.exe 31
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\roro0031.exe"C:\Users\Admin\AppData\Local\Temp\roro0031.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\msufmq.exe"C:\Users\Admin\AppData\Local\Temp\msufmq.exe" C:\Users\Admin\AppData\Local\Temp\miwtr.u3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\msufmq.exe"C:\Users\Admin\AppData\Local\Temp\msufmq.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1916
-
-
-
-
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\SysWOW64\ipconfig.exe"2⤵
- Suspicious use of SetThreadContext
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\msufmq.exe"3⤵PID:1156
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
205KB
MD57b7fa8b25ab41485aad9b22339a6d6ce
SHA1707d5429c4da6b2f6aee75012e7c6bd466676cde
SHA2566b9603e9ae60fc2368226045791c3bddb3b4ba754acd1f4cb1c3c9162d37b601
SHA512c30732ca740c35ee9bea86abdaee99381ba2d5710d2f2427d8d324c1c59e7d7b4cabc2fc85d83a163d5b0f32e836dd619d93953af7253e31874c4a2262ab2608
-
Filesize
5KB
MD582ad422e7d98bd6334aaa75243ce2bde
SHA1b7a7c0f2264b404949f0ed6b672e03b8406dadea
SHA256244dcc77099b2d501b391ef98d3ee14492c08a47d034536e12c777e4fa125f04
SHA512ffa1b075ec4b4b65c10a0188c96f1a83fd8a58dd5a8ce1d672f780e1b7d0dcc721a55281d038e21fac6c6ef2e37bfbef30402e42945ce3aebbbaeffd82a139f1
-
Filesize
8KB
MD5263ebaada6dbd201640fa03cd9dabeba
SHA12d129cb2bda6a09c83c6222f9cca0daa4e135d80
SHA256d99e4e6ecb142f1ad93a8001def10ec59d23a5881dcef372b2340c7e8256746a
SHA512c082867b241ec784caa570142912bc40a10ea7c6333fece88163c96af01253bdbe75e9c3dc5ac38d6859747ce8404dfb804d80d3cc815be418b37bedb78f2dc4
-
Filesize
8KB
MD5263ebaada6dbd201640fa03cd9dabeba
SHA12d129cb2bda6a09c83c6222f9cca0daa4e135d80
SHA256d99e4e6ecb142f1ad93a8001def10ec59d23a5881dcef372b2340c7e8256746a
SHA512c082867b241ec784caa570142912bc40a10ea7c6333fece88163c96af01253bdbe75e9c3dc5ac38d6859747ce8404dfb804d80d3cc815be418b37bedb78f2dc4
-
Filesize
8KB
MD5263ebaada6dbd201640fa03cd9dabeba
SHA12d129cb2bda6a09c83c6222f9cca0daa4e135d80
SHA256d99e4e6ecb142f1ad93a8001def10ec59d23a5881dcef372b2340c7e8256746a
SHA512c082867b241ec784caa570142912bc40a10ea7c6333fece88163c96af01253bdbe75e9c3dc5ac38d6859747ce8404dfb804d80d3cc815be418b37bedb78f2dc4
-
Filesize
8KB
MD5263ebaada6dbd201640fa03cd9dabeba
SHA12d129cb2bda6a09c83c6222f9cca0daa4e135d80
SHA256d99e4e6ecb142f1ad93a8001def10ec59d23a5881dcef372b2340c7e8256746a
SHA512c082867b241ec784caa570142912bc40a10ea7c6333fece88163c96af01253bdbe75e9c3dc5ac38d6859747ce8404dfb804d80d3cc815be418b37bedb78f2dc4
-
Filesize
8KB
MD5263ebaada6dbd201640fa03cd9dabeba
SHA12d129cb2bda6a09c83c6222f9cca0daa4e135d80
SHA256d99e4e6ecb142f1ad93a8001def10ec59d23a5881dcef372b2340c7e8256746a
SHA512c082867b241ec784caa570142912bc40a10ea7c6333fece88163c96af01253bdbe75e9c3dc5ac38d6859747ce8404dfb804d80d3cc815be418b37bedb78f2dc4
-
Filesize
8KB
MD5263ebaada6dbd201640fa03cd9dabeba
SHA12d129cb2bda6a09c83c6222f9cca0daa4e135d80
SHA256d99e4e6ecb142f1ad93a8001def10ec59d23a5881dcef372b2340c7e8256746a
SHA512c082867b241ec784caa570142912bc40a10ea7c6333fece88163c96af01253bdbe75e9c3dc5ac38d6859747ce8404dfb804d80d3cc815be418b37bedb78f2dc4
-
Filesize
8KB
MD5263ebaada6dbd201640fa03cd9dabeba
SHA12d129cb2bda6a09c83c6222f9cca0daa4e135d80
SHA256d99e4e6ecb142f1ad93a8001def10ec59d23a5881dcef372b2340c7e8256746a
SHA512c082867b241ec784caa570142912bc40a10ea7c6333fece88163c96af01253bdbe75e9c3dc5ac38d6859747ce8404dfb804d80d3cc815be418b37bedb78f2dc4