Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2022 20:51
Static task
static1
Behavioral task
behavioral1
Sample
fa6828e1cedcc19289d3e030bc756486328d2a7bfc7b53804006e828fc5d36e8.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
fa6828e1cedcc19289d3e030bc756486328d2a7bfc7b53804006e828fc5d36e8.exe
Resource
win10v2004-20220812-en
General
-
Target
fa6828e1cedcc19289d3e030bc756486328d2a7bfc7b53804006e828fc5d36e8.exe
-
Size
140KB
-
MD5
0cb4416aeafb245609fdde53974886ac
-
SHA1
a665f2feed56c97da9c3db9fd68d0a1e44fc8fa2
-
SHA256
fa6828e1cedcc19289d3e030bc756486328d2a7bfc7b53804006e828fc5d36e8
-
SHA512
737d0d42ed872188542b85420f28cba447c05d422d7282b490f03ef390940761569a52f8f96b561aed87478dd7ab435d4ff527b682017c7a081e9e2ecc784cb6
-
SSDEEP
1536:0JoQjKVQrGkYAcANSU+MNG5ipzqYbCa3458X77UsMJn1ogCnzqLcTJLO01DvqKW:3QrrGkYnAS4R77UsMJn1opVwfG
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" fa6828e1cedcc19289d3e030bc756486328d2a7bfc7b53804006e828fc5d36e8.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ylbiup.exe -
Executes dropped EXE 1 IoCs
pid Process 436 ylbiup.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation fa6828e1cedcc19289d3e030bc756486328d2a7bfc7b53804006e828fc5d36e8.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ fa6828e1cedcc19289d3e030bc756486328d2a7bfc7b53804006e828fc5d36e8.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ylbiup = "C:\\Users\\Admin\\ylbiup.exe /c" ylbiup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ylbiup = "C:\\Users\\Admin\\ylbiup.exe /j" ylbiup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ylbiup = "C:\\Users\\Admin\\ylbiup.exe /q" ylbiup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ylbiup = "C:\\Users\\Admin\\ylbiup.exe /m" ylbiup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ylbiup = "C:\\Users\\Admin\\ylbiup.exe /b" ylbiup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ylbiup = "C:\\Users\\Admin\\ylbiup.exe /o" ylbiup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ylbiup = "C:\\Users\\Admin\\ylbiup.exe /x" ylbiup.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ ylbiup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ylbiup = "C:\\Users\\Admin\\ylbiup.exe /d" ylbiup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ylbiup = "C:\\Users\\Admin\\ylbiup.exe /f" ylbiup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ylbiup = "C:\\Users\\Admin\\ylbiup.exe /n" fa6828e1cedcc19289d3e030bc756486328d2a7bfc7b53804006e828fc5d36e8.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ylbiup = "C:\\Users\\Admin\\ylbiup.exe /s" ylbiup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ylbiup = "C:\\Users\\Admin\\ylbiup.exe /h" ylbiup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ylbiup = "C:\\Users\\Admin\\ylbiup.exe /u" ylbiup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ylbiup = "C:\\Users\\Admin\\ylbiup.exe /w" ylbiup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ylbiup = "C:\\Users\\Admin\\ylbiup.exe /y" ylbiup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ylbiup = "C:\\Users\\Admin\\ylbiup.exe /g" ylbiup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ylbiup = "C:\\Users\\Admin\\ylbiup.exe /e" ylbiup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ylbiup = "C:\\Users\\Admin\\ylbiup.exe /l" ylbiup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ylbiup = "C:\\Users\\Admin\\ylbiup.exe /z" ylbiup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ylbiup = "C:\\Users\\Admin\\ylbiup.exe /k" ylbiup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ylbiup = "C:\\Users\\Admin\\ylbiup.exe /a" ylbiup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ylbiup = "C:\\Users\\Admin\\ylbiup.exe /v" ylbiup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ylbiup = "C:\\Users\\Admin\\ylbiup.exe /i" ylbiup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ylbiup = "C:\\Users\\Admin\\ylbiup.exe /r" ylbiup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ylbiup = "C:\\Users\\Admin\\ylbiup.exe /p" ylbiup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ylbiup = "C:\\Users\\Admin\\ylbiup.exe /n" ylbiup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ylbiup = "C:\\Users\\Admin\\ylbiup.exe /t" ylbiup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2008 fa6828e1cedcc19289d3e030bc756486328d2a7bfc7b53804006e828fc5d36e8.exe 2008 fa6828e1cedcc19289d3e030bc756486328d2a7bfc7b53804006e828fc5d36e8.exe 436 ylbiup.exe 436 ylbiup.exe 436 ylbiup.exe 436 ylbiup.exe 436 ylbiup.exe 436 ylbiup.exe 436 ylbiup.exe 436 ylbiup.exe 436 ylbiup.exe 436 ylbiup.exe 436 ylbiup.exe 436 ylbiup.exe 436 ylbiup.exe 436 ylbiup.exe 436 ylbiup.exe 436 ylbiup.exe 436 ylbiup.exe 436 ylbiup.exe 436 ylbiup.exe 436 ylbiup.exe 436 ylbiup.exe 436 ylbiup.exe 436 ylbiup.exe 436 ylbiup.exe 436 ylbiup.exe 436 ylbiup.exe 436 ylbiup.exe 436 ylbiup.exe 436 ylbiup.exe 436 ylbiup.exe 436 ylbiup.exe 436 ylbiup.exe 436 ylbiup.exe 436 ylbiup.exe 436 ylbiup.exe 436 ylbiup.exe 436 ylbiup.exe 436 ylbiup.exe 436 ylbiup.exe 436 ylbiup.exe 436 ylbiup.exe 436 ylbiup.exe 436 ylbiup.exe 436 ylbiup.exe 436 ylbiup.exe 436 ylbiup.exe 436 ylbiup.exe 436 ylbiup.exe 436 ylbiup.exe 436 ylbiup.exe 436 ylbiup.exe 436 ylbiup.exe 436 ylbiup.exe 436 ylbiup.exe 436 ylbiup.exe 436 ylbiup.exe 436 ylbiup.exe 436 ylbiup.exe 436 ylbiup.exe 436 ylbiup.exe 436 ylbiup.exe 436 ylbiup.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2008 fa6828e1cedcc19289d3e030bc756486328d2a7bfc7b53804006e828fc5d36e8.exe 2008 fa6828e1cedcc19289d3e030bc756486328d2a7bfc7b53804006e828fc5d36e8.exe 436 ylbiup.exe 436 ylbiup.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2008 wrote to memory of 436 2008 fa6828e1cedcc19289d3e030bc756486328d2a7bfc7b53804006e828fc5d36e8.exe 79 PID 2008 wrote to memory of 436 2008 fa6828e1cedcc19289d3e030bc756486328d2a7bfc7b53804006e828fc5d36e8.exe 79 PID 2008 wrote to memory of 436 2008 fa6828e1cedcc19289d3e030bc756486328d2a7bfc7b53804006e828fc5d36e8.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa6828e1cedcc19289d3e030bc756486328d2a7bfc7b53804006e828fc5d36e8.exe"C:\Users\Admin\AppData\Local\Temp\fa6828e1cedcc19289d3e030bc756486328d2a7bfc7b53804006e828fc5d36e8.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\ylbiup.exe"C:\Users\Admin\ylbiup.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:436
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
140KB
MD55457717d28b034f08607ed2fbeebb8ee
SHA1a4b88b76adf61770eabf729a383f2af0d6d7b889
SHA25620549d805583fbcf435659f6f691926ae2faab36e245b2630f5b449a954b11b9
SHA51295259549a04eca9905f3255a04bfd74e2d5295c554741ce18517c97e6fd2a46138c1d5a7e2edda33a8e1f8a5e288b715e46186f581675034f6a11e8994e47c43
-
Filesize
140KB
MD55457717d28b034f08607ed2fbeebb8ee
SHA1a4b88b76adf61770eabf729a383f2af0d6d7b889
SHA25620549d805583fbcf435659f6f691926ae2faab36e245b2630f5b449a954b11b9
SHA51295259549a04eca9905f3255a04bfd74e2d5295c554741ce18517c97e6fd2a46138c1d5a7e2edda33a8e1f8a5e288b715e46186f581675034f6a11e8994e47c43