Analysis
-
max time kernel
185s -
max time network
192s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
28-11-2022 03:13
Static task
static1
Behavioral task
behavioral1
Sample
4df7dcc3326fd512b7f042332343a814e4e2107ac6665b450c0532127abdfadd.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4df7dcc3326fd512b7f042332343a814e4e2107ac6665b450c0532127abdfadd.exe
Resource
win10v2004-20221111-en
General
-
Target
4df7dcc3326fd512b7f042332343a814e4e2107ac6665b450c0532127abdfadd.exe
-
Size
904KB
-
MD5
ceff73b6c6ffe04ccf4e4c4a827890e1
-
SHA1
7ad4ed9200615b69c99892e5a3629aed86fd92ef
-
SHA256
4df7dcc3326fd512b7f042332343a814e4e2107ac6665b450c0532127abdfadd
-
SHA512
c65da9ebc1e31009734a2da277b7504978084e29a110ebdde7ab4b87fa8ef4b3db17d34e1deeb978f5d37ac900edcc9271eb80f43e97e246c897cf378f297076
-
SSDEEP
24576:p+Fw2IgKTiyqJy0KK/MOBFR0hkD1X5fluEq2i53rlVgi:p6w2NKmyqJyxLgFR7D1X5YlJ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
youbo.exepid process 2036 youbo.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1300 cmd.exe -
Loads dropped DLL 11 IoCs
Processes:
4df7dcc3326fd512b7f042332343a814e4e2107ac6665b450c0532127abdfadd.exeWerFault.exepid process 964 4df7dcc3326fd512b7f042332343a814e4e2107ac6665b450c0532127abdfadd.exe 964 4df7dcc3326fd512b7f042332343a814e4e2107ac6665b450c0532127abdfadd.exe 964 4df7dcc3326fd512b7f042332343a814e4e2107ac6665b450c0532127abdfadd.exe 964 4df7dcc3326fd512b7f042332343a814e4e2107ac6665b450c0532127abdfadd.exe 1648 WerFault.exe 1648 WerFault.exe 1648 WerFault.exe 1648 WerFault.exe 1648 WerFault.exe 1648 WerFault.exe 1648 WerFault.exe -
Drops file in Program Files directory 5 IoCs
Processes:
4df7dcc3326fd512b7f042332343a814e4e2107ac6665b450c0532127abdfadd.exedescription ioc process File created C:\Program Files (x86)\yytx\install_1669706359.tmp 4df7dcc3326fd512b7f042332343a814e4e2107ac6665b450c0532127abdfadd.exe File created C:\Program Files (x86)\yytx\youbo.exe 4df7dcc3326fd512b7f042332343a814e4e2107ac6665b450c0532127abdfadd.exe File opened for modification C:\Program Files (x86)\yytx\youbo.exe 4df7dcc3326fd512b7f042332343a814e4e2107ac6665b450c0532127abdfadd.exe File created C:\Program Files (x86)\yytx\unist.exe 4df7dcc3326fd512b7f042332343a814e4e2107ac6665b450c0532127abdfadd.exe File opened for modification C:\Program Files (x86)\yytx\unist.exe 4df7dcc3326fd512b7f042332343a814e4e2107ac6665b450c0532127abdfadd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1648 2036 WerFault.exe youbo.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 1496 taskkill.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
taskkill.exedescription pid process Token: SeDebugPrivilege 1496 taskkill.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
youbo.exepid process 2036 youbo.exe 2036 youbo.exe 2036 youbo.exe 2036 youbo.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
4df7dcc3326fd512b7f042332343a814e4e2107ac6665b450c0532127abdfadd.execmd.exeyoubo.exedescription pid process target process PID 964 wrote to memory of 2036 964 4df7dcc3326fd512b7f042332343a814e4e2107ac6665b450c0532127abdfadd.exe youbo.exe PID 964 wrote to memory of 2036 964 4df7dcc3326fd512b7f042332343a814e4e2107ac6665b450c0532127abdfadd.exe youbo.exe PID 964 wrote to memory of 2036 964 4df7dcc3326fd512b7f042332343a814e4e2107ac6665b450c0532127abdfadd.exe youbo.exe PID 964 wrote to memory of 2036 964 4df7dcc3326fd512b7f042332343a814e4e2107ac6665b450c0532127abdfadd.exe youbo.exe PID 964 wrote to memory of 