Analysis
-
max time kernel
152s -
max time network
193s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2022 21:53
Static task
static1
Behavioral task
behavioral1
Sample
HVTYUNB GH.exe
Resource
win7-20221111-en
General
-
Target
HVTYUNB GH.exe
-
Size
286KB
-
MD5
9c9cdba4a31ce04352f53e163bd96e4c
-
SHA1
8df864893b78417f89bbfab5abc5b662c5000ac3
-
SHA256
73a5f6c41cb4b4b5fb949c859ca58e8c6890c3accdc3e9d30e4b66d461890682
-
SHA512
69136741e441b693ff6853549a69dd2e9aaa5a5b615c018b5dceeedbe8f978d418c8db771a88fad94ea31885be5fcf0e7b2b20a388d0ccc518e88d2c3da72bf6
-
SSDEEP
6144:GnVuMW0KvGua1XyT+u0sefecpCor7NPrcMlv3vfKk+10sU69:GuMW0VuQyKuFefe/o1jvXKkE0sUy
Malware Config
Extracted
formbook
tpd2
P83Fr0F3A2KiI+cW
Pp1caIMEnr/EFk6Eu415Y1M=
O5eVsiutrsnUK6kDF6El
wxvn/yutO1JimCRM5HI=
F+ahRJCkyfI4Xwoe
ozU8V7MKMIba4U98/3w=
b4GDF1u0P2p62t1Ka3o=
KomBjwSImCdhtq7eMmQ=
1zqJLbw2x46Z8Q==
lal5nLUpt9Fjqeo=
yifkCkmeS5Of5dXwSWlkCIsXZA==
fK2zUmVxp/I6q91Ka3o=
MQa3V3RrSpKT
TzYGjdgculPW3Qs+6XM=
dVgMubs7KzuD6A==
CSAuug6iPk1Wn5K/8lQ9mQ==
hBOyTXIs6TuX612tLW0=
onmqz912c5So4uYW
zLHGWnnDYrHrLixltY15Y1M=
9wcJlsgDO4rnN2F+tY15Y1M=
u6t5GSv2GGq1591Ka3o=
YDs/5/8DghhpvOcagaEbBcBm8OYltSA=
PNt+B0tTa5SW77DC8lQ9mQ==
HqGr0fWEhxdRu52923QYk0oucj2N
78HKWHK6QVxzgrbgUw==
9cu4VJaZ0XPDFtAHNrxwCIsXZA==
O6gef4nJedFXnOA=
p1saM0DYA6Q4Xwoe
a0cGpN7R1NjmS7bSPO2dDa2Cn0+U
oLJ6jMNSYrrGKdn4RteQs01r
yY8YO0BW0+LqbbrOTY15Y1M=
GyMtxwtdELICXY+vS415Y1M=
9uhcBqhUDcI/Dp2mRA==
9tgMJWFrSpKT
8g0nudUr2C9tgrbgUw==
tMvpjsoUr0aWFE22LLwy
NA0Qp7fSft1mt/M=
+Ylf+ilHGDoAHpylRA==
wCP/FloiUPwtsrkuXnA=
pHloAjQ9cp+u9WnjE6Mbj1s=
X6l0nMVPahRVtLfoUX0F7QUlxqoU4zk=
9FkhQo0av+LgPXecwI15Y1M=
jfbJ4BacnDiYBbDg5wzFpVqrTgc=
8takLnTQTyNtq53STQ==
KQ0Hqau3g5SQ
9QEIm81TwWC19A==
oCgpCbQ1x46Z8Q==
CN2UOV8UGqQ4Xwoe
VF6PLFiYe3+X7g==
W/PHdnUJN4qS8bfUFmAokw==
GCPuBhJe+U2V/d5DP7wv
ER/0Bh2anxEhfH658lQ9mQ==
cD8t0QoUPnKCyEZ20IdRzdkucj2N
UhuqxAuZQoHULOYYXd2Qs01r
88tcXoQOCaLsUzJosDjLMgCXBuYltSA=
ug8ULIOPDaoEZV22Ttubgls=
KQvkZrg81yJngrbgUw==
hSHm/T25VSQtqfI=
z/l6IHJrSpKT
l5puib461fUHa2OP+yzp4dcB7qu+gJPCrw==
Tw3Xb5WjIME4Xwoe
Rh/yi6fCgWhswfc=
qNJIN0rvx46Z8Q==
Jr662PyHmus4Xwoe
ivcckx.hair
Signatures
-
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4208 set thread context of 4304 4208 HVTYUNB GH.exe 82 PID 4304 set thread context of 740 4304 Regsvcs.exe 49 PID 4304 set thread context of 740 4304 Regsvcs.exe 49 PID 3768 set thread context of 740 3768 WWAHost.exe 49 -
description ioc Process Key created \Registry\User\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 WWAHost.exe -
Suspicious behavior: EnumeratesProcesses 34 IoCs
