Analysis
-
max time kernel
201s -
max time network
208s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 02:27
Static task
static1
Behavioral task
behavioral1
Sample
ac136ec1a3811cb4ce3224b95bbca3b0686704e42bd3e811b184a9c14a3acdfb.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ac136ec1a3811cb4ce3224b95bbca3b0686704e42bd3e811b184a9c14a3acdfb.exe
Resource
win10v2004-20221111-en
General
-
Target
ac136ec1a3811cb4ce3224b95bbca3b0686704e42bd3e811b184a9c14a3acdfb.exe
-
Size
435KB
-
MD5
302561f3ff7ffab43797b19e7334ba19
-
SHA1
bb975283b513aa4c7f4f1e1c2b29302531372992
-
SHA256
ac136ec1a3811cb4ce3224b95bbca3b0686704e42bd3e811b184a9c14a3acdfb
-
SHA512
3179af120089fa579a8c7a651099d4b849e8acfcd334819eaf5485648436162ddb0f8b075dd26ed9d4dcee76c0728687ea1c9f587f85d416f085c0986631b550
-
SSDEEP
6144:vdspDeDrxkg/vrMuJIgwhEFHyOrJcX/Pgqwzm5IzkWjS4e4azExBKO1t4Kb70Nqq:l8kxNhOZElO5kkWjhD4A
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
YIO.EXEpid process 2292 YIO.EXE -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
YIO.EXEac136ec1a3811cb4ce3224b95bbca3b0686704e42bd3e811b184a9c14a3acdfb.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run YIO.EXE Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run ac136ec1a3811cb4ce3224b95bbca3b0686704e42bd3e811b184a9c14a3acdfb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\YLE.EXE = "C:\\$Recycle.Bin\\YLE.EXE" ac136ec1a3811cb4ce3224b95bbca3b0686704e42bd3e811b184a9c14a3acdfb.exe -
Enumerates connected drives 3 TTPs 36 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
YIO.EXEac136ec1a3811cb4ce3224b95bbca3b0686704e42bd3e811b184a9c14a3acdfb.exedescription ioc process File opened (read-only) \??\F: YIO.EXE File opened (read-only) \??\S: YIO.EXE File opened (read-only) \??\V: YIO.EXE File opened (read-only) \??\G: ac136ec1a3811cb4ce3224b95bbca3b0686704e42bd3e811b184a9c14a3acdfb.exe File opened (read-only) \??\H: ac136ec1a3811cb4ce3224b95bbca3b0686704e42bd3e811b184a9c14a3acdfb.exe File opened (read-only) \??\M: ac136ec1a3811cb4ce3224b95bbca3b0686704e42bd3e811b184a9c14a3acdfb.exe File opened (read-only) \??\O: ac136ec1a3811cb4ce3224b95bbca3b0686704e42bd3e811b184a9c14a3acdfb.exe File opened (read-only) \??\Q: ac136ec1a3811cb4ce3224b95bbca3b0686704e42bd3e811b184a9c14a3acdfb.exe File opened (read-only) \??\L: YIO.EXE File opened (read-only) \??\K: ac136ec1a3811cb4ce3224b95bbca3b0686704e42bd3e811b184a9c14a3acdfb.exe File opened (read-only) \??\P: ac136ec1a3811cb4ce3224b95bbca3b0686704e42bd3e811b184a9c14a3acdfb.exe File opened (read-only) \??\J: YIO.EXE File opened (read-only) \??\R: YIO.EXE File opened (read-only) \??\E: ac136ec1a3811cb4ce3224b95bbca3b0686704e42bd3e811b184a9c14a3acdfb.exe File opened (read-only) \??\I: ac136ec1a3811cb4ce3224b95bbca3b0686704e42bd3e811b184a9c14a3acdfb.exe File opened (read-only) \??\E: YIO.EXE File opened (read-only) \??\H: YIO.EXE File opened (read-only) \??\N: ac136ec1a3811cb4ce3224b95bbca3b0686704e42bd3e811b184a9c14a3acdfb.exe File opened (read-only) \??\S: ac136ec1a3811cb4ce3224b95bbca3b0686704e42bd3e811b184a9c14a3acdfb.exe File opened (read-only) \??\U: ac136ec1a3811cb4ce3224b95bbca3b0686704e42bd3e811b184a9c14a3acdfb.exe File opened (read-only) \??\V: ac136ec1a3811cb4ce3224b95bbca3b0686704e42bd3e811b184a9c14a3acdfb.exe File opened (read-only) \??