Analysis
-
max time kernel
151s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01-12-2022 21:08
Static task
static1
Behavioral task
behavioral1
Sample
91f2e9247915439dcab58bf89575d66c4935ee080cd1fee0ebd45540718c5449.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
91f2e9247915439dcab58bf89575d66c4935ee080cd1fee0ebd45540718c5449.exe
Resource
win10v2004-20221111-en
General
-
Target
91f2e9247915439dcab58bf89575d66c4935ee080cd1fee0ebd45540718c5449.exe
-
Size
445KB
-
MD5
36c835ff6451b2b5621a7a98b6398bf5
-
SHA1
54c0619ad1b0f5ed0d10739d48a323a79582ac07
-
SHA256
91f2e9247915439dcab58bf89575d66c4935ee080cd1fee0ebd45540718c5449
-
SHA512
c95adf9ae8e8da3656a5e64281b2f9bd1f180c96fb308a7b8252fa3b7af558b1051d163e3c1fbbd5c973d5eeaef25072e98339318d4b91a7a7c7942b52bc0af3
-
SSDEEP
6144:dyJwXzalfrjZDiOpNyTKCYCNx6RX1r8nXxXIejPV4LFiP3bCWo:dyJwXelPVzpNyKCYCHUsXxjK8Vo
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1716 ymkir.exe -
Deletes itself 1 IoCs
pid Process 580 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 1652 91f2e9247915439dcab58bf89575d66c4935ee080cd1fee0ebd45540718c5449.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\Currentversion\Run ymkir.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\{7BD94DA8-4FEF-AD4D-5225-887A4931AB67} = "C:\\Users\\Admin\\AppData\\Roaming\\Foyq\\ymkir.exe" ymkir.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1652 set thread context of 580 1652 91f2e9247915439dcab58bf89575d66c4935ee080cd1fee0ebd45540718c5449.exe 29 -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 1716 ymkir.exe 1716 ymkir.exe 1716 ymkir.exe 1716 ymkir.exe 1716 ymkir.exe 1716 ymkir.exe 1716 ymkir.exe 1716 ymkir.exe 1716 ymkir.exe 1716 ymkir.exe 1716 ymkir.exe 1716 ymkir.exe 1716 ymkir.exe 1716 ymkir.exe 1716 ymkir.exe 1716 ymkir.exe 1716 ymkir.exe 1716 ymkir.exe 1716 ymkir.exe 1716 ymkir.exe 1716 ymkir.exe 1716 ymkir.exe 1716 ymkir.exe 1716 ymkir.exe 1716 ymkir.exe 1716 ymkir.exe 1716 ymkir.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1652 91f2e9247915439dcab58bf89575d66c4935ee080cd1fee0ebd45540718c5449.exe 1716 ymkir.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1652 wrote to memory of 1716 1652 91f2e9247915439dcab58bf89575d66c4935ee080cd1fee0ebd45540718c5449.exe 28 PID 1652 wrote to memory of 1716 1652 91f2e9247915439dcab58bf89575d66c4935ee080cd1fee0ebd45540718c5449.exe 28 PID 1652 wrote to memory of 1716 1652 91f2e9247915439dcab58bf89575d66c4935ee080cd1fee0ebd45540718c5449.exe 28 PID 1652 wrote to memory of 1716 1652 91f2e9247915439dcab58bf89575d66c4935ee080cd1fee0ebd45540718c5449.exe 28 PID 1716 wrote to memory of 1132 1716 ymkir.exe 19 PID 1716 wrote to memory of 1132 1716 ymkir.exe 19 PID 1716 wrote to memory of 1132 1716 ymkir.exe 19 PID 1716 wrote to memory of 1132 1716 ymkir.exe 19 PID 1716 wrote to memory of 1132 1716 ymkir.exe 19 PID 1716 wrote to memory of 1196 1716 ymkir.exe 18 PID 1716 wrote to memory of 1196 1716 ymkir.exe 18 PID 1716 wrote to memory of 1196 1716 ymkir.exe 18 PID 1716 wrote to memory of 1196 1716 ymkir.exe 18 PID 1716 wrote to memory of 1196 1716 ymkir.exe 18 PID 1716 wrote to memory of 1256 1716 ymkir.exe 17 PID 1716 wrote to memory of 1256 1716 ymkir.exe 17 PID 1716 wrote to memory of 1256 1716 ymkir.exe 17 PID 1716 