Analysis
-
max time kernel
151s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 22:42
Static task
static1
Behavioral task
behavioral1
Sample
c4b1b6f678175ba37e0e6c46cafe85a9283ce1c2984313dc0a1dd50eb1accdb9.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c4b1b6f678175ba37e0e6c46cafe85a9283ce1c2984313dc0a1dd50eb1accdb9.exe
Resource
win10v2004-20220901-en
General
-
Target
c4b1b6f678175ba37e0e6c46cafe85a9283ce1c2984313dc0a1dd50eb1accdb9.exe
-
Size
240KB
-
MD5
7a9f12243c7876f39a152ad4d648d8ec
-
SHA1
2f5c7a1a3a2d9ac72da1a6da314275112a2aa23f
-
SHA256
c4b1b6f678175ba37e0e6c46cafe85a9283ce1c2984313dc0a1dd50eb1accdb9
-
SHA512
75eff4c4862231b1eb10c1d0b4d3bfb8e34e16469676e2010184f2bf0155ce7e034f62597de7d2c0d6ae04484ae19fccc5cc7d706085b463126930fbcc5a6325
-
SSDEEP
6144:9a3dwqsNTNEXGlQR58EqxF6snji81RUinKq3aEESliDSi:9odQKjeaEEpz
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" c4b1b6f678175ba37e0e6c46cafe85a9283ce1c2984313dc0a1dd50eb1accdb9.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" yuesuur.exe -
Executes dropped EXE 1 IoCs
pid Process 1844 yuesuur.exe -
Loads dropped DLL 2 IoCs
pid Process 1976 c4b1b6f678175ba37e0e6c46cafe85a9283ce1c2984313dc0a1dd50eb1accdb9.exe 1976 c4b1b6f678175ba37e0e6c46cafe85a9283ce1c2984313dc0a1dd50eb1accdb9.exe -
Adds Run key to start application 2 TTPs 28 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuesuur = "C:\\Users\\Admin\\yuesuur.exe /q" c4b1b6f678175ba37e0e6c46cafe85a9283ce1c2984313dc0a1dd50eb1accdb9.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuesuur = "C:\\Users\\Admin\\yuesuur.exe /p" yuesuur.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuesuur = "C:\\Users\\Admin\\yuesuur.exe /v" yuesuur.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\ yuesuur.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuesuur = "C:\\Users\\Admin\\yuesuur.exe /q" yuesuur.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuesuur = "C:\\Users\\Admin\\yuesuur.exe /c" yuesuur.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuesuur = "C:\\Users\\Admin\\yuesuur.exe /a" yuesuur.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuesuur = "C:\\Users\\Admin\\yuesuur.exe /u" yuesuur.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuesuur = "C:\\Users\\Admin\\yuesuur.exe /i" yuesuur.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuesuur = "C:\\Users\\Admin\\yuesuur.exe /l" yuesuur.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuesuur = "C:\\Users\\Admin\\yuesuur.exe /d" yuesuur.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuesuur = "C:\\Users\\Admin\\yuesuur.exe /y" yuesuur.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuesuur = "C:\\Users\\Admin\\yuesuur.exe /f" yuesuur.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuesuur = "C:\\Users\\Admin\\yuesuur.exe /r" yuesuur.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuesuur = "C:\\Users\\Admin\\yuesuur.exe /k" yuesuur.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\ c4b1b6f678175ba37e0e6c46cafe85a9283ce1c2984313dc0a1dd50eb1accdb9.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuesuur = "C:\\Users\\Admin\\yuesuur.exe /t" yuesuur.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuesuur = "C:\\Users\\Admin\\yuesuur.exe /n" yuesuur.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuesuur = "C:\\Users\\Admin\\yuesuur.exe /h" yuesuur.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuesuur = "C:\\Users\\Admin\\yuesuur.exe /z" yuesuur.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuesuur = "C:\\Users\\Admin\\yuesuur.exe /w" yuesuur.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuesuur = "C:\\Users\\Admin\\yuesuur.exe /j" yuesuur.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuesuur = "C:\\Users\\Admin\\yuesuur.exe /b" yuesuur.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuesuur = "C:\\Users\\Admin\\yuesuur.exe /m" yuesuur.