Analysis
-
max time kernel
167s -
max time network
190s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 19:28
Static task
static1
Behavioral task
behavioral1
Sample
268454d0edc8ef4ab1aa22b67d09101badc7945aaeeb1b3f1f9b74bfa2978ed8.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
268454d0edc8ef4ab1aa22b67d09101badc7945aaeeb1b3f1f9b74bfa2978ed8.exe
Resource
win10v2004-20220812-en
General
-
Target
268454d0edc8ef4ab1aa22b67d09101badc7945aaeeb1b3f1f9b74bfa2978ed8.exe
-
Size
303KB
-
MD5
d8027ba768b6d32564abbd0c7d757545
-
SHA1
968631e477b9e1ddca039c576182408a1c9c62ee
-
SHA256
268454d0edc8ef4ab1aa22b67d09101badc7945aaeeb1b3f1f9b74bfa2978ed8
-
SHA512
74d90cd38243434ea3fe94759aca4e8630154c5f7156a3bb36beb640007fcf5c0482fd607d80f14924bfa1bd091de10f4307d415df6447d1a5704d538e06af38
-
SSDEEP
6144:8yIdcbBW5HMx5XAQb8osNrIpJ2h9VFwiYqeQROlf6WBflilua4ksoYqdC:adcbBAHMx5Q88u0j+iYqeQQZ6WBY4j
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1384 yfji.exe -
Deletes itself 1 IoCs
pid Process 1516 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1668 268454d0edc8ef4ab1aa22b67d09101badc7945aaeeb1b3f1f9b74bfa2978ed8.exe 1668 268454d0edc8ef4ab1aa22b67d09101badc7945aaeeb1b3f1f9b74bfa2978ed8.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run yfji.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\Yfji = "C:\\Users\\Admin\\AppData\\Roaming\\Utgyl\\yfji.exe" yfji.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1668 set thread context of 1516 1668 268454d0edc8ef4ab1aa22b67d09101badc7945aaeeb1b3f1f9b74bfa2978ed8.exe 29 -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 1384 yfji.exe 1384 yfji.exe 1384 yfji.exe 1384 yfji.exe 1384 yfji.exe 1384 yfji.exe 1384 yfji.exe 1384 yfji.exe 1384 yfji.exe 1384 yfji.exe 1384 yfji.exe 1384 yfji.exe 1384 yfji.exe 1384 yfji.exe 1384 yfji.exe 1384 yfji.exe 1384 yfji.exe 1384 yfji.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1668 wrote to memory of 1384 1668 268454d0edc8ef4ab1aa22b67d09101badc7945aaeeb1b3f1f9b74bfa2978ed8.exe 28 PID 1668 wrote to memory of 1384 1668 268454d0edc8ef4ab1aa22b67d09101badc7945aaeeb1b3f1f9b74bfa2978ed8.exe 28 PID 1668 wrote to memory of 1384 1668 268454d0edc8ef4ab1aa22b67d09101badc7945aaeeb1b3f1f9b74bfa2978ed8.exe 28 PID 1668 wrote to memory of 1384 1668 268454d0edc8ef4ab1aa22b67d09101badc7945aaeeb1b3f1f9b74bfa2978ed8.exe 28 PID 1384 wrote to memory of 1116 1384 yfji.exe 15 PID 1384 wrote to memory of 1116 1384 yfji.exe 15 PID 1384 wrote to memory of 1116 1384 yfji.exe 15 PID 1384 wrote to memory of 1116 1384 yfji.exe 15 PID 1384 wrote to memory of 1116 1384 yfji.exe 15 PID 1384 wrote to memory of 1168 1384 yfji.exe 6 PID 1384 wrote to memory of 1168 1384 yfji.exe 6 PID 1384 wrote to memory of 1168 1384 yfji.exe 6 PID 1384 wrote to memory of 1168 1384 yfji.exe 6 PID 1384 wrote to memory of 1168 1384 yfji.exe 6 PID 1384 wrote to memory of 1224 1384 yfji.exe 14 PID 1384 wrote to memory of 1224 1384 yfji.exe 14 PID 1384 wrote to memory of 1224 1384 yfji.exe 14 PID 1384 wrote to memory of 1224 1384 yfji.exe 14 PID 1384 wrote to memory of 1224 1384 yfji.exe 14 PID 1384 wrote to memory of 1668 1384 yfji.exe 12 PID 1384 wrote to memory of 1668 1384 yfji.exe 12 PID 1384 wrote to memory of 1668 1384 yfji.exe 12 PID 1384 wrote to memory of 1668 1384 