Analysis
-
max time kernel
151s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 13:57
Static task
static1
Behavioral task
behavioral1
Sample
1d7b34e451017cab9eb200dbbd19150b13dd015193deb691027acad5ae2c3d1a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1d7b34e451017cab9eb200dbbd19150b13dd015193deb691027acad5ae2c3d1a.exe
Resource
win10v2004-20220812-en
General
-
Target
1d7b34e451017cab9eb200dbbd19150b13dd015193deb691027acad5ae2c3d1a.exe
-
Size
98KB
-
MD5
00748908d76108512f23f75a06121abe
-
SHA1
f9337ed78937699f66ad3216765c20b270b61fbd
-
SHA256
1d7b34e451017cab9eb200dbbd19150b13dd015193deb691027acad5ae2c3d1a
-
SHA512
93b6a33b3fd3d9b1e741ef87b0616c311235f445a1a4eae45159e7fa389538a6879b0d9d116482281d063550bbdd388b9ecba4c78446e7f645a4d4caf1850ff8
-
SSDEEP
3072:8Lk395hYXJxIL9ZslcFt0dAXNCJuhOP7BTmTQh5:8QqbILMlcFt0WCIIEQz
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
yxmezis.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\ProgramData\\DownloadSave\\yxmezis.exe" yxmezis.exe -
Executes dropped EXE 4 IoCs
Processes:
kuaiboa.exe5015.exeyxmezis.exe yxmezis.exepid process 4952 kuaiboa.exe 4824 5015.exe 4840 yxmezis.exe 2676 yxmezis.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\kuaiboa.exe upx C:\Users\Admin\AppData\Local\Temp\kuaiboa.exe upx behavioral2/memory/4952-148-0x0000000000400000-0x0000000000415000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
1d7b34e451017cab9eb200dbbd19150b13dd015193deb691027acad5ae2c3d1a.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 1d7b34e451017cab9eb200dbbd19150b13dd015193deb691027acad5ae2c3d1a.exe -
Loads dropped DLL 1 IoCs
Processes:
1d7b34e451017cab9eb200dbbd19150b13dd015193deb691027acad5ae2c3d1a.exepid process 632 1d7b34e451017cab9eb200dbbd19150b13dd015193deb691027acad5ae2c3d1a.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
yxmezis.exedescription ioc process File opened (read-only) \??\Y: yxmezis.exe File opened (read-only) \??\S: yxmezis.exe File opened (read-only) \??\M: yxmezis.exe File opened (read-only) \??\E: yxmezis.exe File opened (read-only) \??\Z: yxmezis.exe File opened (read-only) \??\O: yxmezis.exe File opened (read-only) \??\K: yxmezis.exe File opened (read-only) \??\H: yxmezis.exe File opened (read-only) \??\P: yxmezis.exe File opened (read-only) \??\J: yxmezis.exe File opened (read-only) \??\I: yxmezis.exe File opened (read-only) \??\B: yxmezis.exe File opened (read-only) \??\V: yxmezis.exe File opened (read-only) \??\U: yxmezis.exe File opened (read-only) \??\T: yxmezis.exe File opened (read-only) \??\R: yxmezis.exe File opened (read-only) \??\L: yxmezis.exe File opened (read-only) \??\G: yxmezis.exe File opened (read-only) \??\F: yxmezis.exe File opened (read-only) \??\X: yxmezis.exe File opened (read-only) \??\W: yxmezis.exe File opened (read-only) \??\Q: yxmezis.exe File opened (read-only) \??\N: yxmezis.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
1d7b34e451017cab9eb200dbbd19150b13dd015193deb691027acad5ae2c3d1a.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 1d7b34e451017cab9eb200dbbd19150b13dd015193deb691027acad5ae2c3d1a.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
