Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2022 17:23
Static task
static1
Behavioral task
behavioral1
Sample
NHYGUnNN.exe
Resource
win7-20221111-en
General
-
Target
NHYGUnNN.exe
-
Size
269KB
-
MD5
4f9c8432b57fa1aa875071de547ba947
-
SHA1
e1cc52fd851621743ba562a65161bfafed8e6b2b
-
SHA256
9f0d17930a9312b8d8dfb23119b57fed676a1bb15fc1582754ab94201651b221
-
SHA512
ced221c2e5225a8ead486e52f1c5307b24dbaff8864c7262f2d6f58cad3184753d1f2afe525c3afa122ddcafeab38845dafd2f7a22169bfac026375e7962481d
-
SSDEEP
6144:RhwendE8+/O+oImP2Qcy7ZwpeA9pg6Cer0K7+UUcT9gxyRClRcOpoik:EAHdP7ZwpeApT0K7+UUQ99RORcOpoR
Malware Config
Extracted
formbook
4u5a
Y9HWoINcPu0r7SSSKt4FCmk7
G/E64auYdhRQM4wZW2bcOaY=
bL57APty/StRpW49a+EdxA==
TppryJ0SoslHe8gJFVc=
HXxDShYIEcUJDahdv2nvl5Hlbp4=
EKaq5c6w0nV3WWlEqM4Www==
VM+YjE8XS1OLcH1roYF4zA==
OwK0wxmBGnq2Fg==
B1zy4bulyfY9tj9DK2eIkeYArpTt
Avj5JeA8m9girqfQ4+cZxA==
AOY4dmDFkCdX8HUJMw==
5cQUw3pPMYr07V8=
P7ZsN4/zt63AEw==
FYyVCOpB8Vl//kSkDLPo91Yy
jxwZTBp+5gcsccPxDF+K4bDG2Rpp0A==
iGx9AO58DRhZbXX9
prwVyLkAtlhSU6irmansg8wArpTt
uqa8ZPl+FFObOkdFNg==
tL4OhF22EDaEOkdFNg==
6exH76Z9o7eu/n86vgPE
rJfvmmO0I0KSOkdFNg==
fWeyPQpzFxdBSlPuAlA=
imNhpGXCQjOgCw==
KOLqYk7Qy278+j3g
A4mLyKgkynW7jZZt0F8=
380eDrCm3ApZbXX9
1k6VTs/04X8=
6yQgD+RiKrbnhr77i60lI/gyAQ==
rST4Evf891bSukI=
wYh6yzBy3wDSOkdFNg==
i0j/88JPuMOz
1t8w27cIepbAIqSh0G5dsiUnCw==
uI6hQB6EIE+bFW1woYF4zA==
BPL0Pin+82dmW/OhB0Fr5JHlbp4=
XC5/ZktMXzEnk+xGrPFSE+st
srT4c1/AacoX8F0=
zJeU2qIZ2VCSOkdFNg==
j4a8RbuBvuFZbXX9
asVC+9b7w7eu
L6UfqgNtQjOgCw==
yTgIJt0+qNUilvojOWqqBypDFg==
Ie006MzYHidZbXX9
fbVjId1kpfdZbXX9
w7z+dzqeJEZq2/A6vgPE
bkyOQjI+MYr07V8=
EODzbkTAOSJZbXX9
sZXWleMz4n7HrUI=
YuK38tZjKZ3eQJnC3jxvdM7D2Rpp0A==
VTJSAfJU7tISaHT/
d/gIXE8qLIr07V8=
F3XypWdIKor07V8=
uQaJTBhc8R4kr/I6vgPE
1T8ENSkKJLudaZZt0F8=
uc4eyKuvBidZbXX9
txCp1rM0oc4LhQHpKYJQUKKktIT3GWoNJw==
RMLQh/ZpQjOgCw==
0+Qt17zBCyNZbXX9
JC6jMCHmB77Eu/EFdap62w==
t4XGRQqC3kSB9Tpds2j0Wrg=
T7hCMhTkzX2mf4lVAQjjJOgz
DQ6VYEicGU+NFio7Lw==
PCpjzoTZU3Ol9T1coYF4zA==
DxVl5Jum/t5orqfQ4+cZxA==
OaM0F9KunPxoQUk/Nw==
needook.com
Signatures
-
Suspicious use of SetThreadContext 3 IoCs
Processes:
NHYGUnNN.exeRegsvcs.exenetsh.exedescription pid process target process PID 2680 set thread context of 4460 2680 NHYGUnNN.exe Regsvcs.exe PID 4460 set thread context of 3056 4460 Regsvcs.exe Explorer.EXE PID 3360 set thread context of 3056 3360 netsh.exe Explorer.EXE -
Processes:
netsh.exedescription ioc process Key created \Registry\User\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 netsh.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
