Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
21-11-2022 23:23
Static task
static1
Behavioral task
behavioral1
Sample
596554d63dce5dc476c121ec9c57bb6d8fd100d2edb74ebe64c0420c994269a2.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
596554d63dce5dc476c121ec9c57bb6d8fd100d2edb74ebe64c0420c994269a2.exe
Resource
win10v2004-20221111-en
General
-
Target
596554d63dce5dc476c121ec9c57bb6d8fd100d2edb74ebe64c0420c994269a2.exe
-
Size
138KB
-
MD5
9fa6e37933b29ec5e45dffa56b95fa7d
-
SHA1
281dee9f021d1b4c06d115be4c5b26e4ee7c6d04
-
SHA256
596554d63dce5dc476c121ec9c57bb6d8fd100d2edb74ebe64c0420c994269a2
-
SHA512
323cde86992b416492e94dfbd41b3cd9bf5e94f7c7d5146086032dd6fe6676ed3385dbe75de920035133755dcdaf004488c3b8ab7f31e14cda8cb58f81498b08
-
SSDEEP
3072:KTMx50VJqtHGbu5XCniylWrtGA1GHvGXaCH1Fukp1YPm3wQGC:KTMoGtmiYlW4A1QvGXjBY5QGC
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1992 yftau.exe -
Deletes itself 1 IoCs
pid Process 2004 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 2032 596554d63dce5dc476c121ec9c57bb6d8fd100d2edb74ebe64c0420c994269a2.exe 2032 596554d63dce5dc476c121ec9c57bb6d8fd100d2edb74ebe64c0420c994269a2.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\Currentversion\Run yftau.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\{6358F804-0BBB-ACFF-85DE-C4959FB19243} = "C:\\Users\\Admin\\AppData\\Roaming\\Puweiq\\yftau.exe" yftau.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2032 set thread context of 2004 2032 596554d63dce5dc476c121ec9c57bb6d8fd100d2edb74ebe64c0420c994269a2.exe 29 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Privacy 596554d63dce5dc476c121ec9c57bb6d8fd100d2edb74ebe64c0420c994269a2.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 596554d63dce5dc476c121ec9c57bb6d8fd100d2edb74ebe64c0420c994269a2.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\74D6402E-00000001.eml:OECustomProperty WinMail.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 1992 yftau.exe 1992 yftau.exe 1992 yftau.exe 1992 yftau.exe 1992 yftau.exe 1992 yftau.exe 1992 yftau.exe 1992 yftau.exe 1992 yftau.exe 1992 yftau.exe 1992 yftau.exe 1992 yftau.exe 1992 yftau.exe 1992 yftau.exe 1992 yftau.exe 1992 yftau.exe 1992 yftau.exe 1992 yftau.exe 1992 yftau.exe 1992 yftau.exe 1992 yftau.exe 1992 yftau.exe 1992 yftau.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeSecurityPrivilege 2032 596554d63dce5dc476c121ec9c57bb6d8fd100d2edb74ebe64c0420c994269a2.exe Token: SeSecurityPrivilege 2032 596554d63dce5dc476c121ec9c57bb6d8fd100d2edb74ebe64c0420c994269a2.exe Token: SeSecurityPrivilege 2032 596554d63dce5dc476c121ec9c57bb6d8fd100d2edb74ebe64c0420c994269a2.exe Token: SeManageVolumePrivilege 696 WinMail.exe Token: SeSecurityPrivilege 2004 cmd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 696 WinMail.exe -
Suspicious use of WriteProcessMemory 53 IoCs
