Analysis
-
max time kernel
155s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
09-02-2022 09:20
Static task
static1
Behavioral task
behavioral1
Sample
hussanbinzx.exe
Resource
win7-en-20211208
General
-
Target
hussanbinzx.exe
-
Size
400KB
-
MD5
cb5cd9f8250eaf3861f8774f431032b4
-
SHA1
1de8f273480f80f18d070f1f71aa722923759137
-
SHA256
7357d3e9a33b53dcaf335fecb11100acf0fbeeec2ebf668634de7cd1ba931ae1
-
SHA512
f7b4bc3996fee5fa1606a85f3d3cce6a1dbd6f14a133c81db0061b91528fc36c9856bd684b5d111ad387fff539720391fc2afd52c3b5803a7e192471a21e74cc
Malware Config
Extracted
formbook
4.1
k2i4
apehangersbikersgang.com
lhcgrou.com
diveidf.com
timtas.store
jadebody.club
iamjbrussell.com
fwfuv.icu
picchealth.net
batuair.com
z58609.com
punarecotech.com
a-oct.com
xn--wmq0c1qt9mcxhxjkp16a.top
district99.net
5dcoding.com
aripagripoff.biz
abtheagent.com
betterskincareco.com
jsskylight.com
deviseoffice.com
talentbrothers.com
metacharade.com
cymbpz.icu
saveusclothing.com
alidmpt.com
vyoala.icu
dollarswithdemitri.com
trustbitcoin.city
quadcoptertransportation.com
sx1887.com
ngtr07.com
naturarerum.store
deliciousvegetarianfood.com
378wn.net
lxqjm.com
magicfountain.club
in-novating.com
khokhovula.net
antisecuritysecurityclub.com
vantor.xyz
liumenshan.com
eltfreight.com
garmi-family.com
maridenby.com
theaplusacademy.net
roseintro.online
allthingconsideredbykeki.com
ltlv-ci.com
goel-exports.com
keisanscale.com
fewind.com
tcenjoyers.com
staysugoi.com
natureshealthshop.net
jbsgou.com
polarsc.net
chesapeakebayoyster.com
wyrmzine.com
makeid.online
cityhom.com
accurateamericaroofing.com
peapds.com
punterstoplock.store
startupmentorsquad.com
ruiquanjm.icu
Signatures
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/3464-140-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/3464-146-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/2460-151-0x0000000001320000-0x000000000134F000-memory.dmp formbook -
Suspicious use of SetThreadContext 4 IoCs
Processes:
hussanbinzx.exehussanbinzx.execscript.exedescription pid Process procid_target PID 4444 set thread context of 3464 4444 hussanbinzx.exe 98 PID 3464 set thread context of 2484 3464 hussanbinzx.exe 44 PID 3464 set thread context of 2484 3464 hussanbinzx.exe 44 PID 2460 set thread context of 2484 2460 cscript.exe 44 -
Drops file in Windows directory 8 IoCs
Processes:
svchost.exeTiWorker.exedescription ioc Process File opened for modification C:\Windows\SoftwareDistribution\ReportingEvents.log svchost.exe File opened for modification C:\Windows\Logs\CBS\CBS.log TiWorker.exe File opened for modification C:\Windows\WinSxS\pending.xml TiWorker.exe File opened for modification C:\Windows\WindowsUpdate.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.edb svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.jfm svchost.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
Processes:
hussanbinzx.execscript.exepid Process 3464 hussanbinzx.exe 3464 hussanbinzx.exe 3464 hussanbinzx.exe 3464 hussanbinzx.exe 3464 hussanbinzx.exe 3464 hussanbinzx.exe 2460 cscript.exe 2460 cscript.exe 2460 cscript.exe 2460 cscript.exe 2460 cscript.exe 2460 cscript.exe 2460 cscript.exe 2460 cscript.exe 2460 cscript.exe 2460 cscript.exe 2460 cscript.exe 2460 cscript.exe 2460 cscript.exe 2460 cscript.exe 2460 cscript.exe 2460 cscript.exe 2460 cscript.exe 2460 cscript.exe 2460 cscript.exe 2460 cscript.exe 2460 cscript.exe 2460 cscript.exe 2460 cscript.exe 2460 cscript.exe 2460 cscript.exe 2460 cscript.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid Process 2484 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
hussanbinzx.execscript.exepid Process 3464 hussanbinzx.exe 3464 hussanbinzx.exe 3464 hussanbinzx.exe 3464 hussanbinzx.exe 2460 cscript.exe 2460 cscript.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
