Analysis
-
max time kernel
147s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 04:33
Behavioral task
behavioral1
Sample
7016cbad218f7011451a06eabe962cc66f5dd32038f61253ff4a6b189bbd4c36.exe
Resource
win7-20221111-en
windows7-x64
9 signatures
150 seconds
General
-
Target
7016cbad218f7011451a06eabe962cc66f5dd32038f61253ff4a6b189bbd4c36.exe
-
Size
58KB
-
MD5
9a6e0eb8386fb225b18ddeba4dc37dde
-
SHA1
d39354adf203eb35712c84286e6cf55c9628f0d2
-
SHA256
7016cbad218f7011451a06eabe962cc66f5dd32038f61253ff4a6b189bbd4c36
-
SHA512
c8ab4515bf579d155415734624a18850551d73c8c34ebc4312cbad829dd82509dbab970f70733419bb89d380cff6d869bf402f4fc6265d207bb384565263ed1c
-
SSDEEP
1536:2KLQlni5AbO4+4UsmhFBsx2GCnLRkIhuiD:2KN5cmix2GiLRrui
Malware Config
Signatures
-
Stops running service(s) 3 TTPs
-
Processes:
resource yara_rule behavioral2/memory/3488-135-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Drops file in System32 directory 9 IoCs
Processes:
7016cbad218f7011451a06eabe962cc66f5dd32038f61253ff4a6b189bbd4c36.exedescription ioc process File created C:\Windows\SysWOW64\IYMUGYHL10.dll 7016cbad218f7011451a06eabe962cc66f5dd32038f61253ff4a6b189bbd4c36.exe File created C:\Windows\SysWOW64\IYMUGYHL.ime 7016cbad218f7011451a06eabe962cc66f5dd32038f61253ff4a6b189bbd4c36.exe File created C:\Windows\SysWOW64\yuksuser.dll 7016cbad218f7011451a06eabe962cc66f5dd32038f61253ff4a6b189bbd4c36.exe File created C:\Windows\SysWOW64\yumidimap.dll 7016cbad218f7011451a06eabe962cc66f5dd32038f61253ff4a6b189bbd4c36.exe File created C:\Windows\SysWOW64\midimap.dll 7016cbad218f7011451a06eabe962cc66f5dd32038f61253ff4a6b189bbd4c36.exe File created C:\Windows\SysWOW64\dllcache\midimap.dll 7016cbad218f7011451a06eabe962cc66f5dd32038f61253ff4a6b189bbd4c36.exe File opened for modification C:\Windows\SysWOW64\yuksuser.dll 7016cbad218f7011451a06eabe962cc66f5dd32038f61253ff4a6b189bbd4c36.exe File created C:\Windows\SysWOW64\ksuser.dll 7016cbad218f7011451a06eabe962cc66f5dd32038f61253ff4a6b189bbd4c36.exe File created C:\Windows\SysWOW64\dllcache\ksuser.dll 7016cbad218f7011451a06eabe962cc66f5dd32038f61253ff4a6b189bbd4c36.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exepid process 2276 sc.exe 2444 sc.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 44 IoCs
Processes:
