Analysis
-
max time kernel
192s -
max time network
196s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2022 22:39
Static task
static1
Behavioral task
behavioral1
Sample
b3df40d3dfe91591a1532cbd4f676d841f208e496298c2c31b1386b30b45fcf5.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b3df40d3dfe91591a1532cbd4f676d841f208e496298c2c31b1386b30b45fcf5.exe
Resource
win10v2004-20220812-en
General
-
Target
b3df40d3dfe91591a1532cbd4f676d841f208e496298c2c31b1386b30b45fcf5.exe
-
Size
676KB
-
MD5
d848b72d1f7fc6a056bcc576897feff5
-
SHA1
b69f8527ae4f0f58034b072f15a150939f8db747
-
SHA256
b3df40d3dfe91591a1532cbd4f676d841f208e496298c2c31b1386b30b45fcf5
-
SHA512
14f95c1a6c265bf5166b2987c7faf6d4bc4fc725d8607878e0a82a78ae055be7061e94beacbf73aec1a1194807b3212629c762caa4efda76faafe6ce144d19ed
-
SSDEEP
12288:8K2mhAMJ/cPlUvVAeV2id7GPKirXxpz7A+TIP2WmcyoDJvmwD88y2fYZKknCHfoE:p2O/GlUvVAWd+rBp/1TC2WmcyCtz88yq
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
ygLHgdjnToq.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ygLHgdjnToq.exe -
Executes dropped EXE 1 IoCs
Processes:
ygLHgdjnToq.exepid process 4928 ygLHgdjnToq.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
b3df40d3dfe91591a1532cbd4f676d841f208e496298c2c31b1386b30b45fcf5.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation b3df40d3dfe91591a1532cbd4f676d841f208e496298c2c31b1386b30b45fcf5.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
ygLHgdjnToq.exedescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN ygLHgdjnToq.exe Key deleted \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN ygLHgdjnToq.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE ygLHgdjnToq.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE ygLHgdjnToq.exe Key deleted \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE ygLHgdjnToq.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce ygLHgdjnToq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\repair = "C:\\Users\\Admin\\AppData\\Local\\Temp\\repair\\ygLHgdjnToq.exe" ygLHgdjnToq.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN ygLHgdjnToq.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\repair\ygLHgdjnToq.exe autoit_exe C:\Users\Admin\AppData\Local\Temp\repair\ygLHgdjnToq.exe autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
ygLHgdjnToq.exedescription pid process target process PID 4928 set thread context of 3060 4928 ygLHgdjnToq.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4212 3060 WerFault.exe RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
ygLHgdjnToq.exepid process 4928 ygLHgdjnToq.exe 4928 ygLHgdjnToq.exe 4928 ygLHgdjnToq.exe 4928 ygLHgdjnToq.exe 4928 ygLHgdjnToq.exe 4928 ygLHgdjnToq.exe 4928 ygLHgdjnToq.exe 4928 ygLHgdjnToq.exe 4928 ygLHgdjnToq.exe 4928 ygLHgdjnToq.exe 4928 ygLHgdjnToq.exe 4928 ygLHgdjnToq.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
b3df40d3dfe91591a1532cbd4f676d841f208e496298c2c31b1386b30b45fcf5.exeygLHgdjnToq.exedescription pid process target process PID 1180 wrote to memory of 4928 1180 b3df40d3dfe91591a1532cbd4f676d841f208e496298c2c31b1386b30b45fcf5.exe ygLHgdjnToq.exe PID 1180 wrote to memory of 4928 1180 b3df40d3dfe91591a1532cbd4f676d841f208e496298c2c31b1386b30b45fcf5.exe ygLHgdjnToq.exe PID 1180 wrote to memory of 4928 1180 b3df40d3dfe91591a1532cbd4f676d841f208e496298c2c31b1386b30b45fcf5.exe ygLHgdjnToq.exe PID 4928 wrote to memory of 3060 4928 ygLHgdjnToq.exe RegSvcs.exe PID 4928 wrote to memory of 3060 4928 ygLHgdjnToq.exe RegSvcs.exe PID 4928 wrote to memory of 3060 4928 ygLHgdjnToq.exe RegSvcs.exe PID 4928 wrote to memory of 3060 4928 ygLHgdjnToq.exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b3df40d3dfe91591a1532cbd4f676d841f208e496298c2c31b1386b30b45fcf5.exe"C:\Users\Admin\AppData\Local\Temp\b3df40d3dfe91591a1532cbd4f676d841f208e496298c2c31b1386b30b45fcf5.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Users\Admin\AppData\Local\Temp\repair\ygLHgdjnToq.exe"C:\Users\Admin\AppData\Local\Temp\repair\ygLHgdjnToq.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"3⤵PID:3060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3060 -s 804⤵
- Program crash
PID:4212
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3060 -ip 30601⤵PID:788
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
992KB
MD53827071ae95dcfbfd0ca2b612a445275
SHA144232ee645620e9ea7f48780c3c04d7148604ab4
SHA256eab051cab7ea2f7bc5cf8fd9d0e4e1d96de2ec0a7e7e739449caaf301b9a192a
SHA5126fc0fd581c7a743ff4d5dd64459e9b833e3b3a9388ec4dc4fa3ae8c55eb6a84233a1dfa4c6cbfc7b076e368b5ab4b7a9c1da549e421f0063030d6c0a7aba2c8b
-
Filesize
992KB
MD53827071ae95dcfbfd0ca2b612a445275
SHA144232ee645620e9ea7f48780c3c04d7148604ab4
SHA256eab051cab7ea2f7bc5cf8fd9d0e4e1d96de2ec0a7e7e739449caaf301b9a192a
SHA5126fc0fd581c7a743ff4d5dd64459e9b833e3b3a9388ec4dc4fa3ae8c55eb6a84233a1dfa4c6cbfc7b076e368b5ab4b7a9c1da549e421f0063030d6c0a7aba2c8b