MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 80887c316404836e19b87b8119d481fa6e66f26ed88cfd564e2b916848ae8359. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 10


Intelligence 10 IOCs YARA 7 File information Comments

SHA256 hash: 80887c316404836e19b87b8119d481fa6e66f26ed88cfd564e2b916848ae8359
SHA3-384 hash: a7e207da426ff8a75d89189eebf10b2ec6c46eaba5febcc8dc7909b84d2851e41df3d8d36b7fbb7a656e0761fcd7ebbd
SHA1 hash: 62cd68b45d96cb535dc88a3c61ca1e6b5bba4a92
MD5 hash: a554b03ada15a8e18ba20f01599ce1d2
humanhash: six-victor-johnny-nuts
File name:CHSDBTNN.msi
Download: download sample
File size:9'210'332 bytes
First seen:2025-04-09 12:22:40 UTC
Last seen:2025-04-09 14:30:29 UTC
File type:Microsoft Software Installer (MSI) msi
MIME type:application/x-msi
ssdeep 196608:XgAx0PD+x7ES3KU4zPOWI321Xuo6CpyazUwKS6e4P5lv/TEX3:U+mSx4723qXuo6CpyNwN4UX3
TLSH T1D396F101F7C5C431D3AE0231486AE364867A7E799B3282E3B7947A4E3D712D1AB31B57
TrID 53.7% (.MST) Windows SDK Setup Transform script (61000/1/5)
39.2% (.MSP) Windows Installer Patch (44509/10/5)
7.0% (.) Generic OLE2 / Multistream Compound (8000/1)
Magika msi
Reporter JAMESWT_WT
Tags:booking cdn-jsdelivr-net msi younowoutyes-website