7016cbad218f7011451a06eabe962cc66f5dd32038f61253ff4a6b189bbd4c36.exepid process 3488 7016cbad218f7011451a06eabe962cc66f5dd32038f61253ff4a6b189bbd4c36.exe 3488 7016cbad218f7011451a06eabe962cc66f5dd32038f61253ff4a6b189bbd4c36.exe 3488 7016cbad218f7011451a06eabe962cc66f5dd32038f61253ff4a6b189bbd4c36.exe 3488 7016cbad218f7011451a06eabe962cc66f5dd32038f61253ff4a6b189bbd4c36.exe 3488 7016cbad218f7011451a06eabe962cc66f5dd32038f61253ff4a6b189bbd4c36.exe 3488 7016cbad218f7011451a06eabe962cc66f5dd32038f61253ff4a6b189bbd4c36.exe 3488 7016cbad218f7011451a06eabe962cc66f5dd32038f61253ff4a6b189bbd4c36.exe 3488 7016cbad218f7011451a06eabe962cc66f5dd32038f61253ff4a6b189bbd4c36.exe 3488 7016cbad218f7011451a06eabe962cc66f5dd32038f61253ff4a6b189bbd4c36.exe 3488 7016cbad218f7011451a06eabe962cc66f5dd32038f61253ff4a6b189bbd4c36.exe 3488 7016cbad218f7011451a06eabe962cc66f5dd32038f61253ff4a6b189bbd4c36.exe 3488 7016cbad218f7011451a06eabe962cc66f5dd32038f61253ff4a6b189bbd4c36.exe 3488 7016cbad218f7011451a06eabe962cc66f5dd32038f61253ff4a6b189bbd4c36.exe 3488 7016cbad218f7011451a06eabe962cc66f5dd32038f61253ff4a6b189bbd4c36.exe 3488 7016cbad218f7011451a06eabe962cc66f5dd32038f61253ff4a6b189bbd4c36.exe 3488 7016cbad218f7011451a06eabe962cc66f5dd32038f61253ff4a6b189bbd4c36.exe 3488 7016cbad218f7011451a06eabe962cc66f5dd32038f61253ff4a6b189bbd4c36.exe 3488 7016cbad218f7011451a06eabe962cc66f5dd32038f61253ff4a6b189bbd4c36.exe 3488 7016cbad218f7011451a06eabe962cc66f5dd32038f61253ff4a6b189bbd4c36.exe 3488 7016cbad218f7011451a06eabe962cc66f5dd32038f61253ff4a6b189bbd4c36.exe 3488 7016cbad218f7011451a06eabe962cc66f5dd32038f61253ff4a6b189bbd4c36.exe 3488 7016cbad218f7011451a06eabe962cc66f5dd32038f61253ff4a6b189bbd4c36.exe 3488 7016cbad218f7011451a06eabe962cc66f5dd32038f61253ff4a6b189bbd4c36.exe 3488 7016cbad218f7011451a06eabe962cc66f5dd32038f61253ff4a6b189bbd4c36.exe 3488 7016cbad218f7011451a06eabe962cc66f5dd32038f61253ff4a6b189bbd4c36.exe 3488 7016cbad218f7011451a06eabe962cc66f5dd32038f61253ff4a6b189bbd4c36.exe 3488 7016cbad218f7011451a06eabe962cc66f5dd32038f61253ff4a6b189bbd4c36.exe 3488 7016cbad218f7011451a06eabe962cc66f5dd32038f61253ff4a6b189bbd4c36.exe 3488 7016cbad218f7011451a06eabe962cc66f5dd32038f61253ff4a6b189bbd4c36.exe 3488 7016cbad218f7011451a06eabe962cc66f5dd32038f61253ff4a6b189bbd4c36.exe 3488 7016cbad218f7011451a06eabe962cc66f5dd32038f61253ff4a6b189bbd4c36.exe 3488 7016cbad218f7011451a06eabe962cc66f5dd32038f61253ff4a6b189bbd4c36.exe 3488 7016cbad218f7011451a06eabe962cc66f5dd32038f61253ff4a6b189bbd4c36.exe 3488 7016cbad218f7011451a06eabe962cc66f5dd32038f61253ff4a6b189bbd4c36.exe 3488 7016cbad218f7011451a06eabe962cc66f5dd32038f61253ff4a6b189bbd4c36.exe 3488 7016cbad218f7011451a06eabe962cc66f5dd32038f61253ff4a6b189bbd4c36.exe 3488 7016cbad218f7011451a06eabe962cc66f5dd32038f61253ff4a6b189bbd4c36.exe 3488 7016cbad218f7011451a06eabe962cc66f5dd32038f61253ff4a6b189bbd4c36.exe 3488 7016cbad218f7011451a06eabe962cc66f5dd32038f61253ff4a6b189bbd4c36.exe 3488 7016cbad218f7011451a06eabe962cc66f5dd32038f61253ff4a6b189bbd4c36.exe 3488 7016cbad218f7011451a06eabe962cc66f5dd32038f61253ff4a6b189bbd4c36.exe 3488 7016cbad218f7011451a06eabe962cc66f5dd32038f61253ff4a6b189bbd4c36.exe 3488 7016cbad218f7011451a06eabe962cc66f5dd32038f61253ff4a6b189bbd4c36.exe 3488 7016cbad218f7011451a06eabe962cc66f5dd32038f61253ff4a6b189bbd4c36.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