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuesuur = "C:\\Users\\Admin\\yuesuur.exe /s" yuesuur.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuesuur = "C:\\Users\\Admin\\yuesuur.exe /e" yuesuur.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuesuur = "C:\\Users\\Admin\\yuesuur.exe /x" yuesuur.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuesuur = "C:\\Users\\Admin\\yuesuur.exe /o" yuesuur.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1976 c4b1b6f678175ba37e0e6c46cafe85a9283ce1c2984313dc0a1dd50eb1accdb9.exe 1844 yuesuur.exe 1844 yuesuur.exe 1844 yuesuur.exe 1844 yuesuur.exe 1844 yuesuur.exe 1844 yuesuur.exe 1844 yuesuur.exe 1844 yuesuur.exe 1844 yuesuur.exe 1844 yuesuur.exe 1844 yuesuur.exe 1844 yuesuur.exe 1844 yuesuur.exe 1844 yuesuur.exe 1844 yuesuur.exe 1844 yuesuur.exe 1844 yuesuur.exe 1844 yuesuur.exe 1844 yuesuur.exe 1844 yuesuur.exe 1844 yuesuur.exe 1844 yuesuur.exe 1844 yuesuur.exe 1844 yuesuur.exe 1844 yuesuur.exe 1844 yuesuur.exe 1844 yuesuur.exe 1844 yuesuur.exe 1844 yuesuur.exe 1844 yuesuur.exe 1844 yuesuur.exe 1844 yuesuur.exe 1844 yuesuur.exe 1844 yuesuur.exe 1844 yuesuur.exe 1844 yuesuur.exe 1844 yuesuur.exe 1844 yuesuur.exe 1844 yuesuur.exe 1844 yuesuur.exe 1844 yuesuur.exe 1844 yuesuur.exe 1844 yuesuur.exe 1844 yuesuur.exe 1844 yuesuur.exe 1844 yuesuur.exe 1844 yuesuur.exe 1844 yuesuur.exe 1844 yuesuur.exe 1844 yuesuur.exe 1844 yuesuur.exe 1844 yuesuur.exe 1844 yuesuur.exe 1844 yuesuur.exe 1844 yuesuur.exe 1844 yuesuur.exe 1844 yuesuur.exe 1844 yuesuur.exe 1844 yuesuur.exe 1844 yuesuur.exe 1844 yuesuur.exe 1844 yuesuur.exe 1844 yuesuur.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1976 c4b1b6f678175ba37e0e6c46cafe85a9283ce1c2984313dc0a1dd50eb1accdb9.exe 1844 yuesuur.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1976 wrote to memory of 1844 1976 c4b1b6f678175ba37e0e6c46cafe85a9283ce1c2984313dc0a1dd50eb1accdb9.exe 28 PID 1976 wrote to memory of 1844 1976 c4b1b6f678175ba37e0e6c46cafe85a9283ce1c2984313dc0a1dd50eb1accdb9.exe 28 PID 1976 wrote to memory of 1844 1976 c4b1b6f678175ba37e0e6c46cafe85a9283ce1c2984313dc0a1dd50eb1accdb9.exe 28 PID 1976 wrote to memory of 1844 1976 c4b1b6f678175ba37e0e6c46cafe85a9283ce1c2984313dc0a1dd50eb1accdb9.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c4b1b6f678175ba37e0e6c46cafe85a9283ce1c2984313dc0a1dd50eb1accdb9.exe"C:\Users\Admin\AppData\Local\Temp\c4b1b6f678175ba37e0e6c46cafe85a9283ce1c2984313dc0a1dd50eb1accdb9.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\yuesuur.exe"C:\Users\Admin\yuesuur.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1844
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD565ed7507a99abb66626d0b652b72bf8f
SHA121707cd75ffb0894ff295b4067f4855ed96a8c12
SHA2566cc3d520fa3eaf4f461f8a5e54a13db16988198504a4321f1a465b2919b48b88
SHA512c0c6128eea14c7fdd1a222fe8b6fbc32aae4f8b45fbe05eeda7243287add372e0a1147952b65c4e4e3bd29f6ce9e71a8e7f73166d292587ec72a197115f6241d
-
Filesize
240KB
MD565ed7507a99abb66626d0b652b72bf8f
SHA121707cd75ffb0894ff295b4067f4855ed96a8c12
SHA2566cc3d520fa3eaf4f461f8a5e54a13db16988198504a4321f1a465b2919b48b88
SHA512c0c6128eea14c7fdd1a222fe8b6fbc32aae4f8b45fbe05eeda7243287add372e0a1147952b65c4e4e3bd29f6ce9e71a8e7f73166d292587ec72a197115f6241d
-
Filesize
240KB
MD565ed7507a99abb66626d0b652b72bf8f
SHA121707cd75ffb0894ff295b4067f4855ed96a8c12
SHA2566cc3d520fa3eaf4f461f8a5e54a13db16988198504a4321f1a465b2919b48b88
SHA512c0c6128eea14c7fdd1a222fe8b6fbc32aae4f8b45fbe05eeda7243287add372e0a1147952b65c4e4e3bd29f6ce9e71a8e7f73166d292587ec72a197115f6241d
-
Filesize
240KB
MD565ed7507a99abb66626d0b652b72bf8f
SHA121707cd75ffb0894ff295b4067f4855ed96a8c12
SHA2566cc3d520fa3eaf4f461f8a5e54a13db16988198504a4321f1a465b2919b48b88
SHA512c0c6128eea14c7fdd1a222fe8b6fbc32aae4f8b45fbe05eeda7243287add372e0a1147952b65c4e4e3bd29f6ce9e71a8e7f73166d292587ec72a197115f6241d