Analysis
-
max time kernel
203s -
max time network
72s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 17:13
Static task
static1
Behavioral task
behavioral1
Sample
41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exe
Resource
win10v2004-20220812-en
General
-
Target
41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exe
-
Size
135KB
-
MD5
0819d577537dc12fbd00cae353e628e0
-
SHA1
891b6e530bb37cc128b9a48181f2bdd74e568de2
-
SHA256
41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6
-
SHA512
d70a0968361bd3ec5fa95e6c3156b772944c9e1ccf415cbf93ee508fc5fe9b0e640977c8a32b11aa07d3d545fd1b5bb54574bb3edd363cd6a0b4b98b9bba09c5
-
SSDEEP
3072:GPMInrhifUPb1WpXVxAaGBvbNvNbNJkvmhyPQbaDTUXGIDbwKDqCtrwdAxaVTtVC:+JPoIDbByGPMsMP
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
yusem.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" yusem.exe -
Executes dropped EXE 1 IoCs
Processes:
yusem.exepid process 688 yusem.exe -
Loads dropped DLL 2 IoCs
Processes:
41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exepid process 2044 41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exe 2044 41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
yusem.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\ yusem.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\yusem = "C:\\Users\\Admin\\yusem.exe" yusem.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
yusem.exepid process 688 yusem.exe 688 yusem.exe 688 yusem.exe 688 yusem.exe 688 yusem.exe 688 yusem.exe 688 yusem.exe 688 yusem.exe 688 yusem.exe 688 yusem.exe 688 yusem.exe 688 yusem.exe 688 yusem.exe 688 yusem.exe 688 yusem.exe 688 yusem.exe 688 yusem.exe 688 yusem.exe 688 yusem.exe 688 yusem.exe 688 yusem.exe 688 yusem.exe 688 yusem.exe 688 yusem.exe 688 yusem.exe 688 yusem.exe 688 yusem.exe 688 yusem.exe 688 yusem.exe 688 yusem.exe 688 yusem.exe 688 yusem.exe 688 yusem.exe 688 yusem.exe 688 yusem.exe 688 yusem.exe 688 yusem.exe 688 yusem.exe 688 yusem.exe 688 yusem.exe 688 yusem.exe 688 yusem.exe 688 yusem.exe 688 yusem.exe 688 yusem.exe 688 yusem.exe 688 yusem.exe 688 yusem.exe 688 yusem.exe 688 yusem.exe 688 yusem.exe 688 yusem.exe 688 yusem.exe 688 yusem.exe 688 yusem.exe 688 yusem.exe 688 yusem.exe 688 yusem.exe 688 yusem.exe 688 yusem.exe 688 yusem.exe 688 yusem.exe 688 yusem.exe 688 yusem.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exeyusem.exepid process 2044 41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exe 688 yusem.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exeyusem.exedescription pid process target process PID 2044 wrote to memory of 688 2044 41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exe yusem.exe PID 2044 wrote to memory of 688 2044 41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exe yusem.exe PID 2044 wrote to memory of 688 2044 41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exe yusem.exe PID 2044 wrote to memory of 688 2044 41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exe yusem.exe PID 688 wrote to memory of 2044 688 yusem.exe 41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exe PID 688 wrote to memory of 2044 688 yusem.exe 41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exe PID 688 wrote to memory of 2044 688 yusem.exe 41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exe PID 688 wrote to memory of 2044 688 yusem.exe 41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exe PID 688 wrote to memory of 2044 688 yusem.exe 41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exe PID 688 wrote to memory of 2044 688 yusem.exe 41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exe PID 688 wrote to memory of 2044 688 yusem.exe 41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exe PID 688 wrote to memory of 2044 688 yusem.exe 41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exe PID 688 wrote to memory of 2044 688 yusem.exe 41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exe PID 688 wrote to memory of 2044 688 yusem.exe 41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exe PID 688 wrote to memory of 2044 688 yusem.exe 41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exe PID 688 wrote to memory of 2044 688 yusem.exe 41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exe PID 688 wrote to memory of 2044 688 yusem.exe 41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exe PID 688 wrote to memory of 2044 688 yusem.exe 41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exe PID 688 wrote to memory of 2044 688 yusem.exe 41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exe PID 688 wrote to memory of 2044 688 yusem.exe 41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exe PID 688 wrote to memory of 2044 688 yusem.exe 41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exe PID 688 wrote to memory of 2044 688 yusem.exe 41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exe PID 688 wrote to memory of 2044 688 yusem.exe 41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exe PID 688 wrote to memory of 2044 688 yusem.exe 41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exe PID 688 wrote to memory of 2044 688 yusem.exe 41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exe PID 688 wrote to memory of 2044 688 yusem.exe 41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exe PID 688 wrote to memory of 2044 688 yusem.exe 41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exe