Analysis
-
max time kernel
164s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 19:04
Static task
static1
Behavioral task
behavioral1
Sample
0f059ba1a32550d2ff589b301e216817d3195b957bfc8cc3d38c2c7bac4a0231.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
0f059ba1a32550d2ff589b301e216817d3195b957bfc8cc3d38c2c7bac4a0231.exe
Resource
win10v2004-20220812-en
General
-
Target
0f059ba1a32550d2ff589b301e216817d3195b957bfc8cc3d38c2c7bac4a0231.exe
-
Size
132KB
-
MD5
597587f5a1ef252a6b6e23a1dc8dbfe0
-
SHA1
bae291bfdd8ee0199024f9c0bb3765a029a80103
-
SHA256
0f059ba1a32550d2ff589b301e216817d3195b957bfc8cc3d38c2c7bac4a0231
-
SHA512
28f08ec66e35197fedeeec8002593738be62c5b9c86caef897643fd9dbd76d5081e75b8c4d80b0063a983da638c494a1325fbfff143d4bc2eb27ef3ffb5c2c33
-
SSDEEP
3072:fanf/b6NUf6VRlxzhPak8LXo46sBizQiOku:4/biUSVPxNPaLLXoNii8iC
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
ypgoud.exe0f059ba1a32550d2ff589b301e216817d3195b957bfc8cc3d38c2c7bac4a0231.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ypgoud.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 0f059ba1a32550d2ff589b301e216817d3195b957bfc8cc3d38c2c7bac4a0231.exe -
Executes dropped EXE 1 IoCs
Processes:
ypgoud.exepid process 3676 ypgoud.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
0f059ba1a32550d2ff589b301e216817d3195b957bfc8cc3d38c2c7bac4a0231.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 0f059ba1a32550d2ff589b301e216817d3195b957bfc8cc3d38c2c7bac4a0231.exe -
Adds Run key to start application 2 TTPs 55 IoCs
Processes:
ypgoud.exe0f059ba1a32550d2ff589b301e216817d3195b957bfc8cc3d38c2c7bac4a0231.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ypgoud = "C:\\Users\\Admin\\ypgoud.exe /I" ypgoud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ypgoud = "C:\\Users\\Admin\\ypgoud.exe /W" ypgoud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ypgoud = "C:\\Users\\Admin\\ypgoud.exe /R" ypgoud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ypgoud = "C:\\Users\\Admin\\ypgoud.exe /V" ypgoud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ypgoud = "C:\\Users\\Admin\\ypgoud.exe /S" ypgoud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ypgoud = "C:\\Users\\Admin\\ypgoud.exe /f" ypgoud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ypgoud = "C:\\Users\\Admin\\ypgoud.exe /l" ypgoud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ypgoud = "C:\\Users\\Admin\\ypgoud.exe /P" ypgoud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ypgoud = "C:\\Users\\Admin\\ypgoud.exe /b" ypgoud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ypgoud = "C:\\Users\\Admin\\ypgoud.exe /s" ypgoud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ypgoud = "C:\\Users\\Admin\\ypgoud.exe /i" 0f059ba1a32550d2ff589b301e216817d3195b957bfc8cc3d38c2c7bac4a0231.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ypgoud = "C:\\Users\\Admin\\ypgoud.exe /B" ypgoud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ypgoud = "C:\\Users\\Admin\\ypgoud.exe /N" ypgoud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ypgoud = "C:\\Users\\Admin\\ypgoud.exe /e" ypgoud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ypgoud = "C:\\Users\\Admin\\ypgoud.exe /J" ypgoud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ypgoud = "C:\\Users\\Admin\\ypgoud.exe /m" ypgoud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ypgoud = "C:\\Users\\Admin\\ypgoud.exe /H" ypgoud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ypgoud = "C:\\Users\\Admin\\ypgoud.exe /G" ypgoud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ypgoud = "C:\\Users\\Admin\\ypgoud.exe /t" ypgoud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ypgoud = "C:\\Users\\Admin\\ypgoud.exe /C" ypgoud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ypgoud = "C:\\Users\\Admin\\ypgoud.exe /j" ypgoud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ypgoud = "C:\\Users\\Admin\\ypgoud.exe /T" ypgoud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ypgoud = "C:\\Users\\Admin\\ypgoud.exe /z" ypgoud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ypgoud = "C:\\Users\\Admin\\ypgoud.exe /U" ypgoud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ypgoud = "C:\\Users\\Admin\\ypgoud.exe /M" ypgoud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ypgoud = "C:\\Users\\Admin\\ypgoud.exe /y" ypgoud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ypgoud = "C:\\Users\\Admin\\ypgoud.exe /a" ypgoud.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 0f059ba1a32550d2ff589b301e216817d3195b957bfc8cc3d38c2c7bac4a0231.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ypgoud = "C:\\Users\\Admin\\ypgoud.exe /i" ypgoud.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ ypgoud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ypgoud = "C:\\Users\\Admin\\ypgoud.exe /K" ypgoud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ypgoud = "C:\\Users\\Admin\\ypgoud.exe /c" ypgoud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ypgoud = "C:\\Users\\Admin\\ypgoud.exe /h" ypgoud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ypgoud = "C:\\Users\\Admin\\ypgoud.exe /p" ypgoud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ypgoud = "C:\\Users\\Admin\\ypgoud.exe /X" ypgoud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ypgoud = "C:\\Users\\Admin\\ypgoud.exe /g" ypgoud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ypgoud = "C:\\Users\\Admin\\ypgoud.exe /A" ypgoud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ypgoud = "C:\\Users\\Admin\\ypgoud.exe /Z" ypgoud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ypgoud = "C:\\Users\\Admin\\ypgoud.exe /o" ypgoud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ypgoud = "C:\\Users\\Admin\\ypgoud.exe /Q" ypgoud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ypgoud = "C:\\Users\\Admin\\ypgoud.exe /v" ypgoud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ypgoud = "C:\\Users\\Admin\\ypgoud.exe /r" ypgoud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ypgoud = "C:\\Users\\Admin\\ypgoud.exe /n" ypgoud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ypgoud = "C:\\Users\\Admin\\ypgoud.exe /E" ypgoud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ypgoud = "C:\\Users\\Admin\\ypgoud.exe /w" ypgoud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ypgoud = "C:\\Users\\Admin\\ypgoud.exe /D" ypgoud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ypgoud = "C:\\Users\\Admin\\ypgoud.exe /O" ypgoud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ypgoud = "C:\\Users\\Admin\\ypgoud.exe /F" ypgoud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ypgoud = "C:\\Users\\Admin\\ypgoud.exe /x" ypgoud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ypgoud = "C:\\Users\\Admin\\ypgoud.exe /Y" ypgoud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ypgoud = "C:\\Users\\Admin\\ypgoud.exe /k" ypgoud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ypgoud = "C:\\Users\\Admin\\ypgoud.exe /u" ypgoud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ypgoud = "C:\\Users\\Admin\\ypgoud.exe /d" ypgoud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ypgoud = "C:\\Users\\Admin\\ypgoud.exe /L" ypgoud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ypgoud = "C:\\Users\\Admin\\ypgoud.exe /q" ypgoud.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
