Analysis
-
max time kernel
202s -
max time network
98s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 23:18
Static task
static1
Behavioral task
behavioral1
Sample
74dff4693deb76ab4af2bea9c02fc4986647e0fec0512d44a3738c01cb968aad.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
74dff4693deb76ab4af2bea9c02fc4986647e0fec0512d44a3738c01cb968aad.exe
Resource
win10v2004-20220901-en
General
-
Target
74dff4693deb76ab4af2bea9c02fc4986647e0fec0512d44a3738c01cb968aad.exe
-
Size
232KB
-
MD5
599d9a0a876c7623c01c872941aa3ec9
-
SHA1
f60870f86a8015e747c922b76c46234cbc4d737e
-
SHA256
74dff4693deb76ab4af2bea9c02fc4986647e0fec0512d44a3738c01cb968aad
-
SHA512
ac5ce7a156a0a48f68f3cdf04f420468765fe62cae5f0efc836bd1f8aa0e2dee3d6e0efa170a29a4140e3086494e723b8800c55de05995a122d389a1c2b845fb
-
SSDEEP
6144:9u3PFKs7STL6eEqxF6snji81RUinKn3Kt+dNFcSt:uPhPDFco
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 74dff4693deb76ab4af2bea9c02fc4986647e0fec0512d44a3738c01cb968aad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" yugul.exe -
Executes dropped EXE 1 IoCs
pid Process 932 yugul.exe -
Loads dropped DLL 2 IoCs
pid Process 956 74dff4693deb76ab4af2bea9c02fc4986647e0fec0512d44a3738c01cb968aad.exe 956 74dff4693deb76ab4af2bea9c02fc4986647e0fec0512d44a3738c01cb968aad.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\yugul = "C:\\Users\\Admin\\yugul.exe /c" 74dff4693deb76ab4af2bea9c02fc4986647e0fec0512d44a3738c01cb968aad.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\yugul = "C:\\Users\\Admin\\yugul.exe /j" yugul.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\yugul = "C:\\Users\\Admin\\yugul.exe /o" yugul.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\yugul = "C:\\Users\\Admin\\yugul.exe /x" yugul.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\yugul = "C:\\Users\\Admin\\yugul.exe /f" yugul.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\yugul = "C:\\Users\\Admin\\yugul.exe /p" yugul.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\yugul = "C:\\Users\\Admin\\yugul.exe /e" yugul.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\yugul = "C:\\Users\\Admin\\yugul.exe /b" yugul.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\yugul = "C:\\Users\\Admin\\yugul.exe /y" yugul.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\yugul = "C:\\Users\\Admin\\yugul.exe /s" yugul.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\yugul = "C:\\Users\\Admin\\yugul.exe /n" yugul.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 74dff4693deb76ab4af2bea9c02fc4986647e0fec0512d44a3738c01cb968aad.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\yugul = "C:\\Users\\Admin\\yugul.exe /g" yugul.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\yugul = "C:\\Users\\Admin\\yugul.exe /a" yugul.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\yugul = "C:\\Users\\Admin\\yugul.exe /z" yugul.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\yugul = "C:\\Users\\Admin\\yugul.exe /q" yugul.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\yugul = "C:\\Users\\Admin\\yugul.exe /d" yugul.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\yugul = "C:\\Users\\Admin\\yugul.exe /t" yugul.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\yugul = "C:\\Users\\Admin\\yugul.exe /v" yugul.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\yugul = "C:\\Users\\Admin\\yugul.exe /l" yugul.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\yugul = "C:\\Users\\Admin\\yugul.exe /i" yugul.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\yugul = "C:\\Users\\Admin\\yugul.exe /w" yugul.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\yugul = "C:\\Users\\Admin\\yugul.exe /c" yugul.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\yugul = "C:\\Users\\Admin\\yugul.exe /m" yugul.