NHYGUnNN.exeRegsvcs.exenetsh.exepid process 2680 NHYGUnNN.exe 2680 NHYGUnNN.exe 4460 Regsvcs.exe 4460 Regsvcs.exe 4460 Regsvcs.exe 4460 Regsvcs.exe 4460 Regsvcs.exe 4460 Regsvcs.exe 4460 Regsvcs.exe 4460 Regsvcs.exe 3360 netsh.exe 3360 netsh.exe 3360 netsh.exe 3360 netsh.exe 3360 netsh.exe 3360 netsh.exe 3360 netsh.exe 3360 netsh.exe 3360 netsh.exe 3360 netsh.exe 3360 netsh.exe 3360 netsh.exe 3360 netsh.exe 3360 netsh.exe 3360 netsh.exe 3360 netsh.exe 3360 netsh.exe 3360 netsh.exe 3360 netsh.exe 3360 netsh.exe 3360 netsh.exe 3360 netsh.exe 3360 netsh.exe 3360 netsh.exe 3360 netsh.exe 3360 netsh.exe 3360 netsh.exe 3360 netsh.exe 3360 netsh.exe 3360 netsh.exe 3360 netsh.exe 3360 netsh.exe 3360 netsh.exe 3360 netsh.exe 3360 netsh.exe 3360 netsh.exe 3360 netsh.exe 3360 netsh.exe 3360 netsh.exe 3360 netsh.exe 3360 netsh.exe 3360 netsh.exe 3360 netsh.exe 3360 netsh.exe 3360 netsh.exe 3360 netsh.exe 3360 netsh.exe 3360 netsh.exe 3360 netsh.exe 3360 netsh.exe 3360 netsh.exe 3360 netsh.exe 3360 netsh.exe 3360 netsh.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3056 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
Processes:
Regsvcs.exenetsh.exepid process 4460 Regsvcs.exe 4460 Regsvcs.exe 4460 Regsvcs.exe 3360 netsh.exe 3360 netsh.exe 3360 netsh.exe 3360 netsh.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
NHYGUnNN.exeRegsvcs.exenetsh.exedescription pid process Token: SeDebugPrivilege 2680 NHYGUnNN.exe Token: SeDebugPrivilege 4460 Regsvcs.exe Token: SeDebugPrivilege 3360 netsh.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
NHYGUnNN.exeExplorer.EXEnetsh.exedescription pid process target process PID 2680 wrote to memory of 3476 2680 NHYGUnNN.exe Regsvcs.exe PID 2680 wrote to memory of 3476 2680 NHYGUnNN.exe Regsvcs.exe PID 2680 wrote to memory of 3476 2680 NHYGUnNN.exe Regsvcs.exe PID 2680 wrote to memory of 4460 2680 NHYGUnNN.exe Regsvcs.exe PID 2680 wrote to memory of 4460 2680 NHYGUnNN.exe Regsvcs.exe PID 2680 wrote to memory of 4460 2680 NHYGUnNN.exe Regsvcs.exe PID 2680 wrote to memory of 4460 2680 NHYGUnNN.exe Regsvcs.exe PID 2680 wrote to memory of 4460 2680 NHYGUnNN.exe Regsvcs.exe PID 2680 wrote to memory of 4460 2680 NHYGUnNN.exe Regsvcs.exe PID 3056 wrote to memory of 3360 3056 Explorer.EXE netsh.exe PID 3056 wrote to memory of 3360 3056 Explorer.EXE netsh.exe PID 3056 wrote to memory of 3360 3056 Explorer.EXE netsh.exe PID 3360 wrote to memory of 5008 3360 netsh.exe Firefox.exe PID 3360 wrote to memory of 5008 3360 netsh.exe Firefox.exe PID 3360 wrote to memory of 5008 3360 netsh.exe Firefox.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\NHYGUnNN.exe"C:\Users\Admin\AppData\Local\Temp\NHYGUnNN.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Regsvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Regsvcs.exe"3⤵PID:3476
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Regsvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Regsvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4460
-
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\SysWOW64\netsh.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:5008
-
-