\O: YIO.EXE File opened (read-only) \??\Q: YIO.EXE File opened (read-only) \??\F: ac136ec1a3811cb4ce3224b95bbca3b0686704e42bd3e811b184a9c14a3acdfb.exe File opened (read-only) \??\L: ac136ec1a3811cb4ce3224b95bbca3b0686704e42bd3e811b184a9c14a3acdfb.exe File opened (read-only) \??\T: ac136ec1a3811cb4ce3224b95bbca3b0686704e42bd3e811b184a9c14a3acdfb.exe File opened (read-only) \??\U: YIO.EXE File opened (read-only) \??\G: YIO.EXE File opened (read-only) \??\M: YIO.EXE File opened (read-only) \??\T: YIO.EXE File opened (read-only) \??\J: ac136ec1a3811cb4ce3224b95bbca3b0686704e42bd3e811b184a9c14a3acdfb.exe File opened (read-only) \??\R: ac136ec1a3811cb4ce3224b95bbca3b0686704e42bd3e811b184a9c14a3acdfb.exe File opened (read-only) \??\I: YIO.EXE File opened (read-only) \??\K: YIO.EXE File opened (read-only) \??\N: YIO.EXE File opened (read-only) \??\P: YIO.EXE -
Drops file in Program Files directory 4 IoCs
Processes:
ac136ec1a3811cb4ce3224b95bbca3b0686704e42bd3e811b184a9c14a3acdfb.exeYIO.EXEdescription ioc process File created C:\Program Files (x86)\FURDDC.EXE ac136ec1a3811cb4ce3224b95bbca3b0686704e42bd3e811b184a9c14a3acdfb.exe File created C:\Program Files\QZAWG.EXE ac136ec1a3811cb4ce3224b95bbca3b0686704e42bd3e811b184a9c14a3acdfb.exe File opened for modification C:\Program Files\QZAWG.EXE ac136ec1a3811cb4ce3224b95bbca3b0686704e42bd3e811b184a9c14a3acdfb.exe File created C:\Program Files\JRVSD.EXE YIO.EXE -
Modifies registry class 31 IoCs
Processes:
ac136ec1a3811cb4ce3224b95bbca3b0686704e42bd3e811b184a9c14a3acdfb.exeYIO.EXEdescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "C:\\Program Files\\QZAWG.EXE %1" ac136ec1a3811cb4ce3224b95bbca3b0686704e42bd3e811b184a9c14a3acdfb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QQQfile\shell\open\command ac136ec1a3811cb4ce3224b95bbca3b0686704e42bd3e811b184a9c14a3acdfb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QQQfile\shell\open ac136ec1a3811cb4ce3224b95bbca3b0686704e42bd3e811b184a9c14a3acdfb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command YIO.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QQQ.file\shell\open\command YIO.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QQQ.file\shell YIO.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile YIO.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QQQ.file\shell\open\command ac136ec1a3811cb4ce3224b95bbca3b0686704e42bd3e811b184a9c14a3acdfb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QQQfile\shell\open\command\ = "C:\\$Recycle.Bin\\YLE.EXE \"%1\" %*" ac136ec1a3811cb4ce3224b95bbca3b0686704e42bd3e811b184a9c14a3acdfb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile YIO.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open YIO.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QQQ.file\shell\open YIO.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QQQfile\shell YIO.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command ac136ec1a3811cb4ce3224b95bbca3b0686704e42bd3e811b184a9c14a3acdfb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QQQ.file\shell\open\command\ = "C:\\Program Files\\QZAWG.EXE %1" ac136ec1a3811cb4ce3224b95bbca3b0686704e42bd3e811b184a9c14a3acdfb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QQQfile ac136ec1a3811cb4ce3224b95bbca3b0686704e42bd3e811b184a9c14a3acdfb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QQQfile\shell ac136ec1a3811cb4ce3224b95bbca3b0686704e42bd3e811b184a9c14a3acdfb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QQQfile YIO.