Analysis
-
max time kernel
151s -
max time network
64s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20-10-2022 22:13
Static task
static1
Behavioral task
behavioral1
Sample
e6173e325e953b4c723c2d48a8ad1e764e44ede3eefcaf54d5eea7c0eb6f052b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e6173e325e953b4c723c2d48a8ad1e764e44ede3eefcaf54d5eea7c0eb6f052b.exe
Resource
win10v2004-20220901-en
General
-
Target
e6173e325e953b4c723c2d48a8ad1e764e44ede3eefcaf54d5eea7c0eb6f052b.exe
-
Size
272KB
-
MD5
4e5cd7aab2d7865018ce6724740bcc80
-
SHA1
cc99b0c2a2d916dac2f7143dd981db82a4161222
-
SHA256
e6173e325e953b4c723c2d48a8ad1e764e44ede3eefcaf54d5eea7c0eb6f052b
-
SHA512
12ddc638a7aec9b447355beb72af468741b56b20f4cf20cf03eb0ed7d14739c8c0f1c40d1dc710c2f3ff76f543020c0396288428c6cd152187ec94d4fc824033
-
SSDEEP
3072:0jsxTNg91R0FvbVJznCRcy/hqF69MSs/PLLK+ammU3YwgTeA3P9:ZzS8fznHC39G/PLLKU3YwgT
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" youwig.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" e6173e325e953b4c723c2d48a8ad1e764e44ede3eefcaf54d5eea7c0eb6f052b.exe -
Executes dropped EXE 1 IoCs
pid Process 1444 youwig.exe -
Loads dropped DLL 2 IoCs
pid Process 2020 e6173e325e953b4c723c2d48a8ad1e764e44ede3eefcaf54d5eea7c0eb6f052b.exe 2020 e6173e325e953b4c723c2d48a8ad1e764e44ede3eefcaf54d5eea7c0eb6f052b.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ youwig.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\youwig = "C:\\Users\\Admin\\youwig.exe /m" youwig.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\youwig = "C:\\Users\\Admin\\youwig.exe /o" youwig.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\youwig = "C:\\Users\\Admin\\youwig.exe /x" e6173e325e953b4c723c2d48a8ad1e764e44ede3eefcaf54d5eea7c0eb6f052b.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\youwig = "C:\\Users\\Admin\\youwig.exe /t" youwig.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\youwig = "C:\\Users\\Admin\\youwig.exe /s" youwig.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\youwig = "C:\\Users\\Admin\\youwig.exe /y" youwig.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\youwig = "C:\\Users\\Admin\\youwig.exe /h" youwig.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\youwig = "C:\\Users\\Admin\\youwig.exe /a" youwig.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\youwig = "C:\\Users\\Admin\\youwig.exe /j" youwig.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\youwig = "C:\\Users\\Admin\\youwig.exe /z" youwig.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\youwig = "C:\\Users\\Admin\\youwig.exe /q" youwig.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\youwig = "C:\\Users\\Admin\\youwig.exe /u" youwig.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\youwig = "C:\\Users\\Admin\\youwig.exe /l" youwig.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\youwig = "C:\\Users\\Admin\\youwig.exe /e" youwig.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\youwig = "C:\\Users\\Admin\\youwig.exe /w" youwig.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\youwig = "C:\\Users\\Admin\\youwig.exe /n" youwig.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\youwig = "C:\\Users\\Admin\\youwig.exe /i" youwig.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\youwig = "C:\\Users\\Admin\\youwig.exe /v" youwig.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\youwig = "C:\\Users\\Admin\\youwig.exe /r" youwig.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\youwig = "C:\\Users\\Admin\\youwig.exe /f" youwig.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\youwig = "C:\\Users\\Admin\\youwig.exe /c" youwig.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\youwig = "C:\\Users\\Admin\\youwig.exe /g" youwig.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\youwig = "C:\\Users\\Admin\\youwig.exe /b" youwig.