Analysis
-
max time kernel
151s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 11:09
Static task
static1
Behavioral task
behavioral1
Sample
b5d4f5babecdf1f4f43e5e0afc42a9a8ae3a9e8311eaaf777914cac3dc6d2f0a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b5d4f5babecdf1f4f43e5e0afc42a9a8ae3a9e8311eaaf777914cac3dc6d2f0a.exe
Resource
win10v2004-20221111-en
General
-
Target
b5d4f5babecdf1f4f43e5e0afc42a9a8ae3a9e8311eaaf777914cac3dc6d2f0a.exe
-
Size
270KB
-
MD5
930b90969de8f7e3169cd2e0b5580c9f
-
SHA1
463cb10f654705a5a71b6994180e698d711fe99e
-
SHA256
b5d4f5babecdf1f4f43e5e0afc42a9a8ae3a9e8311eaaf777914cac3dc6d2f0a
-
SHA512
75a00f1d5a56908a8f4771b899fbc11df4801bad57bd93d687dcce739986a603a91603d9654674d7f2ed1e2ad8f95422206f5e08b3e5c0cda7d366b0b6ec6485
-
SSDEEP
6144:NtjpJkJqvoArlO+BeiG2/pWTxq/fnx7GDrRcJIcxyCq0hzfvS:rTvo8YVq/PERcHxywvS
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
ynopaq.exepid process 1168 ynopaq.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 940 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
b5d4f5babecdf1f4f43e5e0afc42a9a8ae3a9e8311eaaf777914cac3dc6d2f0a.exepid process 1324 b5d4f5babecdf1f4f43e5e0afc42a9a8ae3a9e8311eaaf777914cac3dc6d2f0a.exe 1324 b5d4f5babecdf1f4f43e5e0afc42a9a8ae3a9e8311eaaf777914cac3dc6d2f0a.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
ynopaq.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\Currentversion\Run ynopaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\{CB118568-7F59-AD4D-CD9C-5E5DE9C17D40} = "C:\\Users\\Admin\\AppData\\Roaming\\Uctu\\ynopaq.exe" ynopaq.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
b5d4f5babecdf1f4f43e5e0afc42a9a8ae3a9e8311eaaf777914cac3dc6d2f0a.exedescription pid process target process PID 1324 set thread context of 940 1324 b5d4f5babecdf1f4f43e5e0afc42a9a8ae3a9e8311eaaf777914cac3dc6d2f0a.exe cmd.exe -
Processes:
b5d4f5babecdf1f4f43e5e0afc42a9a8ae3a9e8311eaaf777914cac3dc6d2f0a.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Privacy b5d4f5babecdf1f4f43e5e0afc42a9a8ae3a9e8311eaaf777914cac3dc6d2f0a.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" b5d4f5babecdf1f4f43e5e0afc42a9a8ae3a9e8311eaaf777914cac3dc6d2f0a.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
Processes:
ynopaq.exepid process 1168 ynopaq.exe 1168 ynopaq.exe 1168 ynopaq.exe 1168 ynopaq.exe 1168 ynopaq.exe 1168 ynopaq.exe 1168 ynopaq.exe 1168 ynopaq.exe 1168 ynopaq.exe 1168 ynopaq.exe 1168 ynopaq.exe 1168 ynopaq.exe 1168 ynopaq.exe 1168 ynopaq.exe 1168 ynopaq.exe 1168 ynopaq.exe 1168 ynopaq.exe 1168 ynopaq.exe 1168 ynopaq.exe 1168 ynopaq.exe 1168 ynopaq.exe 1168 ynopaq.exe 1168 ynopaq.exe 1168 ynopaq.exe 1168 ynopaq.exe 1168 ynopaq.exe 1168 ynopaq.exe -
Suspicious use of UnmapMainImage 2 IoCs