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ yugul.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\yugul = "C:\\Users\\Admin\\yugul.exe /u" yugul.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\yugul = "C:\\Users\\Admin\\yugul.exe /h" yugul.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\yugul = "C:\\Users\\Admin\\yugul.exe /r" yugul.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\yugul = "C:\\Users\\Admin\\yugul.exe /k" yugul.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 956 74dff4693deb76ab4af2bea9c02fc4986647e0fec0512d44a3738c01cb968aad.exe 932 yugul.exe 932 yugul.exe 932 yugul.exe 932 yugul.exe 932 yugul.exe 932 yugul.exe 932 yugul.exe 932 yugul.exe 932 yugul.exe 932 yugul.exe 932 yugul.exe 932 yugul.exe 932 yugul.exe 932 yugul.exe 932 yugul.exe 932 yugul.exe 932 yugul.exe 932 yugul.exe 932 yugul.exe 932 yugul.exe 932 yugul.exe 932 yugul.exe 932 yugul.exe 932 yugul.exe 932 yugul.exe 932 yugul.exe 932 yugul.exe 932 yugul.exe 932 yugul.exe 932 yugul.exe 932 yugul.exe 932 yugul.exe 932 yugul.exe 932 yugul.exe 932 yugul.exe 932 yugul.exe 932 yugul.exe 932 yugul.exe 932 yugul.exe 932 yugul.exe 932 yugul.exe 932 yugul.exe 932 yugul.exe 932 yugul.exe 932 yugul.exe 932 yugul.exe 932 yugul.exe 932 yugul.exe 932 yugul.exe 932 yugul.exe 932 yugul.exe 932 yugul.exe 932 yugul.exe 932 yugul.exe 932 yugul.exe 932 yugul.exe 932 yugul.exe 932 yugul.exe 932 yugul.exe 932 yugul.exe 932 yugul.exe 932 yugul.exe 932 yugul.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 956 74dff4693deb76ab4af2bea9c02fc4986647e0fec0512d44a3738c01cb968aad.exe 932 yugul.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 956 wrote to memory of 932 956 74dff4693deb76ab4af2bea9c02fc4986647e0fec0512d44a3738c01cb968aad.exe 28 PID 956 wrote to memory of 932 956 74dff4693deb76ab4af2bea9c02fc4986647e0fec0512d44a3738c01cb968aad.exe 28 PID 956 wrote to memory of 932 956 74dff4693deb76ab4af2bea9c02fc4986647e0fec0512d44a3738c01cb968aad.exe 28 PID 956 wrote to memory of 932 956 74dff4693deb76ab4af2bea9c02fc4986647e0fec0512d44a3738c01cb968aad.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\74dff4693deb76ab4af2bea9c02fc4986647e0fec0512d44a3738c01cb968aad.exe"C:\Users\Admin\AppData\Local\Temp\74dff4693deb76ab4af2bea9c02fc4986647e0fec0512d44a3738c01cb968aad.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Users\Admin\yugul.exe"C:\Users\Admin\yugul.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:932
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
232KB
MD5c8ff435aff3eaab4dae750e4c16aaeb1
SHA1e4d52e2fe06c55d1a4a6121557cd0d02dbc6e856
SHA256089f1e918a72732335a55c2e319f1085a12e366e93a10c6695dd261e88918478
SHA512a8bf0491e08c3a765f4c1b284ca3e6dbc4a8180d1dbcd303a26a7f96aed22561d8d1ef464debdf6cd18082ca6d11dc02ba5f443e32e0020dcfb7fde3ecb3750b
-
Filesize
232KB
MD5c8ff435aff3eaab4dae750e4c16aaeb1
SHA1e4d52e2fe06c55d1a4a6121557cd0d02dbc6e856
SHA256089f1e918a72732335a55c2e319f1085a12e366e93a10c6695dd261e88918478
SHA512a8bf0491e08c3a765f4c1b284ca3e6dbc4a8180d1dbcd303a26a7f96aed22561d8d1ef464debdf6cd18082ca6d11dc02ba5f443e32e0020dcfb7fde3ecb3750b
-
Filesize
232KB
MD5c8ff435aff3eaab4dae750e4c16aaeb1
SHA1e4d52e2fe06c55d1a4a6121557cd0d02dbc6e856
SHA256089f1e918a72732335a55c2e319f1085a12e366e93a10c6695dd261e88918478
SHA512a8bf0491e08c3a765f4c1b284ca3e6dbc4a8180d1dbcd303a26a7f96aed22561d8d1ef464debdf6cd18082ca6d11dc02ba5f443e32e0020dcfb7fde3ecb3750b
-
Filesize
232KB
MD5c8ff435aff3eaab4dae750e4c16aaeb1
SHA1e4d52e2fe06c55d1a4a6121557cd0d02dbc6e856
SHA256089f1e918a72732335a55c2e319f1085a12e366e93a10c6695dd261e88918478
SHA512a8bf0491e08c3a765f4c1b284ca3e6dbc4a8180d1dbcd303a26a7f96aed22561d8d1ef464debdf6cd18082ca6d11dc02ba5f443e32e0020dcfb7fde3ecb3750b