Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02/12/2022, 16:53
Static task
static1
Behavioral task
behavioral1
Sample
9647e8b920aa3fd490604c17fa0cf11b27f744458e068473a6e0f737d33157c5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9647e8b920aa3fd490604c17fa0cf11b27f744458e068473a6e0f737d33157c5.exe
Resource
win10v2004-20220812-en
General
-
Target
9647e8b920aa3fd490604c17fa0cf11b27f744458e068473a6e0f737d33157c5.exe
-
Size
128KB
-
MD5
b39c593c0d3f4db34ac65cda52235d63
-
SHA1
ad9bb9661c4a6fbad79852abc7b30d288399dacb
-
SHA256
9647e8b920aa3fd490604c17fa0cf11b27f744458e068473a6e0f737d33157c5
-
SHA512
13d6205369087ccbaab99d7815181ac134209db955fe10f812c83b00796bbdf29657a0b2f774e80f6d41f5ccf3292ae9322b14b404b34b9054a1d999748bb047
-
SSDEEP
3072:wSHQi0Fg3y4CpCfCGCCOCwC9CvCFCfCLCvCUCLC2FInROUSRSGSuSQSmSNS4SQSJ:1+S3yGFInRO
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ybzuit.exe -
Executes dropped EXE 1 IoCs
pid Process 860 ybzuit.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 9647e8b920aa3fd490604c17fa0cf11b27f744458e068473a6e0f737d33157c5.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ ybzuit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ybzuit = "C:\\Users\\Admin\\ybzuit.exe" ybzuit.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 860 ybzuit.exe 860 ybzuit.exe 860 ybzuit.exe 860 ybzuit.exe 860 ybzuit.exe 860 ybzuit.exe 860 ybzuit.exe 860 ybzuit.exe 860 ybzuit.exe 860 ybzuit.exe 860 ybzuit.exe 860 ybzuit.exe 860 ybzuit.exe 860 ybzuit.exe 860 ybzuit.exe 860 ybzuit.exe 860 ybzuit.exe 860 ybzuit.exe 860 ybzuit.exe 860 ybzuit.exe 860 ybzuit.exe 860 ybzuit.exe 860 ybzuit.exe 860 ybzuit.exe 860 ybzuit.exe 860 ybzuit.exe 860 ybzuit.exe 860 ybzuit.exe 860 ybzuit.exe 860 ybzuit.exe 860 ybzuit.exe 860 ybzuit.exe 860 ybzuit.exe 860 ybzuit.exe 860 ybzuit.exe 860 ybzuit.exe 860 ybzuit.exe 860 ybzuit.exe 860 ybzuit.exe 860 ybzuit.exe 860 ybzuit.exe 860 ybzuit.exe 860 ybzuit.exe 860 ybzuit.exe 860 ybzuit.exe 860 ybzuit.exe 860 ybzuit.exe 860 ybzuit.exe 860 ybzuit.exe 860 ybzuit.exe 860 ybzuit.exe 860 ybzuit.exe 860 ybzuit.exe 860 ybzuit.exe 860 ybzuit.exe 860 ybzuit.exe 860 ybzuit.exe 860 ybzuit.exe 860 ybzuit.exe 860 ybzuit.exe 860 ybzuit.exe 860 ybzuit.exe 860 ybzuit.exe 860 ybzuit.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4548 9647e8b920aa3fd490604c17fa0cf11b27f744458e068473a6e0f737d33157c5.exe 860 ybzuit.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4548 wrote to memory of 860 4548 9647e8b920aa3fd490604c17fa0cf11b27f744458e068473a6e0f737d33157c5.exe 81 PID 4548 wrote to memory of 860 4548 9647e8b920aa3fd490604c17fa0cf11b27f744458e068473a6e0f737d33157c5.exe 81 PID 4548 wrote to memory of 860 4548 9647e8b920aa3fd490604c17fa0cf11b27f744458e068473a6e0f737d33157c5.exe 81 PID 860 wrote to memory of 4548 860 ybzuit.exe 80 PID 860 wrote to memory of 4548 860 ybzuit.exe 80 PID 860 wrote to memory of 4548 860 ybzuit.exe 80 PID 860 wrote to memory of 4548 860 ybzuit.exe 80 PID 860 wrote to memory of 4548 860 ybzuit.exe 80 PID 860 wrote to memory of 4548 860 ybzuit.exe 80 PID 860 wrote to memory of 4548 860 ybzuit.exe 80 PID 860 wrote to memory of 4548 860 ybzuit.exe 80 PID 860 wrote to memory of 4548 860 ybzuit.exe 80 PID 860 wrote to memory of 4548 860 ybzuit.exe 80 PID 860 wrote to memory of 4548 860 ybzuit.exe 80 PID 860 wrote to memory of 4548 860 ybzuit.exe 80 PID 860 wrote to memory of 4548 860 ybzuit.exe 80 PID 860 