Analysis
-
max time kernel
188s -
max time network
197s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2022 05:49
Static task
static1
Behavioral task
behavioral1
Sample
光棍节快速免费WEB刷花协议/2014年11月最新QB漏洞.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
光棍节快速免费WEB刷花协议/2014年11月最新QB漏洞.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
光棍节快速免费WEB刷花协议/WEB无限刷花协议11.11.exe
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
光棍节快速免费WEB刷花协议/WEB无限刷花协议11.11.exe
Resource
win10v2004-20220812-en
General
-
Target
光棍节快速免费WEB刷花协议/WEB无限刷花协议11.11.exe
-
Size
1.6MB
-
MD5
f84e4dd9cddd7925078a10cae8009c31
-
SHA1
97a94ed43ec689934fe7af84f9570194570fc781
-
SHA256
54adb1549616d0c11a9b6aa9c3a7363e8d65ca00261332db793dbb24d59ce8e2
-
SHA512
3e0d7c91b144ef52ad988e53a80a1b4457d9b77e5350341f4706b2707abc5b416aa761d1c35fdd4c13c5b5bdc935670e2ee957fe62c296c3d6dab8876a2c513b
-
SSDEEP
24576:HNw52RX3IGgsPJnOK5BF6t1poyRBKx3htCYpJ4+I0z1N2V2:HDBhrFulixtC24+RU2
Malware Config
Signatures
-
Processes:
resource yara_rule C:\Windows\SysWOW64\yyberi.exe aspack_v212_v242 C:\Windows\SysWOW64\yyberi.exe aspack_v212_v242 -
Executes dropped EXE 1 IoCs
Processes:
yyberi.exepid process 220 yyberi.exe -
Processes:
resource yara_rule C:\Windows\SysWOW64\yyberi.exe vmprotect C:\Windows\SysWOW64\yyberi.exe vmprotect behavioral4/memory/220-135-0x0000000000400000-0x00000000005A7000-memory.dmp vmprotect behavioral4/memory/220-137-0x0000000000400000-0x00000000005A7000-memory.dmp vmprotect behavioral4/memory/220-154-0x0000000000400000-0x00000000005A7000-memory.dmp vmprotect -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
yyberi.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\yyberi.exe = "C:\\Windows\\SysWOW64\\yyberi.exe" yyberi.exe -
Drops file in System32 directory 2 IoCs
Processes:
WEB无限刷花协议11.11.exedescription ioc process File opened for modification C:\Windows\SysWOW64\yyberi.exe WEB无限刷花协议11.11.exe File created C:\Windows\SysWOW64\yyberi.exe WEB无限刷花协议11.11.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Processes:
yyberi.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\yy.com\NumberOfSubdomains = "1" yyberi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Play_Background_Sounds = "no" yyberi.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\GPU yyberi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x1414\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"6.2.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" yyberi.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\DOMStorage\yy.com yyberi.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage yyberi.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\yy.com yyberi.exe -
Modifies registry class 1 IoCs
Processes:
msedge.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
msedge.exemsedge.exemsedge.exepid process 3232 msedge.exe 3232 msedge.exe 5036 msedge.exe 5036 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
Processes:
msedge.exepid process 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
msedge.exepid process 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
WEB无限刷花协议11.11.exeyyberi.exepid process 4428 WEB无限刷花协议11.11.exe 4428 WEB无限刷花协议11.11.exe 4428 WEB无限刷花协议11.11.exe 4428 WEB无限刷花协议11.11.exe 220 yyberi.exe 220 yyberi.exe 220 yyberi.exe 220 yyberi.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
WEB无限刷花协议11.11.exemsedge.exedescription pid process target process PID 4428 wrote to memory of 220 4428 WEB无限刷花协议11.11.exe yyberi.exe PID 4428 wrote to memory of 220 4428 WEB无限刷花协议11.11.exe yyberi.exe PID 4428 wrote to memory of 220 4428 WEB无限刷花协议11.11.exe yyberi.exe PID 4428 wrote to memory of 5036 4428 WEB无限刷花协议11.11.exe msedge.exe PID 4428 wrote to memory of 5036 4428 WEB无限刷花协议11.11.exe msedge.exe PID 5036 wrote to memory of 1420 5036 msedge.exe msedge.exe PID 5036 wrote to memory of 1420 5036 msedge.exe msedge.exe PID 5036 wrote to memory of 3128 5036 msedge.exe msedge.exe PID 5036 wrote to memory of 3128 5036 msedge.exe msedge.exe PID 5036 wrote to memory of 3128 5036 msedge.exe msedge.exe PID 5036 wrote to memory of 3128 5036 msedge.exe msedge.exe PID 5036 wrote to memory of 3128 5036 msedge.exe msedge.exe PID 5036 wrote to memory of 3128 5036 msedge.exe msedge.exe PID 5036 wrote to memory of 3128 5036 msedge.exe msedge.exe PID 5036 wrote to memory of 3128 5036 msedge.exe msedge.exe PID 5036 wrote to memory of 3128 5036 msedge.exe msedge.exe PID 5036 wrote to memory of 3128 5036 msedge.exe msedge.exe PID 5036 wrote to memory of 3128 5036 msedge.exe msedge.exe PID 5036 wrote to memory of 3128 5036 msedge.exe msedge.exe PID 5036 wrote to memory of 3128 5036 msedge.exe msedge.exe PID 5036 wrote to memory of 3128 5036 msedge.exe msedge.exe PID 5036 wrote to memory of 3128 5036 msedge.exe msedge.exe PID 5036 wrote to memory of 3128 5036 msedge.exe msedge.exe PID 5036 wrote to memory of 3128 5036 msedge.exe msedge.exe PID 5036 wrote to memory of 3128 5036 msedge.exe msedge.exe PID 5036 wrote to memory of 3128 5036 msedge.exe msedge.exe PID 5036 wrote to memory of 3128 5036 msedge.exe msedge.exe PID 5036 wrote to memory of 3128 5036 msedge.exe msedge.exe PID 5036 wrote to memory of 3128 5036 msedge.exe msedge.exe PID 