Analysis
-
max time kernel
174s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
16-06-2022 05:39
Static task
static1
Behavioral task
behavioral1
Sample
2732aa8029af8c346964765afc897b8786933b9bebd41c0fcca325a8c7ad608c.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
2732aa8029af8c346964765afc897b8786933b9bebd41c0fcca325a8c7ad608c.exe
Resource
win10v2004-20220414-en
General
-
Target
2732aa8029af8c346964765afc897b8786933b9bebd41c0fcca325a8c7ad608c.exe
-
Size
378KB
-
MD5
002dccebb515daedd0dcf2e423eead5e
-
SHA1
f4246de95b2e6f3989be1fba0ed1bb079a809ad7
-
SHA256
2732aa8029af8c346964765afc897b8786933b9bebd41c0fcca325a8c7ad608c
-
SHA512
cc57a70b2c9e28979abcac6ba26bde4c2ffeacdf06a370e8544e557bff58e2324f87fea1b51a3bc8c23a3172282056180b4db0ea613b0906a26e667480a535ff
Malware Config
Signatures
-
Processes:
winyewm.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" winyewm.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection winyewm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" winyewm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" winyewm.exe -
Processes:
winyewm.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" winyewm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" winyewm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" winyewm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" winyewm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" winyewm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" winyewm.exe -
Executes dropped EXE 1 IoCs
Processes:
winyewm.exepid process 2504 winyewm.exe -
Processes:
winyewm.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" winyewm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" winyewm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" winyewm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" winyewm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" winyewm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AutoUpdateDisableNotify = "1" winyewm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" winyewm.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
2732aa8029af8c346964765afc897b8786933b9bebd41c0fcca325a8c7ad608c.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Services = "C:\\Windows\\8486227214447239\\winyewm.exe" 2732aa8029af8c346964765afc897b8786933b9bebd41c0fcca325a8c7ad608c.exe Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Services = "C:\\Windows\\8486227214447239\\winyewm.exe" 2732aa8029af8c346964765afc897b8786933b9bebd41c0fcca325a8c7ad608c.exe -
Drops file in Windows directory 3 IoCs
Processes:
2732aa8029af8c346964765afc897b8786933b9bebd41c0fcca325a8c7ad608c.exedescription ioc process File opened for modification C:\Windows\8486227214447239 2732aa8029af8c346964765afc897b8786933b9bebd41c0fcca325a8c7ad608c.exe File created C:\Windows\8486227214447239\winyewm.exe 2732aa8029af8c346964765afc897b8786933b9bebd41c0fcca325a8c7ad608c.exe File opened for modification C:\Windows\8486227214447239\winyewm.exe 2732aa8029af8c346964765afc897b8786933b9bebd41c0fcca325a8c7ad608c.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2060 3140 WerFault.exe 2732aa8029af8c346964765afc897b8786933b9bebd41c0fcca325a8c7ad608c.exe -
Suspicious behavior: EnumeratesProcesses 36 IoCs
Processes:
