Analysis
-
max time kernel
150s -
max time network
76s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
01-12-2022 22:41
Static task
static1
Behavioral task
behavioral1
Sample
c693e35d16bb54da65546eae8a94380eb5cd3e3a0d749ade8ba96102817a5369.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c693e35d16bb54da65546eae8a94380eb5cd3e3a0d749ade8ba96102817a5369.exe
Resource
win10v2004-20220812-en
General
-
Target
c693e35d16bb54da65546eae8a94380eb5cd3e3a0d749ade8ba96102817a5369.exe
-
Size
204KB
-
MD5
5c8dbbf75c7bd4a5cfcb69c400cb495f
-
SHA1
7097d92dc0f597eec3357c96765b21d57de63de9
-
SHA256
c693e35d16bb54da65546eae8a94380eb5cd3e3a0d749ade8ba96102817a5369
-
SHA512
97cbca4ae63b836c0d829de438418f43fa24b84cef064a4fcf640b71db9bb2110768754639d75c489ffc3e7edf377f1b365e4258e2e6d039bc98ac8c316e4a72
-
SSDEEP
1536:GR+Oo7Ho1vzxHwx7xNy3tQ9CW5EZWHakMwP9W6uXNh9h1AWa11GBPIdRONd+w61m:LHo1C0tQ9nLHbB9WTk9+JgqmlHKn
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" c693e35d16bb54da65546eae8a94380eb5cd3e3a0d749ade8ba96102817a5369.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" youjen.exe -
Executes dropped EXE 1 IoCs
pid Process 844 youjen.exe -
Loads dropped DLL 2 IoCs
pid Process 1444 c693e35d16bb54da65546eae8a94380eb5cd3e3a0d749ade8ba96102817a5369.exe 1444 c693e35d16bb54da65546eae8a94380eb5cd3e3a0d749ade8ba96102817a5369.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ c693e35d16bb54da65546eae8a94380eb5cd3e3a0d749ade8ba96102817a5369.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\youjen = "C:\\Users\\Admin\\youjen.exe /c" youjen.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\youjen = "C:\\Users\\Admin\\youjen.exe /o" youjen.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\youjen = "C:\\Users\\Admin\\youjen.exe /a" youjen.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\youjen = "C:\\Users\\Admin\\youjen.exe /w" youjen.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\youjen = "C:\\Users\\Admin\\youjen.exe /t" youjen.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\youjen = "C:\\Users\\Admin\\youjen.exe /q" youjen.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\youjen = "C:\\Users\\Admin\\youjen.exe /d" youjen.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\youjen = "C:\\Users\\Admin\\youjen.exe /s" c693e35d16bb54da65546eae8a94380eb5cd3e3a0d749ade8ba96102817a5369.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\youjen = "C:\\Users\\Admin\\youjen.exe /s" youjen.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\youjen = "C:\\Users\\Admin\\youjen.exe /b" youjen.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\youjen = "C:\\Users\\Admin\\youjen.exe /x" youjen.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\youjen = "C:\\Users\\Admin\\youjen.exe /i" youjen.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\youjen = "C:\\Users\\Admin\\youjen.exe /r" youjen.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\youjen = "C:\\Users\\Admin\\youjen.exe /n" youjen.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\youjen = "C:\\Users\\Admin\\youjen.exe /v" youjen.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\youjen = "C:\\Users\\Admin\\youjen.exe /e" youjen.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\youjen = "C:\\Users\\Admin\\youjen.exe /m" youjen.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\youjen = "C:\\Users\\Admin\\youjen.exe /l" youjen.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\youjen = "C:\\Users\\Admin\\youjen.exe /z" youjen.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\youjen = "C:\\Users\\Admin\\youjen.exe /j" youjen.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\youjen = "C:\\Users\\Admin\\youjen.exe /u" youjen.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\youjen = "C:\\Users\\Admin\\youjen.exe /p" youjen.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ youjen.