Analysis
-
max time kernel
186s -
max time network
190s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 18:45
Static task
static1
Behavioral task
behavioral1
Sample
e73b6e84389fb3c5a96634010b6ae3de1480701d04aa442a642a5f4639050050.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e73b6e84389fb3c5a96634010b6ae3de1480701d04aa442a642a5f4639050050.exe
Resource
win10v2004-20221111-en
General
-
Target
e73b6e84389fb3c5a96634010b6ae3de1480701d04aa442a642a5f4639050050.exe
-
Size
180KB
-
MD5
5afa821c64f2dcd9bbe95c64f929fc5c
-
SHA1
35c423c30d3ba3e494abc558f3f06bff81268c37
-
SHA256
e73b6e84389fb3c5a96634010b6ae3de1480701d04aa442a642a5f4639050050
-
SHA512
71216f4cb346f6bae0a88d3111c0c5dc446b7e04cf0acec7d1bf3d4f6601bf7232cf630b4c58dc8a50f559e83cc42b332f7456694bb96f23363ece11a75dce03
-
SSDEEP
3072:6IMGdYRLoeEdRos/eaqFnqWDb+uTyLDC6s5sSYqGlC6YViZj5HQXZmmJ0yCFiox+:VtcKPpm2lC6YViZj5HQXZmmJ0yCF9Bx/
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
e73b6e84389fb3c5a96634010b6ae3de1480701d04aa442a642a5f4639050050.exeyuajuat.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" e73b6e84389fb3c5a96634010b6ae3de1480701d04aa442a642a5f4639050050.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" yuajuat.exe -
Executes dropped EXE 1 IoCs
Processes:
yuajuat.exepid process 3216 yuajuat.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
e73b6e84389fb3c5a96634010b6ae3de1480701d04aa442a642a5f4639050050.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation e73b6e84389fb3c5a96634010b6ae3de1480701d04aa442a642a5f4639050050.exe -
Adds Run key to start application 2 TTPs 55 IoCs
Processes:
yuajuat.exee73b6e84389fb3c5a96634010b6ae3de1480701d04aa442a642a5f4639050050.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuajuat = "C:\\Users\\Admin\\yuajuat.exe /G" yuajuat.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuajuat = "C:\\Users\\Admin\\yuajuat.exe /v" yuajuat.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuajuat = "C:\\Users\\Admin\\yuajuat.exe /t" yuajuat.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuajuat = "C:\\Users\\Admin\\yuajuat.exe /f" yuajuat.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuajuat = "C:\\Users\\Admin\\yuajuat.exe /n" yuajuat.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuajuat = "C:\\Users\\Admin\\yuajuat.exe /V" yuajuat.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuajuat = "C:\\Users\\Admin\\yuajuat.exe /g" yuajuat.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuajuat = "C:\\Users\\Admin\\yuajuat.exe /u" yuajuat.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuajuat = "C:\\Users\\Admin\\yuajuat.exe /d" yuajuat.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuajuat = "C:\\Users\\Admin\\yuajuat.exe /k" yuajuat.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuajuat = "C:\\Users\\Admin\\yuajuat.exe /q" yuajuat.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuajuat = "C:\\Users\\Admin\\yuajuat.exe /F" yuajuat.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuajuat = "C:\\Users\\Admin\\yuajuat.exe /m" yuajuat.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuajuat = "C:\\Users\\Admin\\yuajuat.exe /O" yuajuat.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuajuat = "C:\\Users\\Admin\\yuajuat.exe /p" yuajuat.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuajuat = "C:\\Users\\Admin\\yuajuat.exe /T" yuajuat.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuajuat = "C:\\Users\\Admin\\yuajuat.exe /M" yuajuat.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuajuat = "C:\\Users\\Admin\\yuajuat.exe /a" yuajuat.