svchost.exeTiWorker.exehussanbinzx.exeExplorer.EXEdescription pid Process Token: SeShutdownPrivilege 1336 svchost.exe Token: SeCreatePagefilePrivilege 1336 svchost.exe Token: SeShutdownPrivilege 1336 svchost.exe Token: SeCreatePagefilePrivilege 1336 svchost.exe Token: SeShutdownPrivilege 1336 svchost.exe Token: SeCreatePagefilePrivilege 1336 svchost.exe Token: SeSecurityPrivilege 5116 TiWorker.exe Token: SeRestorePrivilege 5116 TiWorker.exe Token: SeBackupPrivilege 5116 TiWorker.exe Token: SeBackupPrivilege 5116 TiWorker.exe Token: SeRestorePrivilege 5116 TiWorker.exe Token: SeSecurityPrivilege 5116 TiWorker.exe Token: SeBackupPrivilege 5116 TiWorker.exe Token: SeRestorePrivilege 5116 TiWorker.exe Token: SeSecurityPrivilege 5116 TiWorker.exe Token: SeBackupPrivilege 5116 TiWorker.exe Token: SeRestorePrivilege 5116 TiWorker.exe Token: SeSecurityPrivilege 5116 TiWorker.exe Token: SeBackupPrivilege 5116 TiWorker.exe Token: SeRestorePrivilege 5116 TiWorker.exe Token: SeSecurityPrivilege 5116 TiWorker.exe Token: SeBackupPrivilege 5116 TiWorker.exe Token: SeRestorePrivilege 5116 TiWorker.exe Token: SeSecurityPrivilege 5116 TiWorker.exe Token: SeBackupPrivilege 5116 TiWorker.exe Token: SeRestorePrivilege 5116 TiWorker.exe Token: SeSecurityPrivilege 5116 TiWorker.exe Token: SeBackupPrivilege 5116 TiWorker.exe Token: SeRestorePrivilege 5116 TiWorker.exe Token: SeSecurityPrivilege 5116 TiWorker.exe Token: SeBackupPrivilege 5116 TiWorker.exe Token: SeRestorePrivilege 5116 TiWorker.exe Token: SeSecurityPrivilege 5116 TiWorker.exe Token: SeBackupPrivilege 5116 TiWorker.exe Token: SeRestorePrivilege 5116 TiWorker.exe Token: SeSecurityPrivilege 5116 TiWorker.exe Token: SeBackupPrivilege 5116 TiWorker.exe Token: SeRestorePrivilege 5116 TiWorker.exe Token: SeSecurityPrivilege 5116 TiWorker.exe Token: SeDebugPrivilege 3464 hussanbinzx.exe Token: SeShutdownPrivilege 2484 Explorer.EXE Token: SeCreatePagefilePrivilege 2484 Explorer.EXE Token: SeShutdownPrivilege 2484 Explorer.EXE Token: SeCreatePagefilePrivilege 2484 Explorer.EXE Token: SeBackupPrivilege 5116 TiWorker.exe Token: SeRestorePrivilege 5116 TiWorker.exe Token: SeSecurityPrivilege 5116 TiWorker.exe Token: SeBackupPrivilege 5116 TiWorker.exe Token: SeRestorePrivilege 5116 TiWorker.exe Token: SeSecurityPrivilege 5116 TiWorker.exe Token: SeBackupPrivilege 5116 TiWorker.exe Token: SeRestorePrivilege 5116 TiWorker.exe Token: SeSecurityPrivilege 5116 TiWorker.exe Token: SeBackupPrivilege 5116 TiWorker.exe Token: SeRestorePrivilege 5116 TiWorker.exe Token: SeSecurityPrivilege 5116 TiWorker.exe Token: SeBackupPrivilege 5116 TiWorker.exe Token: SeRestorePrivilege 5116 TiWorker.exe Token: SeSecurityPrivilege 5116 TiWorker.exe Token: SeBackupPrivilege 5116 TiWorker.exe Token: SeRestorePrivilege 5116 TiWorker.exe Token: SeSecurityPrivilege 5116 TiWorker.exe Token: SeBackupPrivilege 5116 TiWorker.exe Token: SeRestorePrivilege 5116 TiWorker.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
hussanbinzx.exehussanbinzx.execscript.exedescription pid Process procid_target PID 4444 wrote to memory of 3464 4444 hussanbinzx.exe 98 PID 4444 wrote to memory of 3464 4444 hussanbinzx.exe 98 PID 4444 wrote to memory of 3464 4444 hussanbinzx.exe 98 PID 4444 wrote to memory of 3464 4444 hussanbinzx.exe 98 PID 4444 wrote to memory of 3464 4444 hussanbinzx.exe 98 PID 4444 wrote to memory of 3464 4444 hussanbinzx.exe 98 PID 3464 wrote to memory of 2460 3464 hussanbinzx.exe 99 PID 3464 wrote to memory of 2460 3464 hussanbinzx.exe 99 PID 3464 wrote to memory of 2460 3464 hussanbinzx.exe 99 PID 2460 wrote to memory of 3636 2460 cscript.exe 100 PID 2460 wrote to memory of 3636 2460 cscript.exe 100 PID 2460 wrote to memory of 3636 2460 cscript.exe 100
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\hussanbinzx.exe"C:\Users\Admin\AppData\Local\Temp\hussanbinzx.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Users\Admin\AppData\Local\Temp\hussanbinzx.exe"C:\Users\Admin\AppData\Local\Temp\hussanbinzx.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Windows\SysWOW64\cscript.exe"C:\Windows\SysWOW64\cscript.exe"4⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\hussanbinzx.exe"5⤵PID:3636
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1336
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:5116