2732aa8029af8c346964765afc897b8786933b9bebd41c0fcca325a8c7ad608c.exewinyewm.exepid process 3140 2732aa8029af8c346964765afc897b8786933b9bebd41c0fcca325a8c7ad608c.exe 3140 2732aa8029af8c346964765afc897b8786933b9bebd41c0fcca325a8c7ad608c.exe 3140 2732aa8029af8c346964765afc897b8786933b9bebd41c0fcca325a8c7ad608c.exe 3140 2732aa8029af8c346964765afc897b8786933b9bebd41c0fcca325a8c7ad608c.exe 3140 2732aa8029af8c346964765afc897b8786933b9bebd41c0fcca325a8c7ad608c.exe 3140 2732aa8029af8c346964765afc897b8786933b9bebd41c0fcca325a8c7ad608c.exe 3140 2732aa8029af8c346964765afc897b8786933b9bebd41c0fcca325a8c7ad608c.exe 3140 2732aa8029af8c346964765afc897b8786933b9bebd41c0fcca325a8c7ad608c.exe 3140 2732aa8029af8c346964765afc897b8786933b9bebd41c0fcca325a8c7ad608c.exe 3140 2732aa8029af8c346964765afc897b8786933b9bebd41c0fcca325a8c7ad608c.exe 3140 2732aa8029af8c346964765afc897b8786933b9bebd41c0fcca325a8c7ad608c.exe 3140 2732aa8029af8c346964765afc897b8786933b9bebd41c0fcca325a8c7ad608c.exe 3140 2732aa8029af8c346964765afc897b8786933b9bebd41c0fcca325a8c7ad608c.exe 3140 2732aa8029af8c346964765afc897b8786933b9bebd41c0fcca325a8c7ad608c.exe 3140 2732aa8029af8c346964765afc897b8786933b9bebd41c0fcca325a8c7ad608c.exe 3140 2732aa8029af8c346964765afc897b8786933b9bebd41c0fcca325a8c7ad608c.exe 3140 2732aa8029af8c346964765afc897b8786933b9bebd41c0fcca325a8c7ad608c.exe 3140 2732aa8029af8c346964765afc897b8786933b9bebd41c0fcca325a8c7ad608c.exe 2504 winyewm.exe 2504 winyewm.exe 2504 winyewm.exe 2504 winyewm.exe 2504 winyewm.exe 2504 winyewm.exe 2504 winyewm.exe 2504 winyewm.exe 2504 winyewm.exe 2504 winyewm.exe 2504 winyewm.exe 2504 winyewm.exe 2504 winyewm.exe 2504 winyewm.exe 2504 winyewm.exe 2504 winyewm.exe 2504 winyewm.exe 2504 winyewm.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
2732aa8029af8c346964765afc897b8786933b9bebd41c0fcca325a8c7ad608c.exedescription pid process target process PID 3140 wrote to memory of 2504 3140 2732aa8029af8c346964765afc897b8786933b9bebd41c0fcca325a8c7ad608c.exe winyewm.exe PID 3140 wrote to memory of 2504 3140 2732aa8029af8c346964765afc897b8786933b9bebd41c0fcca325a8c7ad608c.exe winyewm.exe PID 3140 wrote to memory of 2504 3140 2732aa8029af8c346964765afc897b8786933b9bebd41c0fcca325a8c7ad608c.exe winyewm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2732aa8029af8c346964765afc897b8786933b9bebd41c0fcca325a8c7ad608c.exe"C:\Users\Admin\AppData\Local\Temp\2732aa8029af8c346964765afc897b8786933b9bebd41c0fcca325a8c7ad608c.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Windows\8486227214447239\winyewm.exeC:\Windows\8486227214447239\winyewm.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
PID:2504
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3140 -s 5522⤵
- Program crash
PID:2060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3140 -ip 31401⤵PID:4492
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
378KB
MD5002dccebb515daedd0dcf2e423eead5e
SHA1f4246de95b2e6f3989be1fba0ed1bb079a809ad7
SHA2562732aa8029af8c346964765afc897b8786933b9bebd41c0fcca325a8c7ad608c
SHA512cc57a70b2c9e28979abcac6ba26bde4c2ffeacdf06a370e8544e557bff58e2324f87fea1b51a3bc8c23a3172282056180b4db0ea613b0906a26e667480a535ff
-
Filesize
378KB
MD5002dccebb515daedd0dcf2e423eead5e
SHA1f4246de95b2e6f3989be1fba0ed1bb079a809ad7
SHA2562732aa8029af8c346964765afc897b8786933b9bebd41c0fcca325a8c7ad608c
SHA512cc57a70b2c9e28979abcac6ba26bde4c2ffeacdf06a370e8544e557bff58e2324f87fea1b51a3bc8c23a3172282056180b4db0ea613b0906a26e667480a535ff