7016cbad218f7011451a06eabe962cc66f5dd32038f61253ff4a6b189bbd4c36.exedescription pid process Token: SeDebugPrivilege 3488 7016cbad218f7011451a06eabe962cc66f5dd32038f61253ff4a6b189bbd4c36.exe Token: SeDebugPrivilege 3488 7016cbad218f7011451a06eabe962cc66f5dd32038f61253ff4a6b189bbd4c36.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
7016cbad218f7011451a06eabe962cc66f5dd32038f61253ff4a6b189bbd4c36.exenet.exedescription pid process target process PID 3488 wrote to memory of 2248 3488 7016cbad218f7011451a06eabe962cc66f5dd32038f61253ff4a6b189bbd4c36.exe Explorer.EXE PID 3488 wrote to memory of 2296 3488 7016cbad218f7011451a06eabe962cc66f5dd32038f61253ff4a6b189bbd4c36.exe net.exe PID 3488 wrote to memory of 2296 3488 7016cbad218f7011451a06eabe962cc66f5dd32038f61253ff4a6b189bbd4c36.exe net.exe PID 3488 wrote to memory of 2296 3488 7016cbad218f7011451a06eabe962cc66f5dd32038f61253ff4a6b189bbd4c36.exe net.exe PID 3488 wrote to memory of 2276 3488 7016cbad218f7011451a06eabe962cc66f5dd32038f61253ff4a6b189bbd4c36.exe sc.exe PID 3488 wrote to memory of 2276 3488 7016cbad218f7011451a06eabe962cc66f5dd32038f61253ff4a6b189bbd4c36.exe sc.exe PID 3488 wrote to memory of 2276 3488 7016cbad218f7011451a06eabe962cc66f5dd32038f61253ff4a6b189bbd4c36.exe sc.exe PID 3488 wrote to memory of 2444 3488 7016cbad218f7011451a06eabe962cc66f5dd32038f61253ff4a6b189bbd4c36.exe sc.exe PID 3488 wrote to memory of 2444 3488 7016cbad218f7011451a06eabe962cc66f5dd32038f61253ff4a6b189bbd4c36.exe sc.exe PID 3488 wrote to memory of 2444 3488 7016cbad218f7011451a06eabe962cc66f5dd32038f61253ff4a6b189bbd4c36.exe sc.exe PID 2296 wrote to memory of 4172 2296 net.exe net1.exe PID 2296 wrote to memory of 4172 2296 net.exe net1.exe PID 2296 wrote to memory of 4172 2296 net.exe net1.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\7016cbad218f7011451a06eabe962cc66f5dd32038f61253ff4a6b189bbd4c36.exe"C:\Users\Admin\AppData\Local\Temp\7016cbad218f7011451a06eabe962cc66f5dd32038f61253ff4a6b189bbd4c36.exe"2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Windows\SysWOW64\net.exenet stop cryptsvc3⤵
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop cryptsvc4⤵PID:4172
-
C:\Windows\SysWOW64\sc.exesc config cryptsvc start= disabled3⤵
- Launches sc.exe
PID:2276 -
C:\Windows\SysWOW64\sc.exesc delete cryptsvc3⤵
- Launches sc.exe
PID:2444