5015.exeyxmezis.exepid process 4824 5015.exe 4824 5015.exe 4840 yxmezis.exe 4840 yxmezis.exe 4840 yxmezis.exe 4840 yxmezis.exe 4840 yxmezis.exe 4840 yxmezis.exe 4840 yxmezis.exe 4840 yxmezis.exe 4840 yxmezis.exe 4840 yxmezis.exe 4840 yxmezis.exe 4840 yxmezis.exe 4840 yxmezis.exe 4840 yxmezis.exe 4840 yxmezis.exe 4840 yxmezis.exe 4840 yxmezis.exe 4840 yxmezis.exe 4840 yxmezis.exe 4840 yxmezis.exe 4840 yxmezis.exe 4840 yxmezis.exe 4840 yxmezis.exe 4840 yxmezis.exe 4840 yxmezis.exe 4840 yxmezis.exe 4840 yxmezis.exe 4840 yxmezis.exe 4840 yxmezis.exe 4840 yxmezis.exe 4840 yxmezis.exe 4840 yxmezis.exe 4840 yxmezis.exe 4840 yxmezis.exe 4840 yxmezis.exe 4840 yxmezis.exe 4840 yxmezis.exe 4840 yxmezis.exe 4840 yxmezis.exe 4840 yxmezis.exe 4840 yxmezis.exe 4840 yxmezis.exe 4840 yxmezis.exe 4840 yxmezis.exe 4840 yxmezis.exe 4840 yxmezis.exe 4840 yxmezis.exe 4840 yxmezis.exe 4840 yxmezis.exe 4840 yxmezis.exe 4840 yxmezis.exe 4840 yxmezis.exe 4840 yxmezis.exe 4840 yxmezis.exe 4840 yxmezis.exe 4840 yxmezis.exe 4840 yxmezis.exe 4840 yxmezis.exe 4840 yxmezis.exe 4840 yxmezis.exe 4840 yxmezis.exe 4840 yxmezis.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
yxmezis.exe yxmezis.exedescription pid process Token: SeIncBasePriorityPrivilege 4840 yxmezis.exe Token: SeIncBasePriorityPrivilege 2676 yxmezis.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
Processes:
kuaiboa.exe5015.exeyxmezis.exe yxmezis.exepid process 4952 kuaiboa.exe 4824 5015.exe 4840 yxmezis.exe 4952 kuaiboa.exe 4952 kuaiboa.exe 4840 yxmezis.exe 4840 yxmezis.exe 4840 yxmezis.exe 4840 yxmezis.exe 4840 yxmezis.exe 4840 yxmezis.exe 4840 yxmezis.exe 2676 yxmezis.exe 2676 yxmezis.exe 4840 yxmezis.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
1d7b34e451017cab9eb200dbbd19150b13dd015193deb691027acad5ae2c3d1a.exe5015.exeyxmezis.exedescription pid process target process PID 632 wrote to memory of 4952 632 1d7b34e451017cab9eb200dbbd19150b13dd015193deb691027acad5ae2c3d1a.exe kuaiboa.exe PID 632 wrote to memory of 4952 632 1d7b34e451017cab9eb200dbbd19150b13dd015193deb691027acad5ae2c3d1a.exe kuaiboa.exe PID 632 wrote to memory of 4952 632 1d7b34e451017cab9eb200dbbd19150b13dd015193deb691027acad5ae2c3d1a.exe kuaiboa.exe PID 632 wrote to memory of 4824 632 1d7b34e451017cab9eb200dbbd19150b13dd015193deb691027acad5ae2c3d1a.exe 5015.exe PID 632 wrote to memory of 4824 632 1d7b34e451017cab9eb200dbbd19150b13dd015193deb691027acad5ae2c3d1a.exe 5015.exe PID 632 wrote to memory of 4824 632 1d7b34e451017cab9eb200dbbd19150b13dd015193deb691027acad5ae2c3d1a.exe 5015.exe PID 4824 wrote to memory of 4840 4824 5015.exe yxmezis.exe PID 4824 wrote to memory of 4840 4824 5015.exe yxmezis.exe PID 4824 wrote to memory of 4840 4824 5015.exe yxmezis.exe PID 4840 wrote to memory of 2676 4840 yxmezis.exe yxmezis.exe PID 4840 wrote to memory of 2676 4840 yxmezis.exe yxmezis.exe PID 4840 wrote to memory of 2676 4840 yxmezis.exe yxmezis.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d7b34e451017cab9eb200dbbd19150b13dd015193deb691027acad5ae2c3d1a.exe"C:\Users\Admin\AppData\Local\Temp\1d7b34e451017cab9eb200dbbd19150b13dd015193deb691027acad5ae2c3d1a.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Users\Admin\AppData\Local\Temp\kuaiboa.exe"C:\Users\Admin\AppData\Local\Temp\kuaiboa.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\5015.exe"C:\Users\Admin\AppData\Local\Temp\5015.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\ProgramData\DownloadSave\yxmezis.exe"C:\ProgramData\DownloadSave\yxmezis.exe"3⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\ProgramData\DownloadSave\ yxmezis.exe"C:\ProgramData\DownloadSave\ yxmezis.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2676