0f059ba1a32550d2ff589b301e216817d3195b957bfc8cc3d38c2c7bac4a0231.exeypgoud.exepid process 1912 0f059ba1a32550d2ff589b301e216817d3195b957bfc8cc3d38c2c7bac4a0231.exe 1912 0f059ba1a32550d2ff589b301e216817d3195b957bfc8cc3d38c2c7bac4a0231.exe 3676 ypgoud.exe 3676 ypgoud.exe 3676 ypgoud.exe 3676 ypgoud.exe 3676 ypgoud.exe 3676 ypgoud.exe 3676 ypgoud.exe 3676 ypgoud.exe 3676 ypgoud.exe 3676 ypgoud.exe 3676 ypgoud.exe 3676 ypgoud.exe 3676 ypgoud.exe 3676 ypgoud.exe 3676 ypgoud.exe 3676 ypgoud.exe 3676 ypgoud.exe 3676 ypgoud.exe 3676 ypgoud.exe 3676 ypgoud.exe 3676 ypgoud.exe 3676 ypgoud.exe 3676 ypgoud.exe 3676 ypgoud.exe 3676 ypgoud.exe 3676 ypgoud.exe 3676 ypgoud.exe 3676 ypgoud.exe 3676 ypgoud.exe 3676 ypgoud.exe 3676 ypgoud.exe 3676 ypgoud.exe 3676 ypgoud.exe 3676 ypgoud.exe 3676 ypgoud.exe 3676 ypgoud.exe 3676 ypgoud.exe 3676 ypgoud.exe 3676 ypgoud.exe 3676 ypgoud.exe 3676 ypgoud.exe 3676 ypgoud.exe 3676 ypgoud.exe 3676 ypgoud.exe 3676 ypgoud.exe 3676 ypgoud.exe 3676 ypgoud.exe 3676 ypgoud.exe 3676 ypgoud.exe 3676 ypgoud.exe 3676 ypgoud.exe 3676 ypgoud.exe 3676 ypgoud.exe 3676 ypgoud.exe 3676 ypgoud.exe 3676 ypgoud.exe 3676 ypgoud.exe 3676 ypgoud.exe 3676 ypgoud.exe 3676 ypgoud.exe 3676 ypgoud.exe 3676 ypgoud.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
0f059ba1a32550d2ff589b301e216817d3195b957bfc8cc3d38c2c7bac4a0231.exeypgoud.exepid process 1912 0f059ba1a32550d2ff589b301e216817d3195b957bfc8cc3d38c2c7bac4a0231.exe 3676 ypgoud.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
0f059ba1a32550d2ff589b301e216817d3195b957bfc8cc3d38c2c7bac4a0231.exedescription pid process target process PID 1912 wrote to memory of 3676 1912 0f059ba1a32550d2ff589b301e216817d3195b957bfc8cc3d38c2c7bac4a0231.exe ypgoud.exe PID 1912 wrote to memory of 3676 1912 0f059ba1a32550d2ff589b301e216817d3195b957bfc8cc3d38c2c7bac4a0231.exe ypgoud.exe PID 1912 wrote to memory of 3676 1912 0f059ba1a32550d2ff589b301e216817d3195b957bfc8cc3d38c2c7bac4a0231.exe ypgoud.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f059ba1a32550d2ff589b301e216817d3195b957bfc8cc3d38c2c7bac4a0231.exe"C:\Users\Admin\AppData\Local\Temp\0f059ba1a32550d2ff589b301e216817d3195b957bfc8cc3d38c2c7bac4a0231.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Users\Admin\ypgoud.exe"C:\Users\Admin\ypgoud.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3676
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
132KB
MD5394e67fedae9fd77efd68ac543f09778
SHA18b2462e68a98cb3a876885c2c952dec2b9a55e6c
SHA25600b5e849028f66181d4a2af0211acdfd1201315e3f6f24bbf52acd9bcc8a385e
SHA512d1d7d104e710bd865498f651a66b72d9920371c731001c5469af392a8ca3e76e2c90a72e53b338bdd4940b7590d853817de8a8d35a95ec7bd700dd5585b1ef99
-
Filesize
132KB
MD5394e67fedae9fd77efd68ac543f09778
SHA18b2462e68a98cb3a876885c2c952dec2b9a55e6c
SHA25600b5e849028f66181d4a2af0211acdfd1201315e3f6f24bbf52acd9bcc8a385e
SHA512d1d7d104e710bd865498f651a66b72d9920371c731001c5469af392a8ca3e76e2c90a72e53b338bdd4940b7590d853817de8a8d35a95ec7bd700dd5585b1ef99