Intelligence


File Origin
# of uploads :
2
# of downloads :
77
Origin country :
IT IT
Vendor Threat Intelligence
Verdict:
Malicious
Score:
90.9%
Tags:
shellcode vmdetect dropper
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
adaptive-context anti-vm control crypto expired-cert explorer fingerprint fingerprint keylogger lolbin packed regsvr32 remote wix
Result
Verdict:
SUSPICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
n/a
Detection:
malicious
Classification:
rans.spyw.evad.mine
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for URL or domain
Contains functionality to automate explorer (e.g. start an application)
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to register a low level keyboard hook
Contains functionalty to change the wallpaper
Creates a thread in another existing process (thread injection)
Creates an autostart registry key pointing to binary in C:\Windows
Found direct / indirect Syscall (likely to bypass EDR)
Found hidden mapped module (file has been removed from disk)
Found strings related to Crypto-Mining
Joe Sandbox ML detected suspicious sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
PE file has a writeable .text section
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Writes to foreign memory regions
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1660748 Sample: CHSDBTNN.msi Startdate: 09/04/2025 Architecture: WINDOWS Score: 100 112 www-msn-com.a-0003.a-msedge.net 2->112 114 werito.cyou 2->114 116 31 other IPs or domains 2->116 136 Malicious sample detected (through community Yara rule) 2->136 138 Antivirus detection for URL or domain 2->138 140 PE file has a writeable .text section 2->140 142 Joe Sandbox ML detected suspicious sample 2->142 12 msiexec.exe 2->12         started        14 msedge.exe 2->14         started        18 msiexec.exe 7 2->18         started        signatures3 process4 dnsIp5 21 msiexec.exe 56 12->21         started        24 msiexec.exe 12->24         started        134 239.255.255.250 unknown Reserved 14->134 178 Maps a DLL or memory area into another process 14->178 72 C:\Users\user\AppData\Local\...\MSICFAB.tmp, PE32 18->72 dropped 74 C:\Users\user\AppData\Local\...\MSICCFA.tmp, PE32 18->74 dropped file6 signatures7 process8 file9 76 C:\Users\user\AppData\Local\...\DesktopX.exe, PE32 21->76 dropped 78 C:\Users\user\AppData\...\_isres_0x0409.dll, PE32 21->78 dropped 80 C:\Users\user\AppData\Local\Temp\...\ISRT.dll, PE32 21->80 dropped 88 4 other files (none is malicious) 21->88 dropped 26 DesktopX.exe 7 21->26         started        30 ISBEW64.exe 21->30         started        32 ISBEW64.exe 21->32         started        40 8 other processes 21->40 82 C:\Users\user\AppData\Local\...\Start.exe, PE32+ 24->82 dropped 84 C:\Users\user\AppData\...\_isres_0x0409.dll, PE32 24->84 dropped 86 C:\Users\user\AppData\Local\Temp\...\ISRT.dll, PE32 24->86 dropped 90 2 other files (none is malicious) 24->90 dropped 34 Start.exe 24->34         started        36 ISBEW64.exe 24->36         started        38 ISBEW64.exe 24->38         started        42 8 other processes 24->42 process10 file11 92 C:\Users\user\AppData\...\DesktopX.exe, PE32 26->92 dropped 94 C:\Users\user\AppData\Roaming\...\dx0.dll, PE32 26->94 dropped 96 C:\Users\user\AppData\Roaming\...\IconX.dll, PE32 26->96 dropped 98 C:\Users\user\AppData\...\DirectGUI.dll, PE32 26->98 dropped 154 Contains functionalty to change the wallpaper 26->154 156 Contains functionality to automate explorer (e.g. start an application) 26->156 158 Contains functionality to register a low level keyboard hook 26->158 166 3 other signatures 26->166 44 DesktopX.exe 4 26->44         started        100 C:\Users\user\AppData\Local\Temp\jvwiji, PE32+ 34->100 dropped 160 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 34->160 162 Found hidden mapped module (file has been removed from disk) 34->162 164 Maps a DLL or memory area into another process 34->164 48 cmd.exe 34->48         started        signatures12 process13 dnsIp14 102 C:\Users\user\AppData\...\updateBg_je2.exe, PE32+ 44->102 dropped 104 C:\Users\user\AppData\...\qnwhxlymxchjui, PE32+ 44->104 dropped 168 Contains functionalty to change the wallpaper 44->168 170 Contains functionality to automate explorer (e.g. start an application) 44->170 172 Found hidden mapped module (file has been removed from disk) 44->172 176 4 other signatures 44->176 51 updateBg_je2.exe 2 44->51         started        55 cmd.exe 44->55         started        110 sonorous-horizon-cfd.cfd 104.21.64.1, 49722, 80 CLOUDFLARENETUS United States 48->110 174 Creates an autostart registry key pointing to binary in C:\Windows 48->174 file15 signatures16 process17 dnsIp18 118 werito.cyou 104.21.93.227, 443, 49695 CLOUDFLARENETUS United States 51->118 120 velvet5nssrv.shop 172.67.145.221, 443, 49692, 49693 CLOUDFLARENETUS United States 51->120 144 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 51->144 146 Found strings related to Crypto-Mining 51->146 148 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 51->148 152 6 other signatures 51->152 57 chrome.exe 51->57         started        60 msiexec.exe 51->60         started        63 msedge.exe 51->63         started        150 Switches to a custom stack to bypass stack traces 55->150 65 conhost.exe 55->65         started        signatures19 process20 dnsIp21 128 192.168.2.6, 138, 443, 49298 unknown unknown 57->128 130 192.168.2.7 unknown unknown 57->130 132 2 other IPs or domains 57->132 67 chrome.exe 57->67         started        106 C:\Users\user\AppData\Local\...\MSI43B2.tmp, PE32 60->106 dropped 108 C:\Users\user\AppData\Local\...\MSI419D.tmp, PE32 60->108 dropped 70 msedge.exe 63->70         started        file22 process23 dnsIp24 122 www.google.com 142.250.65.164, 443, 49698, 49703 GOOGLEUS United States 67->122 124 plus.l.google.com 67->124 126 5 other IPs or domains 67->126
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2025-04-09 12:21:05 UTC
File Type:
Binary (Archive)
Extracted files:
44
AV detection:
8 of 24 (33.33%)
Threat level:
  5/5
Result
Malware family:
hijackloader
Score:
  10/10
Tags:
family:hijackloader discovery persistence privilege_escalation spyware stealer
Behaviour
Enumerates system info in registry
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Browser Information Discovery
Enumerates physical storage devices
Event Triggered Execution: Installer Packages
Reads user/profile data of web browsers
System Location Discovery: System Language Discovery
Executes dropped EXE
Loads dropped DLL
Suspicious use of SetThreadContext
Enumerates connected drives
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:NET
Author:malware-lu
Rule name:pe_detect_tls_callbacks
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:vmdetect
Author:nex
Description:Possibly employs anti-virtualization techniques

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Microsoft Software Installer (MSI) msi 80887c316404836e19b87b8119d481fa6e66f26ed88cfd564e2b916848ae8359

(this sample)

  
Delivery method
Distributed via web download

Comments