Analysis
-
max time kernel
149s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 07:33
Static task
static1
Behavioral task
behavioral1
Sample
833af9a70a64ee226149367dd378d6d81cc4584ff95b8950ddf1cce23829ddc1.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
833af9a70a64ee226149367dd378d6d81cc4584ff95b8950ddf1cce23829ddc1.exe
Resource
win10v2004-20221111-en
General
-
Target
833af9a70a64ee226149367dd378d6d81cc4584ff95b8950ddf1cce23829ddc1.exe
-
Size
299KB
-
MD5
06a8d9b0ad5af32b05f6269fa507cb2d
-
SHA1
8551ff05e0daf82b0d9608b93c7d3dd075ffbc50
-
SHA256
833af9a70a64ee226149367dd378d6d81cc4584ff95b8950ddf1cce23829ddc1
-
SHA512
20e7b1ba9296ebac5fe97c1a5b6207a909eb76a0b53a5b061ec56e22d273296c18d64efa8de6bfdb14a76662afe9d77b06ad717c97de03679c83f2f53d6bc5c2
-
SSDEEP
6144:0VKvptNqxv4ypQCF6y4FnjRIcAlDOEBF/PeAdmyJh2rQIeP9FD4EA:06Rqp4SQCF945S91jBBeAn0vwzk
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
yryhdbmu.exepid process 1092 yryhdbmu.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1212 cmd.exe -
Loads dropped DLL 3 IoCs
Processes:
cmd.exeyryhdbmu.exepid process 1212 cmd.exe 1212 cmd.exe 1092 yryhdbmu.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
833af9a70a64ee226149367dd378d6d81cc4584ff95b8950ddf1cce23829ddc1.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce 833af9a70a64ee226149367dd378d6d81cc4584ff95b8950ddf1cce23829ddc1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 1156 taskkill.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 51 IoCs
Processes:
yryhdbmu.exepid process 1092 yryhdbmu.exe 1092 yryhdbmu.exe 1092 yryhdbmu.exe 1092 yryhdbmu.exe 1092 yryhdbmu.exe 1092 yryhdbmu.exe 1092 yryhdbmu.exe 1092 yryhdbmu.exe 1092 yryhdbmu.exe 1092 yryhdbmu.exe 1092 yryhdbmu.exe 1092 yryhdbmu.exe 1092 yryhdbmu.exe 1092 yryhdbmu.exe 1092 yryhdbmu.exe 1092 yryhdbmu.exe 1092 yryhdbmu.exe 1092 yryhdbmu.exe 1092 yryhdbmu.exe 1092 yryhdbmu.exe 1092 yryhdbmu.exe 1092 yryhdbmu.exe 1092 yryhdbmu.exe 1092 yryhdbmu.exe 1092 yryhdbmu.exe 1092 yryhdbmu.exe 1092 yryhdbmu.exe 1092 yryhdbmu.exe 1092 yryhdbmu.exe 1092 yryhdbmu.exe 1092 yryhdbmu.exe 1092 yryhdbmu.exe 1092 yryhdbmu.exe 1092 yryhdbmu.exe 1092 yryhdbmu.exe 1092 yryhdbmu.exe 1092 yryhdbmu.exe 1092 yryhdbmu.exe 1092 yryhdbmu.exe 1092 yryhdbmu.exe 1092 yryhdbmu.exe 1092 yryhdbmu.exe 1092 yryhdbmu.exe 1092 yryhdbmu.exe 1092 yryhdbmu.exe 1092 yryhdbmu.exe 1092 yryhdbmu.exe 1092 yryhdbmu.exe 1092 yryhdbmu.exe 1092 yryhdbmu.exe 1092 yryhdbmu.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
taskkill.exedescription pid process Token: SeDebugPrivilege 1156 taskkill.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
yryhdbmu.exepid process 1092 yryhdbmu.exe 1092 yryhdbmu.exe 1092 yryhdbmu.exe 1092 yryhdbmu.exe -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
yryhdbmu.exepid process 1092 yryhdbmu.exe 1092 yryhdbmu.exe 1092 yryhdbmu.exe 1092 yryhdbmu.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
833af9a70a64ee226149367dd378d6d81cc4584ff95b8950ddf1cce23829ddc1.execmd.exedescription pid process target process PID 1448 wrote to memory of 1212 1448 833af9a70a64ee226149367dd378d6d81cc4584ff95b8950ddf1cce23829ddc1.exe cmd.exe PID 1448 wrote to memory of 1212 1448 833af9a70a64ee226149367dd378d6d81cc4584ff95b8950ddf1cce23829ddc1.exe cmd.exe PID 1448 wrote to memory of 1212 1448 833af9a70a64ee226149367dd378d6d81cc4584ff95b8950ddf1cce23829ddc1.exe cmd.exe PID 1448 wrote to memory of 1212 1448 833af9a70a64ee226149367dd378d6d81cc4584ff95b8950ddf1cce23829ddc1.exe cmd.exe PID 1212 wrote to memory of 1156 1212 cmd.exe taskkill.exe PID 1212 wrote to memory of 1156 1212 cmd.exe taskkill.exe PID 