Analysis
-
max time kernel
146s -
max time network
133s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
09-02-2022 09:20
Static task
static1
Behavioral task
behavioral1
Sample
hussanbinzx.exe
Resource
win7-en-20211208
General
-
Target
hussanbinzx.exe
-
Size
400KB
-
MD5
cb5cd9f8250eaf3861f8774f431032b4
-
SHA1
1de8f273480f80f18d070f1f71aa722923759137
-
SHA256
7357d3e9a33b53dcaf335fecb11100acf0fbeeec2ebf668634de7cd1ba931ae1
-
SHA512
f7b4bc3996fee5fa1606a85f3d3cce6a1dbd6f14a133c81db0061b91528fc36c9856bd684b5d111ad387fff539720391fc2afd52c3b5803a7e192471a21e74cc
Malware Config
Extracted
formbook
4.1
k2i4
apehangersbikersgang.com
lhcgrou.com
diveidf.com
timtas.store
jadebody.club
iamjbrussell.com
fwfuv.icu
picchealth.net
batuair.com
z58609.com
punarecotech.com
a-oct.com
xn--wmq0c1qt9mcxhxjkp16a.top
district99.net
5dcoding.com
aripagripoff.biz
abtheagent.com
betterskincareco.com
jsskylight.com
deviseoffice.com
talentbrothers.com
metacharade.com
cymbpz.icu
saveusclothing.com
alidmpt.com
vyoala.icu
dollarswithdemitri.com
trustbitcoin.city
quadcoptertransportation.com
sx1887.com
ngtr07.com
naturarerum.store
deliciousvegetarianfood.com
378wn.net
lxqjm.com
magicfountain.club
in-novating.com
khokhovula.net
antisecuritysecurityclub.com
vantor.xyz
liumenshan.com
eltfreight.com
garmi-family.com
maridenby.com
theaplusacademy.net
roseintro.online
allthingconsideredbykeki.com
ltlv-ci.com
goel-exports.com
keisanscale.com
fewind.com
tcenjoyers.com
staysugoi.com
natureshealthshop.net
jbsgou.com
polarsc.net
chesapeakebayoyster.com
wyrmzine.com
makeid.online
cityhom.com
accurateamericaroofing.com
peapds.com
punterstoplock.store
startupmentorsquad.com
ruiquanjm.icu
Signatures
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/848-62-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/848-64-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/436-70-0x00000000000C0000-0x00000000000EF000-memory.dmp formbook -
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 1064 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
hussanbinzx.exehussanbinzx.exesvchost.exedescription pid Process procid_target PID 812 set thread context of 848 812 hussanbinzx.exe 29 PID 848 set thread context of 1388 848 hussanbinzx.exe 12 PID 436 set thread context of 1388 436 svchost.exe 12 -
Suspicious behavior: EnumeratesProcesses 19 IoCs
Processes:
hussanbinzx.exesvchost.exepid Process 848 hussanbinzx.exe 848 hussanbinzx.exe 436 svchost.exe 436 svchost.exe 436 svchost.exe 436 svchost.exe 436 svchost.exe 436 svchost.exe 436 svchost.exe 436 svchost.exe 436 svchost.exe 436 svchost.exe 436 svchost.exe 436 svchost.exe 436 svchost.exe 436 svchost.exe 436 svchost.exe 436 svchost.exe 436 svchost.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
hussanbinzx.exesvchost.exepid Process 848 hussanbinzx.exe 848 hussanbinzx.exe 848 hussanbinzx.exe 436 svchost.exe 436 svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
hussanbinzx.exesvchost.exedescription pid Process Token: SeDebugPrivilege 848 hussanbinzx.exe Token: SeDebugPrivilege 436 svchost.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid Process 1388 Explorer.EXE 1388 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Explorer.EXEpid Process 1388 Explorer.EXE 1388 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
hussanbinzx.exeExplorer.EXEsvchost.exedescription pid Process procid_target PID 812 wrote to memory of 848 812 hussanbinzx.exe 29 PID 812 wrote to memory of 848 812 hussanbinzx.exe 29 PID 812 wrote to memory of 848 812 hussanbinzx.exe 29 PID 812 wrote to memory of 848 812 hussanbinzx.exe 29 PID 812 wrote to memory of 848 812 hussanbinzx.exe 29 PID 812 wrote to memory of 848 812 hussanbinzx.exe 29 PID 812 wrote to memory of 848 812 hussanbinzx.exe 29 PID 1388 wrote to memory of 436 1388 Explorer.EXE 30 PID 1388 wrote to memory of 436 1388 Explorer.EXE 30 PID 1388 wrote to memory of 436 1388 Explorer.EXE 30 PID 1388 wrote to memory of 436 1388 Explorer.EXE 30 PID 436 wrote to memory of 1064 436 svchost.exe 31 PID 436 wrote to memory of 1064 436 svchost.exe 31 PID 436 wrote to memory of 1064 436 svchost.exe 31 PID 436 wrote to memory of 1064 436 svchost.exe 31
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\hussanbinzx.exe"C:\Users\Admin\AppData\Local\Temp\hussanbinzx.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Users\Admin\AppData\Local\Temp\hussanbinzx.exe"C:\Users\Admin\AppData\Local\Temp\hussanbinzx.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:848
-
-
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\hussanbinzx.exe"3⤵
- Deletes itself
PID:1064
-
-