pid Process 4304 Regsvcs.exe 4304 Regsvcs.exe 4304 Regsvcs.exe 4304 Regsvcs.exe 4304 Regsvcs.exe 4304 Regsvcs.exe 4304 Regsvcs.exe 4304 Regsvcs.exe 4304 Regsvcs.exe 4304 Regsvcs.exe 3768 WWAHost.exe 3768 WWAHost.exe 3768 WWAHost.exe 3768 WWAHost.exe 3768 WWAHost.exe 3768 WWAHost.exe 3768 WWAHost.exe 3768 WWAHost.exe 3768 WWAHost.exe 3768 WWAHost.exe 3768 WWAHost.exe 3768 WWAHost.exe 3768 WWAHost.exe 3768 WWAHost.exe 3768 WWAHost.exe 3768 WWAHost.exe 3768 WWAHost.exe 3768 WWAHost.exe 3768 WWAHost.exe 3768 WWAHost.exe 3768 WWAHost.exe 3768 WWAHost.exe 3768 WWAHost.exe 3768 WWAHost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 740 Explorer.EXE -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 4304 Regsvcs.exe 4304 Regsvcs.exe 4304 Regsvcs.exe 4304 Regsvcs.exe 3768 WWAHost.exe 3768 WWAHost.exe 3768 WWAHost.exe 3768 WWAHost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4304 Regsvcs.exe Token: SeDebugPrivilege 3768 WWAHost.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 740 Explorer.EXE 740 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4208 wrote to memory of 4304 4208 HVTYUNB GH.exe 82 PID 4208 wrote to memory of 4304 4208 HVTYUNB GH.exe 82 PID 4208 wrote to memory of 4304 4208 HVTYUNB GH.exe 82 PID 4208 wrote to memory of 4304 4208 HVTYUNB GH.exe 82 PID 4208 wrote to memory of 4304 4208 HVTYUNB GH.exe 82 PID 4208 wrote to memory of 4304 4208 HVTYUNB GH.exe 82 PID 4304 wrote to memory of 3768 4304 Regsvcs.exe 86 PID 4304 wrote to memory of 3768 4304 Regsvcs.exe 86 PID 4304 wrote to memory of 3768 4304 Regsvcs.exe 86 PID 740 wrote to memory of 4268 740 Explorer.EXE 88 PID 740 wrote to memory of 4268 740 Explorer.EXE 88 PID 740 wrote to memory of 4268 740 Explorer.EXE 88 PID 740 wrote to memory of 2492 740 Explorer.EXE 84 PID 740 wrote to memory of 2492 740 Explorer.EXE 84 PID 740 wrote to memory of 2492 740 Explorer.EXE 84 PID 3768 wrote to memory of 4768 3768 WWAHost.exe 101 PID 3768 wrote to memory of 4768 3768 WWAHost.exe 101 PID 3768 wrote to memory of 4768 3768 WWAHost.exe 101
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Users\Admin\AppData\Local\Temp\HVTYUNB GH.exe"C:\Users\Admin\AppData\Local\Temp\HVTYUNB GH.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Regsvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Regsvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Windows\SysWOW64\WWAHost.exe"C:\Windows\SysWOW64\WWAHost.exe"4⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"5⤵PID:4768
-
-
-
-
-
C:\Windows\SysWOW64\cscript.exe"C:\Windows\SysWOW64\cscript.exe"2⤵PID:2492
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:4004
-
-
C:\Windows\SysWOW64\systray.exe"C:\Windows\SysWOW64\systray.exe"2⤵PID:4268
-