wrote to memory of 1256 1716 ymkir.exe 17 PID 1716 wrote to memory of 1256 1716 ymkir.exe 17 PID 1716 wrote to memory of 1652 1716 ymkir.exe 27 PID 1716 wrote to memory of 1652 1716 ymkir.exe 27 PID 1716 wrote to memory of 1652 1716 ymkir.exe 27 PID 1716 wrote to memory of 1652 1716 ymkir.exe 27 PID 1716 wrote to memory of 1652 1716 ymkir.exe 27 PID 1652 wrote to memory of 580 1652 91f2e9247915439dcab58bf89575d66c4935ee080cd1fee0ebd45540718c5449.exe 29 PID 1652 wrote to memory of 580 1652 91f2e9247915439dcab58bf89575d66c4935ee080cd1fee0ebd45540718c5449.exe 29 PID 1652 wrote to memory of 580 1652 91f2e9247915439dcab58bf89575d66c4935ee080cd1fee0ebd45540718c5449.exe 29 PID 1652 wrote to memory of 580 1652 91f2e9247915439dcab58bf89575d66c4935ee080cd1fee0ebd45540718c5449.exe 29 PID 1652 wrote to memory of 580 1652 91f2e9247915439dcab58bf89575d66c4935ee080cd1fee0ebd45540718c5449.exe 29 PID 1652 wrote to memory of 580 1652 91f2e9247915439dcab58bf89575d66c4935ee080cd1fee0ebd45540718c5449.exe 29 PID 1652 wrote to memory of 580 1652 91f2e9247915439dcab58bf89575d66c4935ee080cd1fee0ebd45540718c5449.exe 29 PID 1652 wrote to memory of 580 1652 91f2e9247915439dcab58bf89575d66c4935ee080cd1fee0ebd45540718c5449.exe 29 PID 1652 wrote to memory of 580 1652 91f2e9247915439dcab58bf89575d66c4935ee080cd1fee0ebd45540718c5449.exe 29
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1256
-
C:\Users\Admin\AppData\Local\Temp\91f2e9247915439dcab58bf89575d66c4935ee080cd1fee0ebd45540718c5449.exe"C:\Users\Admin\AppData\Local\Temp\91f2e9247915439dcab58bf89575d66c4935ee080cd1fee0ebd45540718c5449.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Users\Admin\AppData\Roaming\Foyq\ymkir.exe"C:\Users\Admin\AppData\Roaming\Foyq\ymkir.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1716
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp919f1ad3.bat"3⤵
- Deletes itself
PID:580
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1196
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1132
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD54bf9ecf89c6bf1a23b6dae4b08e742ef
SHA13b38cbe55e6807faf73616547f2a8f4d473405d9
SHA2562c5fe8e68c303f04db29286d4298b6a41ba8bb81edb981322563c0c728c0cade
SHA512e9c4f5b043dc2ed6e5e7323be98ac6efeeb444f058abe2563f61ef5c478d296dd257cc7cfaef8468d4f12775743eab4f87bc0402b15de6ce554e81f6f0c01f4d
-
Filesize
445KB
MD51b871e1435b054c2e77ed42148a5943c
SHA113170d562f7ef96915915dc9b4a2ab5d9cca18b2
SHA256b577ef25d87c9b725b822731f58d96c8af483506e96b2db9e03e69ee0c8f935b
SHA512bbf24397d99884a059746d64cd5e01656c4ac8f032c795403998e2e23e94fac94fad735eb19bdb5dde31dccd68bd44cb8d196b9f8593e93c01fcc146c2a55549
-
Filesize
445KB
MD51b871e1435b054c2e77ed42148a5943c
SHA113170d562f7ef96915915dc9b4a2ab5d9cca18b2
SHA256b577ef25d87c9b725b822731f58d96c8af483506e96b2db9e03e69ee0c8f935b
SHA512bbf24397d99884a059746d64cd5e01656c4ac8f032c795403998e2e23e94fac94fad735eb19bdb5dde31dccd68bd44cb8d196b9f8593e93c01fcc146c2a55549
-
Filesize
445KB
MD51b871e1435b054c2e77ed42148a5943c
SHA113170d562f7ef96915915dc9b4a2ab5d9cca18b2
SHA256b577ef25d87c9b725b822731f58d96c8af483506e96b2db9e03e69ee0c8f935b
SHA512bbf24397d99884a059746d64cd5e01656c4ac8f032c795403998e2e23e94fac94fad735eb19bdb5dde31dccd68bd44cb8d196b9f8593e93c01fcc146c2a55549