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuajuat = "C:\\Users\\Admin\\yuajuat.exe /j" yuajuat.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuajuat = "C:\\Users\\Admin\\yuajuat.exe /R" yuajuat.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuajuat = "C:\\Users\\Admin\\yuajuat.exe /c" yuajuat.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuajuat = "C:\\Users\\Admin\\yuajuat.exe /h" yuajuat.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuajuat = "C:\\Users\\Admin\\yuajuat.exe /B" yuajuat.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuajuat = "C:\\Users\\Admin\\yuajuat.exe /w" yuajuat.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuajuat = "C:\\Users\\Admin\\yuajuat.exe /W" yuajuat.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuajuat = "C:\\Users\\Admin\\yuajuat.exe /y" yuajuat.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuajuat = "C:\\Users\\Admin\\yuajuat.exe /z" yuajuat.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuajuat = "C:\\Users\\Admin\\yuajuat.exe /K" yuajuat.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuajuat = "C:\\Users\\Admin\\yuajuat.exe /J" yuajuat.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuajuat = "C:\\Users\\Admin\\yuajuat.exe /b" yuajuat.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuajuat = "C:\\Users\\Admin\\yuajuat.exe /N" yuajuat.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuajuat = "C:\\Users\\Admin\\yuajuat.exe /Q" yuajuat.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuajuat = "C:\\Users\\Admin\\yuajuat.exe /L" yuajuat.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows\CurrentVersion\Run\ yuajuat.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuajuat = "C:\\Users\\Admin\\yuajuat.exe /o" yuajuat.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuajuat = "C:\\Users\\Admin\\yuajuat.exe /Z" yuajuat.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuajuat = "C:\\Users\\Admin\\yuajuat.exe /A" yuajuat.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuajuat = "C:\\Users\\Admin\\yuajuat.exe /C" yuajuat.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuajuat = "C:\\Users\\Admin\\yuajuat.exe /P" yuajuat.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuajuat = "C:\\Users\\Admin\\yuajuat.exe /I" yuajuat.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuajuat = "C:\\Users\\Admin\\yuajuat.exe /l" yuajuat.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuajuat = "C:\\Users\\Admin\\yuajuat.exe /r" yuajuat.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuajuat = "C:\\Users\\Admin\\yuajuat.exe /U" yuajuat.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuajuat = "C:\\Users\\Admin\\yuajuat.exe /E" yuajuat.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows\CurrentVersion\Run\ e73b6e84389fb3c5a96634010b6ae3de1480701d04aa442a642a5f4639050050.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuajuat = "C:\\Users\\Admin\\yuajuat.exe /d" e73b6e84389fb3c5a96634010b6ae3de1480701d04aa442a642a5f4639050050.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuajuat = "C:\\Users\\Admin\\yuajuat.exe /D" yuajuat.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuajuat = "C:\\Users\\Admin\\yuajuat.exe /H" yuajuat.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuajuat = "C:\\Users\\Admin\\yuajuat.exe /S" yuajuat.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuajuat = "C:\\Users\\Admin\\yuajuat.exe /e" yuajuat.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuajuat = "C:\\Users\\Admin\\yuajuat.exe /x" yuajuat.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuajuat = "C:\\Users\\Admin\\yuajuat.exe /s" yuajuat.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuajuat = "C:\\Users\\Admin\\yuajuat.exe /X" yuajuat.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuajuat = "C:\\Users\\Admin\\yuajuat.exe /Y" yuajuat.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuajuat = "C:\\Users\\Admin\\yuajuat.exe /i" yuajuat.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