1212 wrote to memory of 1156 1212 cmd.exe taskkill.exe PID 1212 wrote to memory of 1156 1212 cmd.exe taskkill.exe PID 1212 wrote to memory of 668 1212 cmd.exe PING.EXE PID 1212 wrote to memory of 668 1212 cmd.exe PING.EXE PID 1212 wrote to memory of 668 1212 cmd.exe PING.EXE PID 1212 wrote to memory of 668 1212 cmd.exe PING.EXE PID 1212 wrote to memory of 1092 1212 cmd.exe yryhdbmu.exe PID 1212 wrote to memory of 1092 1212 cmd.exe yryhdbmu.exe PID 1212 wrote to memory of 1092 1212 cmd.exe yryhdbmu.exe PID 1212 wrote to memory of 1092 1212 cmd.exe yryhdbmu.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\833af9a70a64ee226149367dd378d6d81cc4584ff95b8950ddf1cce23829ddc1.exe"C:\Users\Admin\AppData\Local\Temp\833af9a70a64ee226149367dd378d6d81cc4584ff95b8950ddf1cce23829ddc1.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /f /pid 1448 & ping -n 3 127.1 & del /f /q "C:\Users\Admin\AppData\Local\Temp\833af9a70a64ee226149367dd378d6d81cc4584ff95b8950ddf1cce23829ddc1.exe" & start C:\Users\Admin\AppData\Local\yryhdbmu.exe -f2⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /pid 14483⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\PING.EXEping -n 3 127.13⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\yryhdbmu.exeC:\Users\Admin\AppData\Local\yryhdbmu.exe -f3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\yryhdbmu.exeFilesize
299KB
MD506a8d9b0ad5af32b05f6269fa507cb2d
SHA18551ff05e0daf82b0d9608b93c7d3dd075ffbc50
SHA256833af9a70a64ee226149367dd378d6d81cc4584ff95b8950ddf1cce23829ddc1
SHA51220e7b1ba9296ebac5fe97c1a5b6207a909eb76a0b53a5b061ec56e22d273296c18d64efa8de6bfdb14a76662afe9d77b06ad717c97de03679c83f2f53d6bc5c2
-
C:\Users\Admin\AppData\Local\yryhdbmu.exeFilesize
299KB
MD506a8d9b0ad5af32b05f6269fa507cb2d
SHA18551ff05e0daf82b0d9608b93c7d3dd075ffbc50
SHA256833af9a70a64ee226149367dd378d6d81cc4584ff95b8950ddf1cce23829ddc1
SHA51220e7b1ba9296ebac5fe97c1a5b6207a909eb76a0b53a5b061ec56e22d273296c18d64efa8de6bfdb14a76662afe9d77b06ad717c97de03679c83f2f53d6bc5c2
-
\Users\Admin\AppData\Local\yryhdbmu.exeFilesize
299KB
MD506a8d9b0ad5af32b05f6269fa507cb2d
SHA18551ff05e0daf82b0d9608b93c7d3dd075ffbc50
SHA256833af9a70a64ee226149367dd378d6d81cc4584ff95b8950ddf1cce23829ddc1
SHA51220e7b1ba9296ebac5fe97c1a5b6207a909eb76a0b53a5b061ec56e22d273296c18d64efa8de6bfdb14a76662afe9d77b06ad717c97de03679c83f2f53d6bc5c2
-
\Users\Admin\AppData\Local\yryhdbmu.exeFilesize
299KB
MD506a8d9b0ad5af32b05f6269fa507cb2d
SHA18551ff05e0daf82b0d9608b93c7d3dd075ffbc50
SHA256833af9a70a64ee226149367dd378d6d81cc4584ff95b8950ddf1cce23829ddc1
SHA51220e7b1ba9296ebac5fe97c1a5b6207a909eb76a0b53a5b061ec56e22d273296c18d64efa8de6bfdb14a76662afe9d77b06ad717c97de03679c83f2f53d6bc5c2
-
\Users\Admin\AppData\Local\yryhdbmu.exeFilesize
299KB
MD506a8d9b0ad5af32b05f6269fa507cb2d
SHA18551ff05e0daf82b0d9608b93c7d3dd075ffbc50
SHA256833af9a70a64ee226149367dd378d6d81cc4584ff95b8950ddf1cce23829ddc1
SHA51220e7b1ba9296ebac5fe97c1a5b6207a909eb76a0b53a5b061ec56e22d273296c18d64efa8de6bfdb14a76662afe9d77b06ad717c97de03679c83f2f53d6bc5c2
-
memory/668-60-0x0000000000000000-mapping.dmp
-
memory/1092-64-0x0000000000000000-mapping.dmp
-
memory/1092-70-0x0000000001000000-0x00000000010A6000-memory.dmpFilesize
664KB
-
memory/1092-71-0x0000000001000000-0x00000000010A6000-memory.dmpFilesize
664KB
-
memory/1156-59-0x0000000000000000-mapping.dmp
-
memory/1212-57-0x0000000000000000-mapping.dmp
-
memory/1448-58-0x0000000001000000-0x00000000010A6000-memory.dmpFilesize
664KB
-
memory/1448-54-0x00000000758B1000-0x00000000758B3000-memory.dmpFilesize
8KB
-
memory/1448-56-0x0000000001000000-0x00000000010A6000-memory.dmpFilesize
664KB