Processes:
b5d4f5babecdf1f4f43e5e0afc42a9a8ae3a9e8311eaaf777914cac3dc6d2f0a.exeynopaq.exepid process 1324 b5d4f5babecdf1f4f43e5e0afc42a9a8ae3a9e8311eaaf777914cac3dc6d2f0a.exe 1168 ynopaq.exe -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
b5d4f5babecdf1f4f43e5e0afc42a9a8ae3a9e8311eaaf777914cac3dc6d2f0a.exeynopaq.exedescription pid process target process PID 1324 wrote to memory of 1168 1324 b5d4f5babecdf1f4f43e5e0afc42a9a8ae3a9e8311eaaf777914cac3dc6d2f0a.exe ynopaq.exe PID 1324 wrote to memory of 1168 1324 b5d4f5babecdf1f4f43e5e0afc42a9a8ae3a9e8311eaaf777914cac3dc6d2f0a.exe ynopaq.exe PID 1324 wrote to memory of 1168 1324 b5d4f5babecdf1f4f43e5e0afc42a9a8ae3a9e8311eaaf777914cac3dc6d2f0a.exe ynopaq.exe PID 1324 wrote to memory of 1168 1324 b5d4f5babecdf1f4f43e5e0afc42a9a8ae3a9e8311eaaf777914cac3dc6d2f0a.exe ynopaq.exe PID 1168 wrote to memory of 1124 1168 ynopaq.exe taskhost.exe PID 1168 wrote to memory of 1124 1168 ynopaq.exe taskhost.exe PID 1168 wrote to memory of 1124 1168 ynopaq.exe taskhost.exe PID 1168 wrote to memory of 1124 1168 ynopaq.exe taskhost.exe PID 1168 wrote to memory of 1124 1168 ynopaq.exe taskhost.exe PID 1168 wrote to memory of 1176 1168 ynopaq.exe Dwm.exe PID 1168 wrote to memory of 1176 1168 ynopaq.exe Dwm.exe PID 1168 wrote to memory of 1176 1168 ynopaq.exe Dwm.exe PID 1168 wrote to memory of 1176 1168 ynopaq.exe Dwm.exe PID 1168 wrote to memory of 1176 1168 ynopaq.exe Dwm.exe PID 1168 wrote to memory of 1208 1168 ynopaq.exe Explorer.EXE PID 1168 wrote to memory of 1208 1168 ynopaq.exe Explorer.EXE PID 1168 wrote to memory of 1208 1168 ynopaq.exe Explorer.EXE PID 1168 wrote to memory of 1208 1168 ynopaq.exe Explorer.EXE PID 1168 wrote to memory of 1208 1168 ynopaq.exe Explorer.EXE PID 1168 wrote to memory of 1324 1168 ynopaq.exe b5d4f5babecdf1f4f43e5e0afc42a9a8ae3a9e8311eaaf777914cac3dc6d2f0a.exe PID 1168 wrote to memory of 1324 1168 ynopaq.exe b5d4f5babecdf1f4f43e5e0afc42a9a8ae3a9e8311eaaf777914cac3dc6d2f0a.exe PID 1168 wrote to memory of 1324 1168 ynopaq.exe b5d4f5babecdf1f4f43e5e0afc42a9a8ae3a9e8311eaaf777914cac3dc6d2f0a.exe PID 1168 wrote to memory of 1324 1168 ynopaq.exe b5d4f5babecdf1f4f43e5e0afc42a9a8ae3a9e8311eaaf777914cac3dc6d2f0a.exe PID 1168 wrote to memory of 1324 1168 ynopaq.exe b5d4f5babecdf1f4f43e5e0afc42a9a8ae3a9e8311eaaf777914cac3dc6d2f0a.exe PID 1324 wrote to memory of 940 1324 b5d4f5babecdf1f4f43e5e0afc42a9a8ae3a9e8311eaaf777914cac3dc6d2f0a.exe cmd.exe PID 1324 wrote to memory of 940 1324 b5d4f5babecdf1f4f43e5e0afc42a9a8ae3a9e8311eaaf777914cac3dc6d2f0a.exe cmd.exe PID 1324 wrote to memory of 940 1324 b5d4f5babecdf1f4f43e5e0afc42a9a8ae3a9e8311eaaf777914cac3dc6d2f0a.exe cmd.exe PID 1324 wrote to memory of 940 1324 