Analysis
-
max time kernel
191s -
max time network
224s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:45
Static task
static1
Behavioral task
behavioral1
Sample
5f713449823d914c2d75308e6475fda37bd86c87b3e20c8e81010894c8c357ba.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5f713449823d914c2d75308e6475fda37bd86c87b3e20c8e81010894c8c357ba.exe
Resource
win10v2004-20221111-en
General
-
Target
5f713449823d914c2d75308e6475fda37bd86c87b3e20c8e81010894c8c357ba.exe
-
Size
321KB
-
MD5
2464355c63e0e31c9f013b79becc0a85
-
SHA1
925a116b78c88b240b0a75b5c5afeefaf36162d5
-
SHA256
5f713449823d914c2d75308e6475fda37bd86c87b3e20c8e81010894c8c357ba
-
SHA512
566dd42711232bfbe1c44ac6b9c12c3638c5be29a45a589d1e86cf0e36742f1ecc4b2281f1b87093a6b13fd47cfa7b256da2eb3ba534afec24a190cf75db65d8
-
SSDEEP
6144:eT+FQogd7PswMHScIOq1G/PJRnC2CkErfoe:RFhgkycBqwJRC2gce
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
ybjuv.exepid process 848 ybjuv.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 768 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
5f713449823d914c2d75308e6475fda37bd86c87b3e20c8e81010894c8c357ba.exepid process 1508 5f713449823d914c2d75308e6475fda37bd86c87b3e20c8e81010894c8c357ba.exe 1508 5f713449823d914c2d75308e6475fda37bd86c87b3e20c8e81010894c8c357ba.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
ybjuv.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\Currentversion\Run ybjuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\{7B2FDFC8-3774-AD4D-C411-AE4FF0968D52} = "C:\\Users\\Admin\\AppData\\Roaming\\Mouv\\ybjuv.exe" ybjuv.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
5f713449823d914c2d75308e6475fda37bd86c87b3e20c8e81010894c8c357ba.exedescription pid process target process PID 1508 set thread context of 768 1508 5f713449823d914c2d75308e6475fda37bd86c87b3e20c8e81010894c8c357ba.exe cmd.exe -
Processes:
5f713449823d914c2d75308e6475fda37bd86c87b3e20c8e81010894c8c357ba.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Privacy 5f713449823d914c2d75308e6475fda37bd86c87b3e20c8e81010894c8c357ba.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 5f713449823d914c2d75308e6475fda37bd86c87b3e20c8e81010894c8c357ba.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
Processes:
ybjuv.exepid process 848 ybjuv.exe 848 ybjuv.exe 848 ybjuv.exe 848 ybjuv.exe 848 ybjuv.exe 848 ybjuv.exe 848 ybjuv.exe 848 ybjuv.exe 848 ybjuv.exe 848 ybjuv.exe 848 ybjuv.exe 848 ybjuv.exe 848 ybjuv.exe 848 ybjuv.exe 848 ybjuv.exe 848 ybjuv.exe 848 ybjuv.exe 848 ybjuv.exe 848 ybjuv.exe 848 ybjuv.exe 848 ybjuv.exe 848 ybjuv.exe 848 ybjuv.exe 848 ybjuv.exe 848 ybjuv.exe 848 ybjuv.exe 848 ybjuv.exe 848 ybjuv.exe -
Suspicious use of UnmapMainImage 2 IoCs
Processes:
5f713449823d914c2d75308e6475fda37bd86c87b3e20c8e81010894c8c357ba.exeybjuv.exepid process 1508 5f713449823d914c2d75308e6475fda37bd86c87b3e20c8e81010894c8c357ba.exe 848 ybjuv.exe -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
5f713449823d914c2d75308e6475fda37bd86c87b3e20c8e81010894c8c357ba.exeybjuv.exedescription pid process target process PID 1508 wrote to memory of 848 1508 5f713449823d914c2d75308e6475fda37bd86c87b3e20c8e81010894c8c357ba.exe ybjuv.exe PID 1508 wrote to memory of 848 1508 5f713449823d914c2d75308e6475fda37bd86c87b3e20c8e81010894c8c357ba.exe ybjuv.exe PID 1508 wrote to memory of 848 1508 5f713449823d914c2d75308e6475fda37bd86c87b3e20c8e81010894c8c357ba.exe ybjuv.exe PID 1508 wrote to memory of 848 1508 5f713449823d914c2d75308e6475fda37bd86c87b3e20c8e81010894c8c357ba.exe ybjuv.exe PID 848 wrote to memory of 1116 848 ybjuv.exe taskhost.exe PID 848 wrote to memory of 1116 848 ybjuv.exe taskhost.exe PID 848 wrote to memory of 1116 848 ybjuv.exe taskhost.exe PID 848 wrote to memory of 1116 848 ybjuv.exe taskhost.exe PID 848 wrote to memory of 1116 848 ybjuv.exe taskhost.exe PID 848 wrote to memory of 1212 848 ybjuv.exe Dwm.exe PID 848 wrote to memory of 1212 848 ybjuv.exe Dwm.exe PID 848 wrote to memory of 1212 848 ybjuv.exe Dwm.exe PID 848 wrote to memory of 1212 848 ybjuv.exe Dwm.exe PID 848 wrote to memory of 1212 848 ybjuv.exe