Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04/11/2022, 03:12
Behavioral task
behavioral1
Sample
8a2b079b5f894785c2e138b6010ae1506163b5586de54196a9dfd3a02cf7e796.exe
Resource
win7-20220812-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
8a2b079b5f894785c2e138b6010ae1506163b5586de54196a9dfd3a02cf7e796.exe
Resource
win10v2004-20220812-en
3 signatures
150 seconds
General
-
Target
8a2b079b5f894785c2e138b6010ae1506163b5586de54196a9dfd3a02cf7e796.exe
-
Size
4.0MB
-
MD5
fd030a70bc05c29127c6ceb2579d2244
-
SHA1
a00a54875fd45062467d5958e66ff77f7158a4a7
-
SHA256
8a2b079b5f894785c2e138b6010ae1506163b5586de54196a9dfd3a02cf7e796
-
SHA512
ea102f0e149ad0a005752ae199fd34856ea5f61863a3553d22ebf1de6eacb29b1b0db0feff6f7a619b365597ca1ebae3c7f78bb784df09891ca4319c20101e5e
-
SSDEEP
98304:dW3Nd0C44QF5EZEpCi0IrnWJiMAuEcNyLNL7cpnO8ODxeTO6AgH43CEpzQ:dANd0EZFgDOPGBqnO8OleDT4jzQ
Score
5/10
Malware Config
Signatures
-
Drops file in System32 directory 24 IoCs
description ioc Process File created \??\c:\windows\SysWOW64\opfileOneA 8a2b079b5f894785c2e138b6010ae1506163b5586de54196a9dfd3a02cf7e796.exe File created \??\c:\windows\SysWOW64\syys6.6.1.syw 8a2b079b5f894785c2e138b6010ae1506163b5586de54196a9dfd3a02cf7e796.exe File opened for modification \??\c:\windows\SysWOW64\yytmp1\439412385\rtf.tmp 8a2b079b5f894785c2e138b6010ae1506163b5586de54196a9dfd3a02cf7e796.exe File created \??\c:\windows\SysWOW64\ÓÑÒæÎÄÊé.exe 8a2b079b5f894785c2e138b6010ae1506163b5586de54196a9dfd3a02cf7e796.exe File opened for modification \??\c:\windows\SysWOW64\ÓÑÒæÎÄÊé.exe 8a2b079b5f894785c2e138b6010ae1506163b5586de54196a9dfd3a02cf7e796.exe File created \??\c:\windows\SysWOW64\yytmp1\439412385\439412385.tmp 8a2b079b5f894785c2e138b6010ae1506163b5586de54196a9dfd3a02cf7e796.exe File created \??\c:\windows\SysWOW64\yytmp1\439412385\sx439412385.tmp 8a2b079b5f894785c2e138b6010ae1506163b5586de54196a9dfd3a02cf7e796.exe File opened for modification \??\c:\windows\SysWOW64\yytmp1\439412385\mu439412385.tmp 8a2b079b5f894785c2e138b6010ae1506163b5586de54196a9dfd3a02cf7e796.exe File opened for modification \??\c:\windows\SysWOW64\yytmp1\439412385\sx439412385.tmp 8a2b079b5f894785c2e138b6010ae1506163b5586de54196a9dfd3a02cf7e796.exe File created \??\c:\windows\SysWOW64\yytmp1\ÓÑÒæÎÄÊé.exe 8a2b079b5f894785c2e138b6010ae1506163b5586de54196a9dfd3a02cf7e796.exe File created \??\c:\windows\SysWOW64\yytmp1\ywsfiletmp.tmp 8a2b079b5f894785c2e138b6010ae1506163b5586de54196a9dfd3a02cf7e796.exe File created \??\c:\windows\SysWOW64\yytmp1\439412385\yadviser.tmp 8a2b079b5f894785c2e138b6010ae1506163b5586de54196a9dfd3a02cf7e796.exe File created \??\c:\windows\SysWOW64\yytmp1\439412385\rtf.tmp 8a2b079b5f894785c2e138b6010ae1506163b5586de54196a9dfd3a02cf7e796.exe File created \??\c:\windows\SysWOW64\yytmp1\439412385\mu439412385.tmp 8a2b079b5f894785c2e138b6010ae1506163b5586de54196a9dfd3a02cf7e796.exe File opened for modification \??\c:\windows\SysWOW64\yytmp1\439412385\439412385.tmp 8a2b079b5f894785c2e138b6010ae1506163b5586de54196a9dfd3a02cf7e796.exe File created \??\c:\windows\SysWOW64\opfilejlA 8a2b079b5f894785c2e138b6010ae1506163b5586de54196a9dfd3a02cf7e796.exe File created \??\c:\windows\SysWOW64\yytmp1\439412385\lk439412385.tmp 8a2b079b5f894785c2e138b6010ae1506163b5586de54196a9dfd3a02cf7e796.exe File created \??\c:\windows\SysWOW64\yytmp1\439412385\fj439412385.tmp 8a2b079b5f894785c2e138b6010ae1506163b5586de54196a9dfd3a02cf7e796.exe File opened for modification \??\c:\windows\SysWOW64\opfileOneA 8a2b079b5f894785c2e138b6010ae1506163b5586de54196a9dfd3a02cf7e796.exe File opened for modification \??