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\open\command YIO.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QQQ.file\shell ac136ec1a3811cb4ce3224b95bbca3b0686704e42bd3e811b184a9c14a3acdfb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QQQfile\shell\open\command\ = "C:\\$Recycle.Bin\\YLE.EXE \"%1\"" ac136ec1a3811cb4ce3224b95bbca3b0686704e42bd3e811b184a9c14a3acdfb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QQQ.file ac136ec1a3811cb4ce3224b95bbca3b0686704e42bd3e811b184a9c14a3acdfb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QQQ.file YIO.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QQQfile\shell\open YIO.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell YIO.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QQQ.file\shell\open ac136ec1a3811cb4ce3224b95bbca3b0686704e42bd3e811b184a9c14a3acdfb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\open\command\ = "C:\\$Recycle.Bin\\YLE.EXE %1" ac136ec1a3811cb4ce3224b95bbca3b0686704e42bd3e811b184a9c14a3acdfb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell YIO.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\open YIO.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\open\command ac136ec1a3811cb4ce3224b95bbca3b0686704e42bd3e811b184a9c14a3acdfb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QQQfile\shell\open\command YIO.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
ac136ec1a3811cb4ce3224b95bbca3b0686704e42bd3e811b184a9c14a3acdfb.exedescription pid process target process PID 372 wrote to memory of 2292 372 ac136ec1a3811cb4ce3224b95bbca3b0686704e42bd3e811b184a9c14a3acdfb.exe YIO.EXE PID 372 wrote to memory of 2292 372 ac136ec1a3811cb4ce3224b95bbca3b0686704e42bd3e811b184a9c14a3acdfb.exe YIO.EXE PID 372 wrote to memory of 2292 372 ac136ec1a3811cb4ce3224b95bbca3b0686704e42bd3e811b184a9c14a3acdfb.exe YIO.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac136ec1a3811cb4ce3224b95bbca3b0686704e42bd3e811b184a9c14a3acdfb.exe"C:\Users\Admin\AppData\Local\Temp\ac136ec1a3811cb4ce3224b95bbca3b0686704e42bd3e811b184a9c14a3acdfb.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:372 -
C:\$Recycle.Bin\YIO.EXEC:\$Recycle.Bin\YIO.EXE2⤵
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Drops file in Program Files directory
- Modifies registry class
PID:2292
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
435KB
MD5c1a0e7df2bdee3a2fdc2ee1069d802cf
SHA132fa474c6b86117edbfa7adcef903cc0bea44775
SHA2568954d6019264c36fcea9714a29c0cb56ce8f9b09d1587d51d6689b58b045237d
SHA5128e2839bc10a6b8f4cb47d70b1cd66644b559deb7e1fde592dba2a1c70bcd96d1d54115a39b70c13cfbdff3d7b9592ff947b3a0fbe8531590e90234be24d885bf
-
Filesize
435KB
MD5c1a0e7df2bdee3a2fdc2ee1069d802cf
SHA132fa474c6b86117edbfa7adcef903cc0bea44775
SHA2568954d6019264c36fcea9714a29c0cb56ce8f9b09d1587d51d6689b58b045237d
SHA5128e2839bc10a6b8f4cb47d70b1cd66644b559deb7e1fde592dba2a1c70bcd96d1d54115a39b70c13cfbdff3d7b9592ff947b3a0fbe8531590e90234be24d885bf