Analysis
-
max time kernel
206s -
max time network
210s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2022 22:06
Behavioral task
behavioral1
Sample
等待YY帐号全自动注册机v3.4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
等待YY帐号全自动注册机v3.4.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
软件下载.url
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
软件下载.url
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
软件教程.url
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
软件教程.url
Resource
win10v2004-20220812-en
General
-
Target
等待YY帐号全自动注册机v3.4.exe
-
Size
1.4MB
-
MD5
9a990a05d06e3bbb67c5cf2652ac8206
-
SHA1
2cac7cb8943a5d7a8c194d2bc1b8ee1c8c48a354
-
SHA256
8a1fed3cf0ef659839dc1520df2e78735036652b691c44b07f8ab572cefd7143
-
SHA512
bc0f9f1c8beba7fef4ba74b698935086ebe139603f2aef48ad19c6c7c6c3f483b39c43cd1e64bde060a95e9235643fad55a2877952a54244dd66b9da923955a3
-
SSDEEP
24576:My5BswmjxTojBXfKrP4Nbko+QY+PCyZUya+CprkybKvS:MyDh06BP049kP+RK4eP
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1572-132-0x0000000000400000-0x0000000000755000-memory.dmp upx behavioral2/memory/1572-133-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1572-135-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1572-134-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1572-137-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1572-139-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1572-141-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1572-143-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1572-145-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1572-147-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1572-149-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1572-152-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1572-154-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1572-156-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1572-158-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1572-160-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1572-162-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1572-164-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1572-166-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1572-168-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1572-170-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1572-172-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1572-174-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1572-176-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1572-179-0x0000000000400000-0x0000000000755000-memory.dmp upx behavioral2/memory/1572-180-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Loads dropped DLL 2 IoCs
pid Process 1572 等待YY帐号全自动注册机v3.4.exe 1572 等待YY帐号全自动注册机v3.4.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 等待YY帐号全自动注册机v3.4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\IESettingSync 等待YY帐号全自动注册机v3.4.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" 等待YY帐号全自动注册机v3.4.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch 等待YY帐号全自动注册机v3.4.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" 等待YY帐号全自动注册机v3.4.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1572 等待YY帐号全自动注册机v3.4.exe 1572 等待YY帐号全自动注册机v3.4.exe 1572 等待YY帐号全自动注册机v3.4.exe 1572 等待YY帐号全自动注册机v3.4.exe 1572 等待YY帐号全自动注册机v3.4.exe
Processes
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5dc9a72042df8c01872be8f95e070113e
SHA16c72d8aa5d5bb78675f358cb669833a10e30f704
SHA256978cf5d25f9255977aa0eb7a3cc5e36873063ee87a9a0ac2a36df2cf80cdee04
SHA5120a0d1d41675cdf240af59434e18ef1f9f020682ab9d2605c055c52563a5026370f6b598747b3c0fc200b8d0afc9a4eecbc1cb9c810e85961d56059c7fe6d0e75
-
Filesize
159KB
MD5ab250ee54abc6c32975a544e9aafd661
SHA1be850caea2e01544ed948b66d62785f4215cb0d8
SHA2568eb01061f3815509a7e5d4d9010ace0e35fdd75597f22bb477e6caac6cd7d7d4
SHA51254a58ccd07191018c3c3f6c06098e59dfe23b5a39347b9252710003e4f4296ff04a8905e05779e0e26b04f448945b2fb5168f1c24a3d250062f81e599db2c399