PID 688 wrote to memory of 2044 688 yusem.exe 41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exe PID 688 wrote to memory of 2044 688 yusem.exe 41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exe PID 688 wrote to memory of 2044 688 yusem.exe 41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exe PID 688 wrote to memory of 2044 688 yusem.exe 41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exe PID 688 wrote to memory of 2044 688 yusem.exe 41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exe PID 688 wrote to memory of 2044 688 yusem.exe 41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exe PID 688 wrote to memory of 2044 688 yusem.exe 41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exe PID 688 wrote to memory of 2044 688 yusem.exe 41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exe PID 688 wrote to memory of 2044 688 yusem.exe 41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exe PID 688 wrote to memory of 2044 688 yusem.exe 41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exe PID 688 wrote to memory of 2044 688 yusem.exe 41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exe PID 688 wrote to memory of 2044 688 yusem.exe 41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exe PID 688 wrote to memory of 2044 688 yusem.exe 41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exe PID 688 wrote to memory of 2044 688 yusem.exe 41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exe PID 688 wrote to memory of 2044 688 yusem.exe 41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exe PID 688 wrote to memory of 2044 688 yusem.exe 41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exe PID 688 wrote to memory of 2044 688 yusem.exe 41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exe PID 688 wrote to memory of 2044 688 yusem.exe 41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exe PID 688 wrote to memory of 2044 688 yusem.exe 41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exe PID 688 wrote to memory of 2044 688 yusem.exe 41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exe PID 688 wrote to memory of 2044 688 yusem.exe 41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exe PID 688 wrote to memory of 2044 688 yusem.exe 41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exe PID 688 wrote to memory of 2044 688 yusem.exe 41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exe PID 688 wrote to memory of 2044 688 yusem.exe 41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exe PID 688 wrote to memory of 2044 688 yusem.exe 41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exe PID 688 wrote to memory of 2044 688 yusem.exe 41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exe PID 688 wrote to memory of 2044 688 yusem.exe 41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exe PID 688 wrote to memory of 2044 688 yusem.exe 41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exe PID 688 wrote to memory of 2044 688 yusem.exe 41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exe PID 688 wrote to memory of 2044 688 yusem.exe 41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exe PID 688 wrote to memory of 2044 688 yusem.exe 41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exe PID 688 wrote to memory of 2044 688 yusem.exe 41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exe PID 688 wrote to memory of 2044 688 yusem.exe 41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exe PID 688 wrote to memory of 2044 688 yusem.exe 41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exe PID 688 wrote to memory of 2044 688 yusem.exe 41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exe PID 688 wrote to memory of 2044 688 yusem.exe 41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exe PID 688 wrote to memory of 2044 688 yusem.exe 41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exe"C:\Users\Admin\AppData\Local\Temp\41dd6e857ceb556d4b9040f539f08d93fc930c3a40d6ae213725dfc90f27d9f6.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\yusem.exe"C:\Users\Admin\yusem.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:688
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD5e182897866a60ef82c9a5b9dc66b719b
SHA1289fd6adb68a86d2ae7ea503e842666f4ed2d9ce
SHA25670abc22354113acb850306fb1fcb732844e6976053664789e13b14837e348dcd
SHA512448ddfd5183c4e7d1777fff7cc340f5ee7884f0c91e5301fa4fe4d7a08b7b2919247c0a90e11ca23dd49805346e74a600545bc914172a82786e36023ca4c4e72
-
Filesize
135KB
MD5e182897866a60ef82c9a5b9dc66b719b
SHA1289fd6adb68a86d2ae7ea503e842666f4ed2d9ce
SHA25670abc22354113acb850306fb1fcb732844e6976053664789e13b14837e348dcd
SHA512448ddfd5183c4e7d1777fff7cc340f5ee7884f0c91e5301fa4fe4d7a08b7b2919247c0a90e11ca23dd49805346e74a600545bc914172a82786e36023ca4c4e72
-
Filesize
135KB
MD5e182897866a60ef82c9a5b9dc66b719b
SHA1289fd6adb68a86d2ae7ea503e842666f4ed2d9ce
SHA25670abc22354113acb850306fb1fcb732844e6976053664789e13b14837e348dcd
SHA512448ddfd5183c4e7d1777fff7cc340f5ee7884f0c91e5301fa4fe4d7a08b7b2919247c0a90e11ca23dd49805346e74a600545bc914172a82786e36023ca4c4e72
-
Filesize
135KB
MD5e182897866a60ef82c9a5b9dc66b719b
SHA1289fd6adb68a86d2ae7ea503e842666f4ed2d9ce
SHA25670abc22354113acb850306fb1fcb732844e6976053664789e13b14837e348dcd
SHA512448ddfd5183c4e7d1777fff7cc340f5ee7884f0c91e5301fa4fe4d7a08b7b2919247c0a90e11ca23dd49805346e74a600545bc914172a82786e36023ca4c4e72