wrote to memory of 4548 860 ybzuit.exe 80 PID 860 wrote to memory of 4548 860 ybzuit.exe 80 PID 860 wrote to memory of 4548 860 ybzuit.exe 80 PID 860 wrote to memory of 4548 860 ybzuit.exe 80 PID 860 wrote to memory of 4548 860 ybzuit.exe 80 PID 860 wrote to memory of 4548 860 ybzuit.exe 80 PID 860 wrote to memory of 4548 860 ybzuit.exe 80 PID 860 wrote to memory of 4548 860 ybzuit.exe 80 PID 860 wrote to memory of 4548 860 ybzuit.exe 80 PID 860 wrote to memory of 4548 860 ybzuit.exe 80 PID 860 wrote to memory of 4548 860 ybzuit.exe 80 PID 860 wrote to memory of 4548 860 ybzuit.exe 80 PID 860 wrote to memory of 4548 860 ybzuit.exe 80 PID 860 wrote to memory of 4548 860 ybzuit.exe 80 PID 860 wrote to memory of 4548 860 ybzuit.exe 80 PID 860 wrote to memory of 4548 860 ybzuit.exe 80 PID 860 wrote to memory of 4548 860 ybzuit.exe 80 PID 860 wrote to memory of 4548 860 ybzuit.exe 80 PID 860 wrote to memory of 4548 860 ybzuit.exe 80 PID 860 wrote to memory of 4548 860 ybzuit.exe 80 PID 860 wrote to memory of 4548 860 ybzuit.exe 80 PID 860 wrote to memory of 4548 860 ybzuit.exe 80 PID 860 wrote to memory of 4548 860 ybzuit.exe 80 PID 860 wrote to memory of 4548 860 ybzuit.exe 80 PID 860 wrote to memory of 4548 860 ybzuit.exe 80 PID 860 wrote to memory of 4548 860 ybzuit.exe 80 PID 860 wrote to memory of 4548 860 ybzuit.exe 80 PID 860 wrote to memory of 4548 860 ybzuit.exe 80 PID 860 wrote to memory of 4548 860 ybzuit.exe 80 PID 860 wrote to memory of 4548 860 ybzuit.exe 80 PID 860 wrote to memory of 4548 860 ybzuit.exe 80 PID 860 wrote to memory of 4548 860 ybzuit.exe 80 PID 860 wrote to memory of 4548 860 ybzuit.exe 80 PID 860 wrote to memory of 4548 860 ybzuit.exe 80 PID 860 wrote to memory of 4548 860 ybzuit.exe 80 PID 860 wrote to memory of 4548 860 ybzuit.exe 80 PID 860 wrote to memory of 4548 860 ybzuit.exe 80 PID 860 wrote to memory of 4548 860 ybzuit.exe 80 PID 860 wrote to memory of 4548 860 ybzuit.exe 80 PID 860 wrote to memory of 4548 860 ybzuit.exe 80 PID 860 wrote to memory of 4548 860 ybzuit.exe 80 PID 860 wrote to memory of 4548 860 ybzuit.exe 80 PID 860 wrote to memory of 4548 860 ybzuit.exe 80 PID 860 wrote to memory of 4548 860 ybzuit.exe 80 PID 860 wrote to memory of 4548 860 ybzuit.exe 80 PID 860 wrote to memory of 4548 860 ybzuit.exe 80 PID 860 wrote to memory of 4548 860 ybzuit.exe 80 PID 860 wrote to memory of 4548 860 ybzuit.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\9647e8b920aa3fd490604c17fa0cf11b27f744458e068473a6e0f737d33157c5.exe"C:\Users\Admin\AppData\Local\Temp\9647e8b920aa3fd490604c17fa0cf11b27f744458e068473a6e0f737d33157c5.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Users\Admin\ybzuit.exe"C:\Users\Admin\ybzuit.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:860
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128KB
MD5b1b3a7f115d2907707104b8fc81d2bc7
SHA1f1810b3124d8e537fc0d88185bf117107c4b20b6
SHA256b02b6e1226e42f35f1f39e369e01183aac0c54d3e447d0ff17ea7d75ce3161af
SHA512cbb83e7089f12d7f01607a7259e04522f979322ed545a4fa53612a0469f855c535ba4566e6bb721f8eb79959796162ac145279c9ece7d3f72e6b74dfa9e8184c
-
Filesize
128KB
MD5b1b3a7f115d2907707104b8fc81d2bc7
SHA1f1810b3124d8e537fc0d88185bf117107c4b20b6
SHA256b02b6e1226e42f35f1f39e369e01183aac0c54d3e447d0ff17ea7d75ce3161af
SHA512cbb83e7089f12d7f01607a7259e04522f979322ed545a4fa53612a0469f855c535ba4566e6bb721f8eb79959796162ac145279c9ece7d3f72e6b74dfa9e8184c