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
85KB
MD57f194b0222fb68ba977371144a8712d6
SHA11416935af16b097f771df457b31c3c91ad61273a
SHA2564ee34ffd07363be307ef2ae092abc8ba36894737284755d3d9a526d349f96136
SHA51222c73ec7fbd5a4348ef0694c829973e11ab2955d48f115aedaf849fba247185c75aa20208f2743d696f0a2657206a4b5f41d7fcb7e9d2be58593ab3f9ca9b448
-
Filesize
85KB
MD57f194b0222fb68ba977371144a8712d6
SHA11416935af16b097f771df457b31c3c91ad61273a
SHA2564ee34ffd07363be307ef2ae092abc8ba36894737284755d3d9a526d349f96136
SHA51222c73ec7fbd5a4348ef0694c829973e11ab2955d48f115aedaf849fba247185c75aa20208f2743d696f0a2657206a4b5f41d7fcb7e9d2be58593ab3f9ca9b448
-
Filesize
260B
MD5624d1d7dfa2912638ae39817bce776c2
SHA1f13712f0c7d68ff97c147f061aabb015c450211e
SHA25651e01b42c8c3a6126f07b80f53a8e834a116353a816b3eee74d528b1edaaed15
SHA512fdcccde861fcf1d1cd29214666ac5cbf28d39b6eab8048d33ae113e28877cc032e4b64fbdf916842b64425c231ea5ade578a1f3c2d47aee90fd44bfa9696896a
-
Filesize
85KB
MD57f194b0222fb68ba977371144a8712d6
SHA11416935af16b097f771df457b31c3c91ad61273a
SHA2564ee34ffd07363be307ef2ae092abc8ba36894737284755d3d9a526d349f96136
SHA51222c73ec7fbd5a4348ef0694c829973e11ab2955d48f115aedaf849fba247185c75aa20208f2743d696f0a2657206a4b5f41d7fcb7e9d2be58593ab3f9ca9b448
-
Filesize
85KB
MD57f194b0222fb68ba977371144a8712d6
SHA11416935af16b097f771df457b31c3c91ad61273a
SHA2564ee34ffd07363be307ef2ae092abc8ba36894737284755d3d9a526d349f96136
SHA51222c73ec7fbd5a4348ef0694c829973e11ab2955d48f115aedaf849fba247185c75aa20208f2743d696f0a2657206a4b5f41d7fcb7e9d2be58593ab3f9ca9b448
-
Filesize
85KB
MD57f194b0222fb68ba977371144a8712d6
SHA11416935af16b097f771df457b31c3c91ad61273a
SHA2564ee34ffd07363be307ef2ae092abc8ba36894737284755d3d9a526d349f96136
SHA51222c73ec7fbd5a4348ef0694c829973e11ab2955d48f115aedaf849fba247185c75aa20208f2743d696f0a2657206a4b5f41d7fcb7e9d2be58593ab3f9ca9b448
-
Filesize
85KB
MD57f194b0222fb68ba977371144a8712d6
SHA11416935af16b097f771df457b31c3c91ad61273a
SHA2564ee34ffd07363be307ef2ae092abc8ba36894737284755d3d9a526d349f96136
SHA51222c73ec7fbd5a4348ef0694c829973e11ab2955d48f115aedaf849fba247185c75aa20208f2743d696f0a2657206a4b5f41d7fcb7e9d2be58593ab3f9ca9b448
-
Filesize
32KB
MD56ce59e1bb6ca521b3ee118508a6a3030
SHA130bcf64377a2716f5dc6cc111cab0391eb113802
SHA25601a3df9b5bd06c67547d1491377ff941cebad25487ee04e40d48adc3cb3d9521
SHA512ef66fd1295c692081f46eecc0adc415c4709f2862aed8d9178e9918f70c6f265a98b214b9f0e70e7366acdedc75f946b55209a499939f4be9febe09de776f766
-
Filesize
32KB
MD56ce59e1bb6ca521b3ee118508a6a3030
SHA130bcf64377a2716f5dc6cc111cab0391eb113802
SHA25601a3df9b5bd06c67547d1491377ff941cebad25487ee04e40d48adc3cb3d9521
SHA512ef66fd1295c692081f46eecc0adc415c4709f2862aed8d9178e9918f70c6f265a98b214b9f0e70e7366acdedc75f946b55209a499939f4be9febe09de776f766
-
Filesize
11KB
MD500a0194c20ee912257df53bfe258ee4a
SHA1d7b4e319bc5119024690dc8230b9cc919b1b86b2
SHA256dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3
SHA5123b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667