description pid Process procid_target PID 2032 wrote to memory of 1992 2032 596554d63dce5dc476c121ec9c57bb6d8fd100d2edb74ebe64c0420c994269a2.exe 27 PID 2032 wrote to memory of 1992 2032 596554d63dce5dc476c121ec9c57bb6d8fd100d2edb74ebe64c0420c994269a2.exe 27 PID 2032 wrote to memory of 1992 2032 596554d63dce5dc476c121ec9c57bb6d8fd100d2edb74ebe64c0420c994269a2.exe 27 PID 2032 wrote to memory of 1992 2032 596554d63dce5dc476c121ec9c57bb6d8fd100d2edb74ebe64c0420c994269a2.exe 27 PID 1992 wrote to memory of 1232 1992 yftau.exe 10 PID 1992 wrote to memory of 1232 1992 yftau.exe 10 PID 1992 wrote to memory of 1232 1992 yftau.exe 10 PID 1992 wrote to memory of 1232 1992 yftau.exe 10 PID 1992 wrote to memory of 1232 1992 yftau.exe 10 PID 1992 wrote to memory of 1328 1992 yftau.exe 9 PID 1992 wrote to memory of 1328 1992 yftau.exe 9 PID 1992 wrote to memory of 1328 1992 yftau.exe 9 PID 1992 wrote to memory of 1328 1992 yftau.exe 9 PID 1992 wrote to memory of 1328 1992 yftau.exe 9 PID 1992 wrote to memory of 1368 1992 yftau.exe 8 PID 1992 wrote to memory of 1368 1992 yftau.exe 8 PID 1992 wrote to memory of 1368 1992 yftau.exe 8 PID 1992 wrote to memory of 1368 1992 yftau.exe 8 PID 1992 wrote to memory of 1368 1992 yftau.exe 8 PID 1992 wrote to memory of 2032 1992 yftau.exe 26 PID 1992 wrote to memory of 2032 1992 yftau.exe 26 PID 1992 wrote to memory of 2032 1992 yftau.exe 26 PID 1992 wrote to memory of 2032 1992 yftau.exe 26 PID 1992 wrote to memory of 2032 1992 yftau.exe 26 PID 1992 wrote to memory of 696 1992 yftau.exe 28 PID 1992 wrote to memory of 696 1992 yftau.exe 28 PID 1992 wrote to memory of 696 1992 yftau.exe 28 PID 1992 wrote to memory of 696 1992 yftau.exe 28 PID 1992 wrote to memory of 696 1992 yftau.exe 28 PID 2032 wrote to memory of 2004 2032 596554d63dce5dc476c121ec9c57bb6d8fd100d2edb74ebe64c0420c994269a2.exe 29 PID 2032 wrote to memory of 2004 2032 596554d63dce5dc476c121ec9c57bb6d8fd100d2edb74ebe64c0420c994269a2.exe 29 PID 2032 wrote to memory of 2004 2032 596554d63dce5dc476c121ec9c57bb6d8fd100d2edb74ebe64c0420c994269a2.exe 29 PID 2032 wrote to memory of 2004 2032 596554d63dce5dc476c121ec9c57bb6d8fd100d2edb74ebe64c0420c994269a2.exe 29 PID 2032 wrote to memory of 2004 2032 596554d63dce5dc476c121ec9c57bb6d8fd100d2edb74ebe64c0420c994269a2.exe 29 PID 2032 wrote to memory of 2004 2032 596554d63dce5dc476c121ec9c57bb6d8fd100d2edb74ebe64c0420c994269a2.exe 29 PID 2032 wrote to memory of 2004 2032 596554d63dce5dc476c121ec9c57bb6d8fd100d2edb74ebe64c0420c994269a2.exe 29 PID 2032 wrote to memory of 2004 2032 596554d63dce5dc476c121ec9c57bb6d8fd100d2edb74ebe64c0420c994269a2.exe 29 PID 2032 wrote to memory of 2004 2032 596554d63dce5dc476c121ec9c57bb6d8fd100d2edb74ebe64c0420c994269a2.exe 29 PID 1992 wrote to memory of 884 1992 yftau.exe 30 PID 1992 wrote to memory of 884 1992 yftau.exe 30 PID 1992 wrote to memory of 884 1992 yftau.exe 30 PID 1992 wrote to memory of 884 1992 yftau.exe 30 PID 1992 wrote to memory of 884 1992 yftau.exe 30 PID 1992 wrote to memory of 852 1992 yftau.exe 31 PID 1992 wrote to memory of 852 1992 yftau.exe 31 PID 1992 wrote to memory of 852 1992 yftau.exe 31 PID 1992 wrote to memory of 852 1992 yftau.exe 31 PID 1992 wrote to memory of 852 1992 yftau.exe 31 PID 1992 wrote to memory of 1676 1992 yftau.exe 32 PID 1992 wrote to memory of 1676 1992 yftau.exe 32 PID 1992 wrote to memory of 1676 1992 yftau.exe 32 PID 1992 wrote to memory of 1676 1992 yftau.exe 32 PID 1992 wrote to memory of 1676 1992 yftau.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1368