b5d4f5babecdf1f4f43e5e0afc42a9a8ae3a9e8311eaaf777914cac3dc6d2f0a.exe cmd.exe PID 1324 wrote to memory of 940 1324 b5d4f5babecdf1f4f43e5e0afc42a9a8ae3a9e8311eaaf777914cac3dc6d2f0a.exe cmd.exe PID 1324 wrote to memory of 940 1324 b5d4f5babecdf1f4f43e5e0afc42a9a8ae3a9e8311eaaf777914cac3dc6d2f0a.exe cmd.exe PID 1324 wrote to memory of 940 1324 b5d4f5babecdf1f4f43e5e0afc42a9a8ae3a9e8311eaaf777914cac3dc6d2f0a.exe cmd.exe PID 1324 wrote to memory of 940 1324 b5d4f5babecdf1f4f43e5e0afc42a9a8ae3a9e8311eaaf777914cac3dc6d2f0a.exe cmd.exe PID 1324 wrote to memory of 940 1324 b5d4f5babecdf1f4f43e5e0afc42a9a8ae3a9e8311eaaf777914cac3dc6d2f0a.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\b5d4f5babecdf1f4f43e5e0afc42a9a8ae3a9e8311eaaf777914cac3dc6d2f0a.exe"C:\Users\Admin\AppData\Local\Temp\b5d4f5babecdf1f4f43e5e0afc42a9a8ae3a9e8311eaaf777914cac3dc6d2f0a.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Users\Admin\AppData\Roaming\Uctu\ynopaq.exe"C:\Users\Admin\AppData\Roaming\Uctu\ynopaq.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp943b44e4.bat"3⤵
- Deletes itself
PID:940
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1176
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1124
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD570836e2a037adc3b6debdfee3da914cd
SHA16998ec7fcec42f38e4edeea21ca4ad798180a9e7
SHA2561d49083f96f71ec1ea69d8ed3623a93b08806ebb87192095be84b1c9b0b9b2ca
SHA512e9674303ebe82676f73de006d41cc870616c3cb59d54e559ef823fb67947b4aacda3fd9edf2cca599d7b1e210c79351a5b14f5ba9e84efc491b5217af0fa5525
-
Filesize
270KB
MD58f9ac047b857a73fcae5145650c9c8c9
SHA1590b60a2175f54d74de848a63879200f281a3c67
SHA2561c3351041491a24ed094d8fa0d64a6b07574c56da47c66f55ba3178d7bc9560c
SHA512bad5b54ad417923e1ea42c1108199fcc5d3525a1ae44fe6552020a7ab8927f3777742e54e8e097d0d7e5f98cac8ba4a592ce621088ec4bb80121c3690423fab1
-
Filesize
270KB
MD58f9ac047b857a73fcae5145650c9c8c9
SHA1590b60a2175f54d74de848a63879200f281a3c67
SHA2561c3351041491a24ed094d8fa0d64a6b07574c56da47c66f55ba3178d7bc9560c
SHA512bad5b54ad417923e1ea42c1108199fcc5d3525a1ae44fe6552020a7ab8927f3777742e54e8e097d0d7e5f98cac8ba4a592ce621088ec4bb80121c3690423fab1
-
Filesize
270KB
MD58f9ac047b857a73fcae5145650c9c8c9
SHA1590b60a2175f54d74de848a63879200f281a3c67
SHA2561c3351041491a24ed094d8fa0d64a6b07574c56da47c66f55ba3178d7bc9560c
SHA512bad5b54ad417923e1ea42c1108199fcc5d3525a1ae44fe6552020a7ab8927f3777742e54e8e097d0d7e5f98cac8ba4a592ce621088ec4bb80121c3690423fab1
-
Filesize
270KB
MD58f9ac047b857a73fcae5145650c9c8c9
SHA1590b60a2175f54d74de848a63879200f281a3c67
SHA2561c3351041491a24ed094d8fa0d64a6b07574c56da47c66f55ba3178d7bc9560c
SHA512bad5b54ad417923e1ea42c1108199fcc5d3525a1ae44fe6552020a7ab8927f3777742e54e8e097d0d7e5f98cac8ba4a592ce621088ec4bb80121c3690423fab1