\c:\windows\SysWOW64\yytmp1\439412385\lk439412385.tmp 8a2b079b5f894785c2e138b6010ae1506163b5586de54196a9dfd3a02cf7e796.exe File opened for modification \??\c:\windows\SysWOW64\yytmp1\439412385\fj439412385.tmp 8a2b079b5f894785c2e138b6010ae1506163b5586de54196a9dfd3a02cf7e796.exe File opened for modification \??\c:\windows\SysWOW64\yytmp1\ÓÑÒæÎÄÊé.exe 8a2b079b5f894785c2e138b6010ae1506163b5586de54196a9dfd3a02cf7e796.exe File opened for modification \??\c:\windows\SysWOW64\opfilejlA 8a2b079b5f894785c2e138b6010ae1506163b5586de54196a9dfd3a02cf7e796.exe File created \??\c:\windows\SysWOW64\yytmp1\ywsinid.files\25.bmp 8a2b079b5f894785c2e138b6010ae1506163b5586de54196a9dfd3a02cf7e796.exe -
Modifies registry class 17 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Word.Document.8 8a2b079b5f894785c2e138b6010ae1506163b5586de54196a9dfd3a02cf7e796.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Word.Document.8\EditFlags = "65536" 8a2b079b5f894785c2e138b6010ae1506163b5586de54196a9dfd3a02cf7e796.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ywsfile\Version 8a2b079b5f894785c2e138b6010ae1506163b5586de54196a9dfd3a02cf7e796.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ywsfile\shell 8a2b079b5f894785c2e138b6010ae1506163b5586de54196a9dfd3a02cf7e796.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ywsfile\DefaultIcon 8a2b079b5f894785c2e138b6010ae1506163b5586de54196a9dfd3a02cf7e796.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Excel.Sheet.8\EditFlags = "65536" 8a2b079b5f894785c2e138b6010ae1506163b5586de54196a9dfd3a02cf7e796.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ywsfile\ = "ÓÑÒæÎÄÊé" 8a2b079b5f894785c2e138b6010ae1506163b5586de54196a9dfd3a02cf7e796.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.yws 8a2b079b5f894785c2e138b6010ae1506163b5586de54196a9dfd3a02cf7e796.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.yws\ = "ywsfile" 8a2b079b5f894785c2e138b6010ae1506163b5586de54196a9dfd3a02cf7e796.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ywsfile\Version\ = "6.6.1" 8a2b079b5f894785c2e138b6010ae1506163b5586de54196a9dfd3a02cf7e796.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ywsfile\isogg = "alrGady" 8a2b079b5f894785c2e138b6010ae1506163b5586de54196a9dfd3a02cf7e796.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ywsfile 8a2b079b5f894785c2e138b6010ae1506163b5586de54196a9dfd3a02cf7e796.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ywsfile\shell\open\command 8a2b079b5f894785c2e138b6010ae1506163b5586de54196a9dfd3a02cf7e796.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ywsfile\shell\open 8a2b079b5f894785c2e138b6010ae1506163b5586de54196a9dfd3a02cf7e796.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ywsfile\shell\open\command\ = "c:\\windows\\SysWow64\\ÓÑÒæÎÄÊé.exe %1" 8a2b079b5f894785c2e138b6010ae1506163b5586de54196a9dfd3a02cf7e796.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\PowerPoint.Show.8\EditFlags = "65536" 8a2b079b5f894785c2e138b6010ae1506163b5586de54196a9dfd3a02cf7e796.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ywsfile\DefaultIcon\ = "c:\\windows\\SysWow64\\ÓÑÒæÎÄÊé.exe,1" 8a2b079b5f894785c2e138b6010ae1506163b5586de54196a9dfd3a02cf7e796.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4904 8a2b079b5f894785c2e138b6010ae1506163b5586de54196a9dfd3a02cf7e796.exe 4904 8a2b079b5f894785c2e138b6010ae1506163b5586de54196a9dfd3a02cf7e796.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a2b079b5f894785c2e138b6010ae1506163b5586de54196a9dfd3a02cf7e796.exe"C:\Users\Admin\AppData\Local\Temp\8a2b079b5f894785c2e138b6010ae1506163b5586de54196a9dfd3a02cf7e796.exe"1⤵
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4904