Dwm.exe PID 848 wrote to memory of 1244 848 ybjuv.exe Explorer.EXE PID 848 wrote to memory of 1244 848 ybjuv.exe Explorer.EXE PID 848 wrote to memory of 1244 848 ybjuv.exe Explorer.EXE PID 848 wrote to memory of 1244 848 ybjuv.exe Explorer.EXE PID 848 wrote to memory of 1244 848 ybjuv.exe Explorer.EXE PID 848 wrote to memory of 1508 848 ybjuv.exe 5f713449823d914c2d75308e6475fda37bd86c87b3e20c8e81010894c8c357ba.exe PID 848 wrote to memory of 1508 848 ybjuv.exe 5f713449823d914c2d75308e6475fda37bd86c87b3e20c8e81010894c8c357ba.exe PID 848 wrote to memory of 1508 848 ybjuv.exe 5f713449823d914c2d75308e6475fda37bd86c87b3e20c8e81010894c8c357ba.exe PID 848 wrote to memory of 1508 848 ybjuv.exe 5f713449823d914c2d75308e6475fda37bd86c87b3e20c8e81010894c8c357ba.exe PID 848 wrote to memory of 1508 848 ybjuv.exe 5f713449823d914c2d75308e6475fda37bd86c87b3e20c8e81010894c8c357ba.exe PID 1508 wrote to memory of 768 1508 5f713449823d914c2d75308e6475fda37bd86c87b3e20c8e81010894c8c357ba.exe cmd.exe PID 1508 wrote to memory of 768 1508 5f713449823d914c2d75308e6475fda37bd86c87b3e20c8e81010894c8c357ba.exe cmd.exe PID 1508 wrote to memory of 768 1508 5f713449823d914c2d75308e6475fda37bd86c87b3e20c8e81010894c8c357ba.exe cmd.exe PID 1508 wrote to memory of 768 1508 5f713449823d914c2d75308e6475fda37bd86c87b3e20c8e81010894c8c357ba.exe cmd.exe PID 1508 wrote to memory of 768 1508 5f713449823d914c2d75308e6475fda37bd86c87b3e20c8e81010894c8c357ba.exe cmd.exe PID 1508 wrote to memory of 768 1508 5f713449823d914c2d75308e6475fda37bd86c87b3e20c8e81010894c8c357ba.exe cmd.exe PID 1508 wrote to memory of 768 1508 5f713449823d914c2d75308e6475fda37bd86c87b3e20c8e81010894c8c357ba.exe cmd.exe PID 1508 wrote to memory of 768 1508 5f713449823d914c2d75308e6475fda37bd86c87b3e20c8e81010894c8c357ba.exe cmd.exe PID 1508 wrote to memory of 768 1508 5f713449823d914c2d75308e6475fda37bd86c87b3e20c8e81010894c8c357ba.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1244
-
C:\Users\Admin\AppData\Local\Temp\5f713449823d914c2d75308e6475fda37bd86c87b3e20c8e81010894c8c357ba.exe"C:\Users\Admin\AppData\Local\Temp\5f713449823d914c2d75308e6475fda37bd86c87b3e20c8e81010894c8c357ba.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Users\Admin\AppData\Roaming\Mouv\ybjuv.exe"C:\Users\Admin\AppData\Roaming\Mouv\ybjuv.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpa731a6dc.bat"3⤵
- Deletes itself
PID:768
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1212
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1116
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD50288b1c05c4f97d81542ccd3eb459ba8
SHA19432d892ff52159039b19a0d5749a2ba498349b2
SHA25681496a6a73a9f71e02e91681f469ea8039bbe702556e93b51c794da6054a51fe
SHA5125be29205d86658e2a8e09e659ed8bedc2bd683ee84adc16ace2898222eda0e633ed47960ca9ccbe2f887edecfe32c73b8616657e29ea454658ed85ea73ab1995
-
Filesize
321KB
MD59c85bc7d2396a66a7a4336f26ee15a8f
SHA1bf2ffe0fea08ad725da0dc0e946cbb1f7f89d7e1
SHA2568a1fb131c2196c5df43c0b7d6bb286236e8783ff9562e133f3cb364a0b21ace6
SHA512727d935ea4e84e8a4a13c50f293328ac859f881e8154a8eeeb583d8838192471a0829b5424b296a3ddddb8ad46d4a1ed5119c26f7be7819a69e87ea136038702
-
Filesize
321KB
MD59c85bc7d2396a66a7a4336f26ee15a8f
SHA1bf2ffe0fea08ad725da0dc0e946cbb1f7f89d7e1
SHA2568a1fb131c2196c5df43c0b7d6bb286236e8783ff9562e133f3cb364a0b21ace6
SHA512727d935ea4e84e8a4a13c50f293328ac859f881e8154a8eeeb583d8838192471a0829b5424b296a3ddddb8ad46d4a1ed5119c26f7be7819a69e87ea136038702
-
Filesize
321KB
MD59c85bc7d2396a66a7a4336f26ee15a8f
SHA1bf2ffe0fea08ad725da0dc0e946cbb1f7f89d7e1
SHA2568a1fb131c2196c5df43c0b7d6bb286236e8783ff9562e133f3cb364a0b21ace6
SHA512727d935ea4e84e8a4a13c50f293328ac859f881e8154a8eeeb583d8838192471a0829b5424b296a3ddddb8ad46d4a1ed5119c26f7be7819a69e87ea136038702
-
Filesize
321KB
MD59c85bc7d2396a66a7a4336f26ee15a8f
SHA1bf2ffe0fea08ad725da0dc0e946cbb1f7f89d7e1
SHA2568a1fb131c2196c5df43c0b7d6bb286236e8783ff9562e133f3cb364a0b21ace6
SHA512727d935ea4e84e8a4a13c50f293328ac859f881e8154a8eeeb583d8838192471a0829b5424b296a3ddddb8ad46d4a1ed5119c26f7be7819a69e87ea136038702