e73b6e84389fb3c5a96634010b6ae3de1480701d04aa442a642a5f4639050050.exeyuajuat.exepid process 2368 e73b6e84389fb3c5a96634010b6ae3de1480701d04aa442a642a5f4639050050.exe 2368 e73b6e84389fb3c5a96634010b6ae3de1480701d04aa442a642a5f4639050050.exe 3216 yuajuat.exe 3216 yuajuat.exe 3216 yuajuat.exe 3216 yuajuat.exe 3216 yuajuat.exe 3216 yuajuat.exe 3216 yuajuat.exe 3216 yuajuat.exe 3216 yuajuat.exe 3216 yuajuat.exe 3216 yuajuat.exe 3216 yuajuat.exe 3216 yuajuat.exe 3216 yuajuat.exe 3216 yuajuat.exe 3216 yuajuat.exe 3216 yuajuat.exe 3216 yuajuat.exe 3216 yuajuat.exe 3216 yuajuat.exe 3216 yuajuat.exe 3216 yuajuat.exe 3216 yuajuat.exe 3216 yuajuat.exe 3216 yuajuat.exe 3216 yuajuat.exe 3216 yuajuat.exe 3216 yuajuat.exe 3216 yuajuat.exe 3216 yuajuat.exe 3216 yuajuat.exe 3216 yuajuat.exe 3216 yuajuat.exe 3216 yuajuat.exe 3216 yuajuat.exe 3216 yuajuat.exe 3216 yuajuat.exe 3216 yuajuat.exe 3216 yuajuat.exe 3216 yuajuat.exe 3216 yuajuat.exe 3216 yuajuat.exe 3216 yuajuat.exe 3216 yuajuat.exe 3216 yuajuat.exe 3216 yuajuat.exe 3216 yuajuat.exe 3216 yuajuat.exe 3216 yuajuat.exe 3216 yuajuat.exe 3216 yuajuat.exe 3216 yuajuat.exe 3216 yuajuat.exe 3216 yuajuat.exe 3216 yuajuat.exe 3216 yuajuat.exe 3216 yuajuat.exe 3216 yuajuat.exe 3216 yuajuat.exe 3216 yuajuat.exe 3216 yuajuat.exe 3216 yuajuat.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
e73b6e84389fb3c5a96634010b6ae3de1480701d04aa442a642a5f4639050050.exeyuajuat.exepid process 2368 e73b6e84389fb3c5a96634010b6ae3de1480701d04aa442a642a5f4639050050.exe 3216 yuajuat.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
e73b6e84389fb3c5a96634010b6ae3de1480701d04aa442a642a5f4639050050.exedescription pid process target process PID 2368 wrote to memory of 3216 2368 e73b6e84389fb3c5a96634010b6ae3de1480701d04aa442a642a5f4639050050.exe yuajuat.exe PID 2368 wrote to memory of 3216 2368 e73b6e84389fb3c5a96634010b6ae3de1480701d04aa442a642a5f4639050050.exe yuajuat.exe PID 2368 wrote to memory of 3216 2368 e73b6e84389fb3c5a96634010b6ae3de1480701d04aa442a642a5f4639050050.exe yuajuat.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e73b6e84389fb3c5a96634010b6ae3de1480701d04aa442a642a5f4639050050.exe"C:\Users\Admin\AppData\Local\Temp\e73b6e84389fb3c5a96634010b6ae3de1480701d04aa442a642a5f4639050050.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\yuajuat.exe"C:\Users\Admin\yuajuat.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3216
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
180KB
MD57891310f43061716603b8b72b194f768
SHA158a64aad1ee5452cbada7b5a0c9c70e9092321b9
SHA256ab283b882b42b13369dcfcd37bdf5ee9e1c1aaa0cf2fc8fed7c5163810161d86
SHA5127c883e1491259cac886cfbe56862f1cc4b460620e627949e280e3d9cd8af3075b31190fb2073350ed978740f02282d41cd1b02d393086fe75f7cb214cb27c381
-
Filesize
180KB
MD57891310f43061716603b8b72b194f768
SHA158a64aad1ee5452cbada7b5a0c9c70e9092321b9
SHA256ab283b882b42b13369dcfcd37bdf5ee9e1c1aaa0cf2fc8fed7c5163810161d86
SHA5127c883e1491259cac886cfbe56862f1cc4b460620e627949e280e3d9cd8af3075b31190fb2073350ed978740f02282d41cd1b02d393086fe75f7cb214cb27c381