1300 964 4df7dcc3326fd512b7f042332343a814e4e2107ac6665b450c0532127abdfadd.exe cmd.exe PID 964 wrote to memory of 1300 964 4df7dcc3326fd512b7f042332343a814e4e2107ac6665b450c0532127abdfadd.exe cmd.exe PID 964 wrote to memory of 1300 964 4df7dcc3326fd512b7f042332343a814e4e2107ac6665b450c0532127abdfadd.exe cmd.exe PID 964 wrote to memory of 1300 964 4df7dcc3326fd512b7f042332343a814e4e2107ac6665b450c0532127abdfadd.exe cmd.exe PID 1300 wrote to memory of 1768 1300 cmd.exe PING.EXE PID 1300 wrote to memory of 1768 1300 cmd.exe PING.EXE PID 1300 wrote to memory of 1768 1300 cmd.exe PING.EXE PID 1300 wrote to memory of 1768 1300 cmd.exe PING.EXE PID 1300 wrote to memory of 1496 1300 cmd.exe taskkill.exe PID 1300 wrote to memory of 1496 1300 cmd.exe taskkill.exe PID 1300 wrote to memory of 1496 1300 cmd.exe taskkill.exe PID 1300 wrote to memory of 1496 1300 cmd.exe taskkill.exe PID 2036 wrote to memory of 1648 2036 youbo.exe WerFault.exe PID 2036 wrote to memory of 1648 2036 youbo.exe WerFault.exe PID 2036 wrote to memory of 1648 2036 youbo.exe WerFault.exe PID 2036 wrote to memory of 1648 2036 youbo.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4df7dcc3326fd512b7f042332343a814e4e2107ac6665b450c0532127abdfadd.exe"C:\Users\Admin\AppData\Local\Temp\4df7dcc3326fd512b7f042332343a814e4e2107ac6665b450c0532127abdfadd.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\yytx\youbo.exe"C:\Program Files (x86)\yytx\youbo.exe" inst2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2036 -s 6083⤵
- Loads dropped DLL
- Program crash
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Tempa.bat2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 /n 53⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM 4df7dcc3326fd512b7f042332343a814e4e2107ac6665b450c0532127abdfadd.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\yytx\youbo.exeFilesize
1.7MB
MD5474e023d6e8b5fac9d69ade44e47969d
SHA1c82b19b570a81b2e3356b81073755fddac568396
SHA256c05adc01400b138768cc614d74d4e7bd60a49a371ea9256dfb0c61d9d6dba173
SHA512666682572dbc9d608938091b7addebcb96edeaaec671539aa5a1276cdac28844e1c2fad12b8289baa8c7580914753595c2fd64afaf204296b0f9b9f69fcfbf9e
-
C:\Users\Admin\AppData\Local\Tempa.batFilesize
357B
MD5cebcfeee035fb75553e7ccb6d9f7da16
SHA1b0811280eb72299ffcbb54119200ecd87109e747
SHA256cb686fb5eee787b4a152673270d9a51ca9d37262ae560ffb876318193b67221c
SHA51244dead96d23ad227a56835a97d98b4530495bdbc8e9d277c6a9cd5253cecfd255a9bc3d1694a422c13f3e7c002c9ea5e88b7c7f7b02a9127825715cf03c3a81c
-
C:\Users\Admin\AppData\Local\yytx\config.iniFilesize
94B
MD5b7cd0cb10b659cc2cb41e94589865352
SHA18f7e1bfd887ed76e02099dfc8041a77ac8b4f07c
SHA25688e8cb6584ffb1decf69503fbf881e3e636fa776fbbb19c8f7e36d79597429b9
SHA51267b7c5fc6dadc0424ddad66d7d4828ce165a3271cd41691afc7483979f0e56382b03a5313c995049464dc64b6e1221a55b989486edab0b977f87c1ac5926f408
-
\Program Files (x86)\yytx\unist.exeFilesize
298KB
MD5c757a37058811d8b129d2e16c7027f2d
SHA1819298918fae59743360497f4cbf1b483bd5923b
SHA25606e0bd7b9c6448d2b4aee3128266fb19ecdfe2bd190a973805b813ec4e9f5b54
SHA512e413eff73f87fb337bfb89c9b7565fe1a6a99ce17516b31f6f074d3239d0d8aa37065eefa92f2dffca61b827b9bc59e10b71f5fba1dc0f74efde294d4502984d
-
\Program Files (x86)\yytx\youbo.exeFilesize
1.7MB
MD5474e023d6e8b5fac9d69ade44e47969d
SHA1c82b19b570a81b2e3356b81073755fddac568396
SHA256c05adc01400b138768cc614d74d4e7bd60a49a371ea9256dfb0c61d9d6dba173