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\youjen = "C:\\Users\\Admin\\youjen.exe /y" youjen.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\youjen = "C:\\Users\\Admin\\youjen.exe /h" youjen.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\youjen = "C:\\Users\\Admin\\youjen.exe /f" youjen.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\youjen = "C:\\Users\\Admin\\youjen.exe /k" youjen.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\youjen = "C:\\Users\\Admin\\youjen.exe /g" youjen.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1444 c693e35d16bb54da65546eae8a94380eb5cd3e3a0d749ade8ba96102817a5369.exe 844 youjen.exe 844 youjen.exe 844 youjen.exe 844 youjen.exe 844 youjen.exe 844 youjen.exe 844 youjen.exe 844 youjen.exe 844 youjen.exe 844 youjen.exe 844 youjen.exe 844 youjen.exe 844 youjen.exe 844 youjen.exe 844 youjen.exe 844 youjen.exe 844 youjen.exe 844 youjen.exe 844 youjen.exe 844 youjen.exe 844 youjen.exe 844 youjen.exe 844 youjen.exe 844 youjen.exe 844 youjen.exe 844 youjen.exe 844 youjen.exe 844 youjen.exe 844 youjen.exe 844 youjen.exe 844 youjen.exe 844 youjen.exe 844 youjen.exe 844 youjen.exe 844 youjen.exe 844 youjen.exe 844 youjen.exe 844 youjen.exe 844 youjen.exe 844 youjen.exe 844 youjen.exe 844 youjen.exe 844 youjen.exe 844 youjen.exe 844 youjen.exe 844 youjen.exe 844 youjen.exe 844 youjen.exe 844 youjen.exe 844 youjen.exe 844 youjen.exe 844 youjen.exe 844 youjen.exe 844 youjen.exe 844 youjen.exe 844 youjen.exe 844 youjen.exe 844 youjen.exe 844 youjen.exe 844 youjen.exe 844 youjen.exe 844 youjen.exe 844 youjen.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1444 c693e35d16bb54da65546eae8a94380eb5cd3e3a0d749ade8ba96102817a5369.exe 844 youjen.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1444 wrote to memory of 844 1444 c693e35d16bb54da65546eae8a94380eb5cd3e3a0d749ade8ba96102817a5369.exe 27 PID 1444 wrote to memory of 844 1444 c693e35d16bb54da65546eae8a94380eb5cd3e3a0d749ade8ba96102817a5369.exe 27 PID 1444 wrote to memory of 844 1444 c693e35d16bb54da65546eae8a94380eb5cd3e3a0d749ade8ba96102817a5369.exe 27 PID 1444 wrote to memory of 844 1444 c693e35d16bb54da65546eae8a94380eb5cd3e3a0d749ade8ba96102817a5369.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\c693e35d16bb54da65546eae8a94380eb5cd3e3a0d749ade8ba96102817a5369.exe"C:\Users\Admin\AppData\Local\Temp\c693e35d16bb54da65546eae8a94380eb5cd3e3a0d749ade8ba96102817a5369.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Users\Admin\youjen.exe"C:\Users\Admin\youjen.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:844
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD5c817f1f1a4095527da3b7d4de3401772
SHA19118987a109306fd4c7c71852d581df8e190e528
SHA256329ae19cc362446ea8a98df3406e564aa47339df954445c9e85274e3a0ed26fc
SHA51220da46bc8f740364d6f0623333fd83eb05c1b2444a31e629a171e16e52498adb39fc7f983ece23b7d085f534d7a3614fb042a076910e16350d687d57bbe3730c
-
Filesize
204KB
MD5c817f1f1a4095527da3b7d4de3401772
SHA19118987a109306fd4c7c71852d581df8e190e528
SHA256329ae19cc362446ea8a98df3406e564aa47339df954445c9e85274e3a0ed26fc
SHA51220da46bc8f740364d6f0623333fd83eb05c1b2444a31e629a171e16e52498adb39fc7f983ece23b7d085f534d7a3614fb042a076910e16350d687d57bbe3730c
-
Filesize
204KB
MD5c817f1f1a4095527da3b7d4de3401772
SHA19118987a109306fd4c7c71852d581df8e190e528
SHA256329ae19cc362446ea8a98df3406e564aa47339df954445c9e85274e3a0ed26fc
SHA51220da46bc8f740364d6f0623333fd83eb05c1b2444a31e629a171e16e52498adb39fc7f983ece23b7d085f534d7a3614fb042a076910e16350d687d57bbe3730c
-
Filesize
204KB
MD5c817f1f1a4095527da3b7d4de3401772
SHA19118987a109306fd4c7c71852d581df8e190e528
SHA256329ae19cc362446ea8a98df3406e564aa47339df954445c9e85274e3a0ed26fc
SHA51220da46bc8f740364d6f0623333fd83eb05c1b2444a31e629a171e16e52498adb39fc7f983ece23b7d085f534d7a3614fb042a076910e16350d687d57bbe3730c