Analysis
-
max time kernel
148s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
21/09/2022, 08:56
Static task
static1
Behavioral task
behavioral1
Sample
IsHwns2p3ZvIgkH.exe
Resource
win7-20220812-en
General
-
Target
IsHwns2p3ZvIgkH.exe
-
Size
1.0MB
-
MD5
aa9bfaf0db3e099e5a4c92fa67a52217
-
SHA1
1a24dacdffd825a20b9dd4d7d2780c388134218b
-
SHA256
c694ebca2b151e70ba5f51af8b74efcd69188a423b1ae2c62c4981df1b31fbf2
-
SHA512
be863de492013738e504c6b29743b1332c6ca4cecd337b7d1af3c6db53297b9cdaf5727e26a59e7c3b04bc3feeae1406962c08e5f95542634a5471e027696738
-
SSDEEP
12288:t8kFnWxU8SOT7JqYrEcCLFng/utcSq8f4DTfvLEcp3y5we421KKYdDxry:+eZBOHAYrWqmq80fTEIC5ejdNy
Malware Config
Extracted
formbook
4.1
j2s3
conseptua.com
apexgclv.com
cannian.xyz
neuro-holistic-therapy.co.uk
iabcme.com
costadealisios.com
advisehalt.sbs
zlp-co.top
manchestersolarpanels.co.uk
zenhealcare.com
wyattandco.info
577ly.net
annieshallmark.online
realecovillage.online
tuncel-makina.com
5504hn.net
pulseelectronics.website
sngysstym.xyz
viajargcdk.xyz
yetiicecream.com
m2pnk.com
wzzhongxue.com
potakyo.online
productips.com
fio-cz.site
fitzwilliamarchitects.online
tsdbz.com
aunvision.store
blogsaudebrasil.online
shelleyjacobson.online
goldengungaming.com
aylbsjw.com
alwaysprettychile.com
longterm086rooms5w6d6d7n5c3.top
50shadesofsilk.com
dostuff.tech
aqwest.xyz
alexanderreichl.com
pbentz.com
leonardelliott.site
allisondonnell.com
blogshere.site
thewigrevampstudio.co.uk
mundiland.net
monstet.xyz
8i0f0l.xyz
1888dz.com
trashpandajunky.com
9animes.site
aliciaankarstrom.com
bizs.xyz
technicalgaur.co.in
doublezerofilm.com
connect-progaming.online
tech-tips.info
ldcd6.com
dumlf.com
thejacketcomic.com
hextan.com
mayya.coach
hqregxvzbzkv.xyz
momentovida-nova.sbs
amazekickstartapps3.website
wocai.icu
tesourodireto.app
Signatures
-
Formbook payload 6 IoCs
resource yara_rule behavioral1/memory/1076-63-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1076-64-0x000000000041F110-mapping.dmp formbook behavioral1/memory/1076-69-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1076-73-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1088-76-0x0000000000080000-0x00000000000AF000-memory.dmp formbook behavioral1/memory/1088-80-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 1776 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1500 set thread context of 1076 1500 IsHwns2p3ZvIgkH.exe 27 PID 1076 set thread context of 1360 1076 IsHwns2p3ZvIgkH.exe 13 PID 1076 set thread context of 1360 1076 IsHwns2p3ZvIgkH.exe 13 PID 1088 set thread context of 1360 1088 wininit.exe 13 -
Suspicious behavior: EnumeratesProcesses 19 IoCs
pid Process 1076 IsHwns2p3ZvIgkH.exe 1076 IsHwns2p3ZvIgkH.exe 1076 IsHwns2p3ZvIgkH.exe 1088 wininit.exe 1088 wininit.exe 1088 wininit.exe 1088 wininit.exe 1088 wininit.exe 1088 wininit.exe 1088 wininit.exe 1088 wininit.exe 1088 wininit.exe 1088 wininit.exe 1088 wininit.exe 1088 wininit.exe 1088 wininit.exe 1088 wininit.exe 1088 wininit.exe 1088 wininit.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 1076 IsHwns2p3ZvIgkH.exe 1076 IsHwns2p3ZvIgkH.exe 1076 IsHwns2p3ZvIgkH.exe 1076 IsHwns2p3ZvIgkH.exe 1088 wininit.exe 1088 wininit.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1076 IsHwns2p3ZvIgkH.exe Token: SeDebugPrivilege 1088 wininit.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1360 Explorer.EXE 1360 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1360 Explorer.EXE 1360 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1500 wrote to memory of 1076 1500 IsHwns2p3ZvIgkH.exe 27 PID 1500 wrote to memory of 1076 1500 IsHwns2p3ZvIgkH.exe 27 PID 1500 wrote to memory of 1076 1500 IsHwns2p3ZvIgkH.exe 27 PID 1500 wrote to memory of 1076 1500 IsHwns2p3ZvIgkH.exe 27 PID 1500 wrote to memory of 1076 1500 IsHwns2p3ZvIgkH.exe 27 PID 1500 wrote to memory of 1076 1500 IsHwns2p3ZvIgkH.exe 27 PID 1500 wrote to memory of 1076 1500 IsHwns2p3ZvIgkH.exe 27 PID 1360 wrote to memory of 1088 1360 Explorer.EXE 28 PID 1360 wrote to memory of 1088 1360 Explorer.EXE 28 PID 1360 wrote to memory of 1088 1360 Explorer.EXE 28 PID 1360 wrote to memory of 1088 1360 Explorer.EXE 28 PID 1088 wrote to memory of 1776 1088 wininit.exe 29 PID 1088 wrote to memory of 1776 1088 wininit.exe 29 PID 1088 wrote to memory of 1776 1088 wininit.exe 29 PID 1088 wrote to memory of 1776 1088 wininit.exe 29
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\IsHwns2p3ZvIgkH.exe"C:\Users\Admin\AppData\Local\Temp\IsHwns2p3ZvIgkH.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\IsHwns2p3ZvIgkH.exe"C:\Users\Admin\AppData\Local\Temp\IsHwns2p3ZvIgkH.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1076
-
-
-
C:\Windows\SysWOW64\wininit.exe"C:\Windows\SysWOW64\wininit.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\IsHwns2p3ZvIgkH.exe"3⤵
- Deletes itself
PID:1776
-
-