SHA512666682572dbc9d608938091b7addebcb96edeaaec671539aa5a1276cdac28844e1c2fad12b8289baa8c7580914753595c2fd64afaf204296b0f9b9f69fcfbf9e
-
\Program Files (x86)\yytx\youbo.exeFilesize
1.7MB
MD5474e023d6e8b5fac9d69ade44e47969d
SHA1c82b19b570a81b2e3356b81073755fddac568396
SHA256c05adc01400b138768cc614d74d4e7bd60a49a371ea9256dfb0c61d9d6dba173
SHA512666682572dbc9d608938091b7addebcb96edeaaec671539aa5a1276cdac28844e1c2fad12b8289baa8c7580914753595c2fd64afaf204296b0f9b9f69fcfbf9e
-
\Program Files (x86)\yytx\youbo.exeFilesize
1.7MB
MD5474e023d6e8b5fac9d69ade44e47969d
SHA1c82b19b570a81b2e3356b81073755fddac568396
SHA256c05adc01400b138768cc614d74d4e7bd60a49a371ea9256dfb0c61d9d6dba173
SHA512666682572dbc9d608938091b7addebcb96edeaaec671539aa5a1276cdac28844e1c2fad12b8289baa8c7580914753595c2fd64afaf204296b0f9b9f69fcfbf9e
-
\Program Files (x86)\yytx\youbo.exeFilesize
1.7MB
MD5474e023d6e8b5fac9d69ade44e47969d
SHA1c82b19b570a81b2e3356b81073755fddac568396
SHA256c05adc01400b138768cc614d74d4e7bd60a49a371ea9256dfb0c61d9d6dba173
SHA512666682572dbc9d608938091b7addebcb96edeaaec671539aa5a1276cdac28844e1c2fad12b8289baa8c7580914753595c2fd64afaf204296b0f9b9f69fcfbf9e
-
\Program Files (x86)\yytx\youbo.exeFilesize
1.7MB
MD5474e023d6e8b5fac9d69ade44e47969d
SHA1c82b19b570a81b2e3356b81073755fddac568396
SHA256c05adc01400b138768cc614d74d4e7bd60a49a371ea9256dfb0c61d9d6dba173
SHA512666682572dbc9d608938091b7addebcb96edeaaec671539aa5a1276cdac28844e1c2fad12b8289baa8c7580914753595c2fd64afaf204296b0f9b9f69fcfbf9e
-
\Program Files (x86)\yytx\youbo.exeFilesize
1.7MB
MD5474e023d6e8b5fac9d69ade44e47969d
SHA1c82b19b570a81b2e3356b81073755fddac568396
SHA256c05adc01400b138768cc614d74d4e7bd60a49a371ea9256dfb0c61d9d6dba173
SHA512666682572dbc9d608938091b7addebcb96edeaaec671539aa5a1276cdac28844e1c2fad12b8289baa8c7580914753595c2fd64afaf204296b0f9b9f69fcfbf9e
-
\Program Files (x86)\yytx\youbo.exeFilesize
1.7MB
MD5474e023d6e8b5fac9d69ade44e47969d
SHA1c82b19b570a81b2e3356b81073755fddac568396
SHA256c05adc01400b138768cc614d74d4e7bd60a49a371ea9256dfb0c61d9d6dba173
SHA512666682572dbc9d608938091b7addebcb96edeaaec671539aa5a1276cdac28844e1c2fad12b8289baa8c7580914753595c2fd64afaf204296b0f9b9f69fcfbf9e
-
\Program Files (x86)\yytx\youbo.exeFilesize
1.7MB
MD5474e023d6e8b5fac9d69ade44e47969d
SHA1c82b19b570a81b2e3356b81073755fddac568396
SHA256c05adc01400b138768cc614d74d4e7bd60a49a371ea9256dfb0c61d9d6dba173
SHA512666682572dbc9d608938091b7addebcb96edeaaec671539aa5a1276cdac28844e1c2fad12b8289baa8c7580914753595c2fd64afaf204296b0f9b9f69fcfbf9e
-
\Program Files (x86)\yytx\youbo.exeFilesize
1.7MB
MD5474e023d6e8b5fac9d69ade44e47969d
SHA1c82b19b570a81b2e3356b81073755fddac568396
SHA256c05adc01400b138768cc614d74d4e7bd60a49a371ea9256dfb0c61d9d6dba173
SHA512666682572dbc9d608938091b7addebcb96edeaaec671539aa5a1276cdac28844e1c2fad12b8289baa8c7580914753595c2fd64afaf204296b0f9b9f69fcfbf9e
-
\Program Files (x86)\yytx\youbo.exeFilesize
1.7MB
MD5474e023d6e8b5fac9d69ade44e47969d
SHA1c82b19b570a81b2e3356b81073755fddac568396
SHA256c05adc01400b138768cc614d74d4e7bd60a49a371ea9256dfb0c61d9d6dba173
SHA512666682572dbc9d608938091b7addebcb96edeaaec671539aa5a1276cdac28844e1c2fad12b8289baa8c7580914753595c2fd64afaf204296b0f9b9f69fcfbf9e
-
memory/964-54-0x0000000075DA1000-0x0000000075DA3000-memory.dmpFilesize
8KB
-
memory/1300-63-0x0000000000000000-mapping.dmp
-
memory/1496-66-0x0000000000000000-mapping.dmp
-
memory/1648-67-0x0000000000000000-mapping.dmp
-
memory/1768-65-0x0000000000000000-mapping.dmp
-
memory/2036-59-0x0000000000000000-mapping.dmp