5036 wrote to memory of 3128 5036 msedge.exe msedge.exe PID 5036 wrote to memory of 3128 5036 msedge.exe msedge.exe PID 5036 wrote to memory of 3128 5036 msedge.exe msedge.exe PID 5036 wrote to memory of 3128 5036 msedge.exe msedge.exe PID 5036 wrote to memory of 3128 5036 msedge.exe msedge.exe PID 5036 wrote to memory of 3128 5036 msedge.exe msedge.exe PID 5036 wrote to memory of 3128 5036 msedge.exe msedge.exe PID 5036 wrote to memory of 3128 5036 msedge.exe msedge.exe PID 5036 wrote to memory of 3128 5036 msedge.exe msedge.exe PID 5036 wrote to memory of 3128 5036 msedge.exe msedge.exe PID 5036 wrote to memory of 3128 5036 msedge.exe msedge.exe PID 5036 wrote to memory of 3128 5036 msedge.exe msedge.exe PID 5036 wrote to memory of 3128 5036 msedge.exe msedge.exe PID 5036 wrote to memory of 3128 5036 msedge.exe msedge.exe PID 5036 wrote to memory of 3128 5036 msedge.exe msedge.exe PID 5036 wrote to memory of 3128 5036 msedge.exe msedge.exe PID 5036 wrote to memory of 3128 5036 msedge.exe msedge.exe PID 5036 wrote to memory of 3128 5036 msedge.exe msedge.exe PID 5036 wrote to memory of 3232 5036 msedge.exe msedge.exe PID 5036 wrote to memory of 3232 5036 msedge.exe msedge.exe PID 5036 wrote to memory of 2684 5036 msedge.exe msedge.exe PID 5036 wrote to memory of 2684 5036 msedge.exe msedge.exe PID 5036 wrote to memory of 2684 5036 msedge.exe msedge.exe PID 5036 wrote to memory of 2684 5036 msedge.exe msedge.exe PID 5036 wrote to memory of 2684 5036 msedge.exe msedge.exe PID 5036 wrote to memory of 2684 5036 msedge.exe msedge.exe PID 5036 wrote to memory of 2684 5036 msedge.exe msedge.exe PID 5036 wrote to memory of 2684 5036 msedge.exe msedge.exe PID 5036 wrote to memory of 2684 5036 msedge.exe msedge.exe PID 5036 wrote to memory of 2684 5036 msedge.exe msedge.exe PID 5036 wrote to memory of 2684 5036 msedge.exe msedge.exe PID 5036 wrote to memory of 2684 5036 msedge.exe msedge.exe PID 5036 wrote to memory of 2684 5036 msedge.exe msedge.exe PID 5036 wrote to memory of 2684 5036 msedge.exe msedge.exe PID 5036 wrote to memory of 2684 5036 msedge.exe msedge.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\光棍节快速免费WEB刷花协议\WEB无限刷花协议11.11.exe"C:\Users\Admin\AppData\Local\Temp\光棍节快速免费WEB刷花协议\WEB无限刷花协议11.11.exe"1⤵
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Windows\SysWOW64\yyberi.exeC:\Windows\System32\/yyberi.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.2345.com/?kduowanyy2⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x108,0x10c,0x110,0xe4,0x114,0x7ffd790146f8,0x7ffd79014708,0x7ffd790147183⤵PID:1420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,14941940918904023186,10823970196361199276,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 /prefetch:23⤵PID:3128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,14941940918904023186,10823970196361199276,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:3232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,14941940918904023186,10823970196361199276,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2752 /prefetch:83⤵PID:2684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14941940918904023186,10823970196361199276,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:13⤵PID:1372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14941940918904023186,10823970196361199276,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:13⤵PID:4252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2084,14941940918904023186,10823970196361199276,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4848 /prefetch:83⤵PID:2144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14941940918904023186,10823970196361199276,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:13⤵PID:3608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,14941940918904023186,10823970196361199276,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2632 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2084,14941940918904023186,10823970196361199276,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5728 /prefetch:83⤵PID:2896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14941940918904023186,10823970196361199276,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5756 /prefetch:13⤵PID:3604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14941940918904023186,10823970196361199276,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5676 /prefetch:13⤵PID:4756
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2328
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
476KB
MD5262c5d4706f08de4ee40cfd533f0c3d6
SHA13150ca9f7b477d1403bf3a4af73ee712cc8797f1
SHA25681bdb4e664879104d8754aad80bfc7f189450da3ea000198960fbd0c2c98ae67
SHA5121b72667b8428437ba68d994ff5b5918fed58d143f486b64089675d1bdca5afdfe4871df519082e7b26ac480b3d488c4a98abcf8375dcb4cdd8a2c57fe99b3a51
-
Filesize
476KB
MD5262c5d4706f08de4ee40cfd533f0c3d6
SHA13150ca9f7b477d1403bf3a4af73ee712cc8797f1
SHA25681bdb4e664879104d8754aad80bfc7f189450da3ea000198960fbd0c2c98ae67
SHA5121b72667b8428437ba68d994ff5b5918fed58d143f486b64089675d1bdca5afdfe4871df519082e7b26ac480b3d488c4a98abcf8375dcb4cdd8a2c57fe99b3a51
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e