Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
11-05-2021 10:30
Static task
static1
Behavioral task
behavioral1
Sample
Materialliste für Angebot.exe
Resource
win7v20210410
General
-
Target
Materialliste für Angebot.exe
-
Size
928KB
-
MD5
b4aba542c1d33eb248781de4ea91b3bc
-
SHA1
030778f8206c86a1e079958bf02a0747817c89f1
-
SHA256
fed5d1810dc0b8de09e6171fe452981207cf0464d9a6dcd114a1fe9e2c1759ad
-
SHA512
ba5b8d82ed08d1719cabd232e716080d6e72f8743a7c74e8d09386360c3d22db9c1849c112e2d612d2aabf40aa2d210dc47f06ecd35457ce6e6fe687d7d18f7e
Malware Config
Extracted
formbook
4.1
http://www.tazmgloli.icu/mbg/
rouskysnanofiltrem.com
netsoftex.website
ap-hardware.com
michaelroselman.com
thegentlefamily.com
merzberg.com
mhteam.club
universallypc.com
xn--bm4bzth4kbok9nc.com
torontogreekevents.com
atlirmarisa.com
coludelegance.com
hooksandhounds.com
bobbymartz.com
empresseventsco.com
littlespinkco.com
kstilo.com
guestemails.com
thespiritoftheviking.com
haveyoueverseenawhale.com
atlantaprostatedr.com
cosmiccrime.com
chaytel.com
thismindinmotion.com
ad-amazon.com
covidsurvivorsfoundations.com
dannysgroceries.com
inc-paqette-post.com
pipastudiohn.com
erwan-faure.net
heiqfabric.com
bellaveyah.com
audiodelphia.com
ivsmerlinmachine.co.uk
sundaybeastcreative.com
cocoahappens.com
frogtownsgourmettacos.com
topperk11.com
royalpristine.com
patrycerealtor.com
mtbusa.net
e-empathy.com
chelseamindgames.com
proyectomichoacan.com
blogtaljradio.com
youronad.com
persian-gostar.com
ses-nc.com
toughpull.com
flushinghealthcoach.com
nicung.info
stmichaelsplaygroup.com
rkd.xyz
penioca.com
argent-flair.today
bistrostml.net
thesysonline.com
makeanygirlhoney.com
cwhybps.com
blogfutbol2022.com
gaixuexi.com
zoomaremote.com
openirv.com
westpalmelevators.com
Signatures
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/1144-126-0x000000000041EB80-mapping.dmp formbook behavioral2/memory/1144-125-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/508-134-0x0000000000920000-0x000000000094E000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
Processes:
Materialliste für Angebot.exeMaterialliste für Angebot.execmmon32.exedescription pid process target process PID 804 set thread context of 1144 804 Materialliste für Angebot.exe Materialliste für Angebot.exe PID 1144 set thread context of 2568 1144 Materialliste für Angebot.exe Explorer.EXE PID 508 set thread context of 2568 508 cmmon32.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
Materialliste für Angebot.execmmon32.exepid process 1144 Materialliste für Angebot.exe 1144 Materialliste für Angebot.exe 1144 Materialliste für Angebot.exe 1144 Materialliste für Angebot.exe 508 cmmon32.exe 508 cmmon32.exe 508 cmmon32.exe 508 cmmon32.exe 508 cmmon32.exe 508 cmmon32.exe 508 cmmon32.exe 508 cmmon32.exe 508 cmmon32.exe 508 cmmon32.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
Materialliste für Angebot.execmmon32.exepid process 1144 Materialliste für Angebot.exe 1144 Materialliste für Angebot.exe 1144 Materialliste für Angebot.exe 508 cmmon32.exe 508 cmmon32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Materialliste für Angebot.execmmon32.exedescription pid process Token: SeDebugPrivilege 1144 Materialliste für Angebot.exe Token: SeDebugPrivilege 508 cmmon32.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
Materialliste für Angebot.exeExplorer.EXEcmmon32.exedescription pid process target process PID 804 wrote to memory of 1144 804 Materialliste für Angebot.exe Materialliste für Angebot.exe PID 804 wrote to memory of 1144 804 Materialliste für Angebot.exe Materialliste für Angebot.exe PID 804 wrote to memory of 1144 804 Materialliste für Angebot.exe Materialliste für Angebot.exe PID 804 wrote to memory of 1144 804 Materialliste für Angebot.exe Materialliste für Angebot.exe PID 804 wrote to memory of 1144 804 Materialliste für Angebot.exe Materialliste für Angebot.exe PID 804 wrote to memory of 1144 804 Materialliste für Angebot.exe Materialliste für Angebot.exe PID 2568 wrote to memory of 508 2568 Explorer.EXE cmmon32.exe PID 2568 wrote to memory of 508 2568 Explorer.EXE cmmon32.exe PID 2568 wrote to memory of 508 2568 Explorer.EXE cmmon32.exe PID 508 wrote to memory of 2076 508 cmmon32.exe cmd.exe PID 508 wrote to memory of 2076 508 cmmon32.exe cmd.exe PID 508 wrote to memory of 2076 508 cmmon32.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\Materialliste für Angebot.exe"C:\Users\Admin\AppData\Local\Temp\Materialliste für Angebot.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Users\Admin\AppData\Local\Temp\Materialliste für Angebot.exe"C:\Users\Admin\AppData\Local\Temp\Materialliste für Angebot.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1144
-
-
-
C:\Windows\SysWOW64\cmmon32.exe"C:\Windows\SysWOW64\cmmon32.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:508 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Materialliste für Angebot.exe"3⤵PID:2076
-
-