-
C:\Users\Admin\AppData\Local\Temp\596554d63dce5dc476c121ec9c57bb6d8fd100d2edb74ebe64c0420c994269a2.exe"C:\Users\Admin\AppData\Local\Temp\596554d63dce5dc476c121ec9c57bb6d8fd100d2edb74ebe64c0420c994269a2.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Roaming\Puweiq\yftau.exe"C:\Users\Admin\AppData\Roaming\Puweiq\yftau.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1992
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp53de9cf6.bat"3⤵
- Deletes itself
- Suspicious use of AdjustPrivilegeToken
PID:2004
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1328
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1232
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:696
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "95036919215964192354743884261089658069-1474475517914217601045104048-730833611"1⤵PID:884
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:852
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1676
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD5e717005a06f9fcc35f61b9919d9424ff
SHA10cf40e5c4e0abd21831dd297a850d4695c798b66
SHA256148f090021b51e25e967bb9d2969609e054f09b24456fbb1013804ce3afb092d
SHA5121f02c6a7128b6e1e82583ac89b6b77fe3953d798852594ff9acf432502a3ff459b055f56b8998c89dcc6151a6150eb8eff40359c6f360c736b8f787c00ca2f25
-
Filesize
138KB
MD564827ca37de26f33d4b3aea1c243ea00
SHA14ca64dd937bddc8145a4690beab0f836294b1bac
SHA2569c069d1fccea2d6608c5f43fa90af48b6592edc592e58614bbd19c69f1a2375a
SHA51200d789e9de3da43c1bdb48c32641775b0723493344263be296b0d45ca500d3972839d46ba31100d6e1548bcc3f84c6c014d20ee35f22e7ba4b297de89553f2d0
-
Filesize
138KB
MD564827ca37de26f33d4b3aea1c243ea00
SHA14ca64dd937bddc8145a4690beab0f836294b1bac
SHA2569c069d1fccea2d6608c5f43fa90af48b6592edc592e58614bbd19c69f1a2375a
SHA51200d789e9de3da43c1bdb48c32641775b0723493344263be296b0d45ca500d3972839d46ba31100d6e1548bcc3f84c6c014d20ee35f22e7ba4b297de89553f2d0
-
Filesize
398B
MD5b104f90d2b590e60cbeeb257859340f1
SHA104804b6479eda1c0fd79b0d378d82d415ca54bcf
SHA2560ff7d174641af179ea0f3226ef14721eff45b69e185c7eda88b9125d806dc76a
SHA512d58da341892855a6f678d440db7af1d296fbabe113a19a173fac3f3e4d9335b6913729bf9044ff3f99092904702641e4f65cf10c245ab86067ce9b27a8d25115
-
Filesize
138KB
MD564827ca37de26f33d4b3aea1c243ea00
SHA14ca64dd937bddc8145a4690beab0f836294b1bac
SHA2569c069d1fccea2d6608c5f43fa90af48b6592edc592e58614bbd19c69f1a2375a
SHA51200d789e9de3da43c1bdb48c32641775b0723493344263be296b0d45ca500d3972839d46ba31100d6e1548bcc3f84c6c014d20ee35f22e7ba4b297de89553f2d0
-
Filesize
138KB
MD564827ca37de26f33d4b3aea1c243ea00
SHA14ca64dd937bddc8145a4690beab0f836294b1bac
SHA2569c069d1fccea2d6608c5f43fa90af48b6592edc592e58614bbd19c69f1a2375a
SHA51200d789e9de3da43c1bdb48c32641775b0723493344263be296b0d45ca500d3972839d46ba31100d6e1548bcc3f84c6c014d20ee35f22e7ba4b297de89553f2d0