yfji.exe 12 PID 1384 wrote to memory of 1668 1384 yfji.exe 12 PID 1668 wrote to memory of 1516 1668 268454d0edc8ef4ab1aa22b67d09101badc7945aaeeb1b3f1f9b74bfa2978ed8.exe 29 PID 1668 wrote to memory of 1516 1668 268454d0edc8ef4ab1aa22b67d09101badc7945aaeeb1b3f1f9b74bfa2978ed8.exe 29 PID 1668 wrote to memory of 1516 1668 268454d0edc8ef4ab1aa22b67d09101badc7945aaeeb1b3f1f9b74bfa2978ed8.exe 29 PID 1668 wrote to memory of 1516 1668 268454d0edc8ef4ab1aa22b67d09101badc7945aaeeb1b3f1f9b74bfa2978ed8.exe 29 PID 1668 wrote to memory of 1516 1668 268454d0edc8ef4ab1aa22b67d09101badc7945aaeeb1b3f1f9b74bfa2978ed8.exe 29 PID 1668 wrote to memory of 1516 1668 268454d0edc8ef4ab1aa22b67d09101badc7945aaeeb1b3f1f9b74bfa2978ed8.exe 29 PID 1668 wrote to memory of 1516 1668 268454d0edc8ef4ab1aa22b67d09101badc7945aaeeb1b3f1f9b74bfa2978ed8.exe 29 PID 1668 wrote to memory of 1516 1668 268454d0edc8ef4ab1aa22b67d09101badc7945aaeeb1b3f1f9b74bfa2978ed8.exe 29 PID 1668 wrote to memory of 1516 1668 268454d0edc8ef4ab1aa22b67d09101badc7945aaeeb1b3f1f9b74bfa2978ed8.exe 29
Processes
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1168
-
C:\Users\Admin\AppData\Local\Temp\268454d0edc8ef4ab1aa22b67d09101badc7945aaeeb1b3f1f9b74bfa2978ed8.exe"C:\Users\Admin\AppData\Local\Temp\268454d0edc8ef4ab1aa22b67d09101badc7945aaeeb1b3f1f9b74bfa2978ed8.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Roaming\Utgyl\yfji.exe"C:\Users\Admin\AppData\Roaming\Utgyl\yfji.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1384
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\SAA81B2.bat"2⤵
- Deletes itself
PID:1516
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1224
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1116
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
303B
MD51c5c04b6851f1dfa013cb40316dd8248
SHA164f5aa455709ee33dd4c6b80bf9979e870b8a4b9
SHA256cc63c395156a37dad16df080620a6bd7f1e503ae01cc28a4e57ab852370740e6
SHA5124f3cf56b628a8911cb45081b20cfba54521e813be87050737bfeba41e4a0e1bb73aa58d60c17b5e1b5a74b00d89207b7c1c34dbb2145deba1e56cc3e4ceb935d
-
Filesize
303KB
MD558670921a9797d2225f6ae7bb4741325
SHA11876b12cdd509bf8532851aff09e100ba43fb4ba
SHA256334c37a6385bc9e0051ab0c43018aff8d3e6e61889144678f8286ec62290fc02
SHA5123d33f91ccfb3d5a318bfd707cdea88bfbdde1b24c5f433a72d6da9b46cc004a6a3f24372a74d48b94ed76a867c9d50529c5204c2ff8aecb3a5926b338f07c4db
-
Filesize
303KB
MD558670921a9797d2225f6ae7bb4741325
SHA11876b12cdd509bf8532851aff09e100ba43fb4ba
SHA256334c37a6385bc9e0051ab0c43018aff8d3e6e61889144678f8286ec62290fc02
SHA5123d33f91ccfb3d5a318bfd707cdea88bfbdde1b24c5f433a72d6da9b46cc004a6a3f24372a74d48b94ed76a867c9d50529c5204c2ff8aecb3a5926b338f07c4db
-
Filesize
303KB
MD558670921a9797d2225f6ae7bb4741325
SHA11876b12cdd509bf8532851aff09e100ba43fb4ba
SHA256334c37a6385bc9e0051ab0c43018aff8d3e6e61889144678f8286ec62290fc02
SHA5123d33f91ccfb3d5a318bfd707cdea88bfbdde1b24c5f433a72d6da9b46cc004a6a3f24372a74d48b94ed76a867c9d50529c5204c2ff8aecb3a5926b338f07c4db
-
Filesize
303KB
MD558670921a9797d2225f6ae7bb4741325
SHA11876b12cdd509bf8532851aff09e100ba43fb4ba
SHA256334c37a6385bc9e0051ab0c43018aff8d3e6e61889144678f8286ec62290fc02
SHA5123d33f91ccfb3d5a318bfd707cdea88bfbdde1b24c5f433a72d6da9b46cc004a6a3f24372a74d48b94ed76a867c9d50529c5204c2ff8aecb3a5926b338f07c4db