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\youwig = "C:\\Users\\Admin\\youwig.exe /p" youwig.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\youwig = "C:\\Users\\Admin\\youwig.exe /k" youwig.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\youwig = "C:\\Users\\Admin\\youwig.exe /d" youwig.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\youwig = "C:\\Users\\Admin\\youwig.exe /x" youwig.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ e6173e325e953b4c723c2d48a8ad1e764e44ede3eefcaf54d5eea7c0eb6f052b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2020 e6173e325e953b4c723c2d48a8ad1e764e44ede3eefcaf54d5eea7c0eb6f052b.exe 1444 youwig.exe 1444 youwig.exe 1444 youwig.exe 1444 youwig.exe 1444 youwig.exe 1444 youwig.exe 1444 youwig.exe 1444 youwig.exe 1444 youwig.exe 1444 youwig.exe 1444 youwig.exe 1444 youwig.exe 1444 youwig.exe 1444 youwig.exe 1444 youwig.exe 1444 youwig.exe 1444 youwig.exe 1444 youwig.exe 1444 youwig.exe 1444 youwig.exe 1444 youwig.exe 1444 youwig.exe 1444 youwig.exe 1444 youwig.exe 1444 youwig.exe 1444 youwig.exe 1444 youwig.exe 1444 youwig.exe 1444 youwig.exe 1444 youwig.exe 1444 youwig.exe 1444 youwig.exe 1444 youwig.exe 1444 youwig.exe 1444 youwig.exe 1444 youwig.exe 1444 youwig.exe 1444 youwig.exe 1444 youwig.exe 1444 youwig.exe 1444 youwig.exe 1444 youwig.exe 1444 youwig.exe 1444 youwig.exe 1444 youwig.exe 1444 youwig.exe 1444 youwig.exe 1444 youwig.exe 1444 youwig.exe 1444 youwig.exe 1444 youwig.exe 1444 youwig.exe 1444 youwig.exe 1444 youwig.exe 1444 youwig.exe 1444 youwig.exe 1444 youwig.exe 1444 youwig.exe 1444 youwig.exe 1444 youwig.exe 1444 youwig.exe 1444 youwig.exe 1444 youwig.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2020 e6173e325e953b4c723c2d48a8ad1e764e44ede3eefcaf54d5eea7c0eb6f052b.exe 1444 youwig.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2020 wrote to memory of 1444 2020 e6173e325e953b4c723c2d48a8ad1e764e44ede3eefcaf54d5eea7c0eb6f052b.exe 26 PID 2020 wrote to memory of 1444 2020 e6173e325e953b4c723c2d48a8ad1e764e44ede3eefcaf54d5eea7c0eb6f052b.exe 26 PID 2020 wrote to memory of 1444 2020 e6173e325e953b4c723c2d48a8ad1e764e44ede3eefcaf54d5eea7c0eb6f052b.exe 26 PID 2020 wrote to memory of 1444 2020 e6173e325e953b4c723c2d48a8ad1e764e44ede3eefcaf54d5eea7c0eb6f052b.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\e6173e325e953b4c723c2d48a8ad1e764e44ede3eefcaf54d5eea7c0eb6f052b.exe"C:\Users\Admin\AppData\Local\Temp\e6173e325e953b4c723c2d48a8ad1e764e44ede3eefcaf54d5eea7c0eb6f052b.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\youwig.exe"C:\Users\Admin\youwig.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1444
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
272KB
MD54e5cd7aab2d7865018ce6724740bcc80
SHA1cc99b0c2a2d916dac2f7143dd981db82a4161222
SHA256e6173e325e953b4c723c2d48a8ad1e764e44ede3eefcaf54d5eea7c0eb6f052b
SHA51212ddc638a7aec9b447355beb72af468741b56b20f4cf20cf03eb0ed7d14739c8c0f1c40d1dc710c2f3ff76f543020c0396288428c6cd152187ec94d4fc824033
-
Filesize
272KB
MD54e5cd7aab2d7865018ce6724740bcc80
SHA1cc99b0c2a2d916dac2f7143dd981db82a4161222
SHA256e6173e325e953b4c723c2d48a8ad1e764e44ede3eefcaf54d5eea7c0eb6f052b
SHA51212ddc638a7aec9b447355beb72af468741b56b20f4cf20cf03eb0ed7d14739c8c0f1c40d1dc710c2f3ff76f543020c0396288428c6cd152187ec94d4fc824033
-
Filesize
272KB
MD54e5cd7aab2d7865018ce6724740bcc80
SHA1cc99b0c2a2d916dac2f7143dd981db82a4161222
SHA256e6173e325e953b4c723c2d48a8ad1e764e44ede3eefcaf54d5eea7c0eb6f052b
SHA51212ddc638a7aec9b447355beb72af468741b56b20f4cf20cf03eb0ed7d14739c8c0f1c40d1dc710c2f3ff76f543020c0396288428c6cd152187ec94d4fc824033
-
Filesize
272KB
MD54e5cd7aab2d7865018ce6724740bcc80
SHA1cc99b0c2a2d916dac2f7143dd981db82a4161222
SHA256e6173e325e953b4c723c2d48a8ad1e764e44ede3eefcaf54d5eea7c0eb6f052b
SHA51212ddc638a7aec9b447355beb72af468741b56b20f4cf20cf03eb0ed7d14739c8c0f1c40d1dc710c2f3ff76f543020c0396288428c6cd152187ec94d4fc824033