Analysis
-
max time kernel
53s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
07/12/2022, 01:00
Behavioral task
behavioral1
Sample
dbe85bc7eca62f53d553b6b5ae6a0387dbae71f02d1caf014a78f8b2580723ae.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
dbe85bc7eca62f53d553b6b5ae6a0387dbae71f02d1caf014a78f8b2580723ae.exe
Resource
win10v2004-20221111-en
General
-
Target
dbe85bc7eca62f53d553b6b5ae6a0387dbae71f02d1caf014a78f8b2580723ae.exe
-
Size
212KB
-
MD5
dde62651d20d9b8b386b69c9bbb6b1c1
-
SHA1
6a70a8ff79f53da5954eb6f6fd0f9823710e515b
-
SHA256
dbe85bc7eca62f53d553b6b5ae6a0387dbae71f02d1caf014a78f8b2580723ae
-
SHA512
c4bf277723690faf81d6e6cfecccafc62790e24f371a76f18bc14b6749814c3e488d314f005fc3b88b7e4870fe348f89b134887426956d242de00b1ff101ad58
-
SSDEEP
6144:4ICuxZG0zmll5inya4jE8lPP+YWNwjQ7M:XnG0zgl4nyailHrWN1
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1908 Ymuwoa.exe -
resource yara_rule behavioral1/memory/1372-54-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral1/memory/1372-61-0x0000000000580000-0x00000000005F1000-memory.dmp upx behavioral1/files/0x0008000000012300-63.dat upx behavioral1/memory/1908-64-0x0000000000400000-0x0000000000471000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run Ymuwoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\VXEG3ZNNE5 = "C:\\Windows\\Ymuwoa.exe" Ymuwoa.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job dbe85bc7eca62f53d553b6b5ae6a0387dbae71f02d1caf014a78f8b2580723ae.exe File opened for modification C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job dbe85bc7eca62f53d553b6b5ae6a0387dbae71f02d1caf014a78f8b2580723ae.exe File created C:\Windows\Ymuwoa.exe dbe85bc7eca62f53d553b6b5ae6a0387dbae71f02d1caf014a78f8b2580723ae.exe File opened for modification C:\Windows\Ymuwoa.exe dbe85bc7eca62f53d553b6b5ae6a0387dbae71f02d1caf014a78f8b2580723ae.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main dbe85bc7eca62f53d553b6b5ae6a0387dbae71f02d1caf014a78f8b2580723ae.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main Ymuwoa.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 1908 Ymuwoa.exe 1908 Ymuwoa.exe 1908 Ymuwoa.exe 1908 Ymuwoa.exe 1908 Ymuwoa.exe 1908 Ymuwoa.exe 1908 Ymuwoa.exe 1908 Ymuwoa.exe 1908 Ymuwoa.exe 1908 Ymuwoa.exe 1908 Ymuwoa.exe 1908 Ymuwoa.exe 1908 Ymuwoa.exe 1908 Ymuwoa.exe 1908 Ymuwoa.exe 1372 dbe85bc7eca62f53d553b6b5ae6a0387dbae71f02d1caf014a78f8b2580723ae.exe 1372 dbe85bc7eca62f53d553b6b5ae6a0387dbae71f02d1caf014a78f8b2580723ae.exe 1372 dbe85bc7eca62f53d553b6b5ae6a0387dbae71f02d1caf014a78f8b2580723ae.exe 1372 dbe85bc7eca62f53d553b6b5ae6a0387dbae71f02d1caf014a78f8b2580723ae.exe 1372 dbe85bc7eca62f53d553b6b5ae6a0387dbae71f02d1caf014a78f8b2580723ae.exe 1372 dbe85bc7eca62f53d553b6b5ae6a0387dbae71f02d1caf014a78f8b2580723ae.exe 1372 dbe85bc7eca62f53d553b6b5ae6a0387dbae71f02d1caf014a78f8b2580723ae.exe 1372 dbe85bc7eca62f53d553b6b5ae6a0387dbae71f02d1caf014a78f8b2580723ae.exe 1372 dbe85bc7eca62f53d553b6b5ae6a0387dbae71f02d1caf014a78f8b2580723ae.exe 1372 dbe85bc7eca62f53d553b6b5ae6a0387dbae71f02d1caf014a78f8b2580723ae.exe 1372 dbe85bc7eca62f53d553b6b5ae6a0387dbae71f02d1caf014a78f8b2580723ae.exe 1372 dbe85bc7eca62f53d553b6b5ae6a0387dbae71f02d1caf014a78f8b2580723ae.exe 1372 dbe85bc7eca62f53d553b6b5ae6a0387dbae71f02d1caf014a78f8b2580723ae.exe 1372 dbe85bc7eca62f53d553b6b5ae6a0387dbae71f02d1caf014a78f8b2580723ae.exe 1372 dbe85bc7eca62f53d553b6b5ae6a0387dbae71f02d1caf014a78f8b2580723ae.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1372 dbe85bc7eca62f53d553b6b5ae6a0387dbae71f02d1caf014a78f8b2580723ae.exe 1908 Ymuwoa.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1372 wrote to memory of 1908 1372 dbe85bc7eca62f53d553b6b5ae6a0387dbae71f02d1caf014a78f8b2580723ae.exe 28 PID 1372 wrote to memory of 1908 1372 dbe85bc7eca62f53d553b6b5ae6a0387dbae71f02d1caf014a78f8b2580723ae.exe 28 PID 1372 wrote to memory of 1908 1372 dbe85bc7eca62f53d553b6b5ae6a0387dbae71f02d1caf014a78f8b2580723ae.exe 28 PID 1372 wrote to memory of 1908 1372 dbe85bc7eca62f53d553b6b5ae6a0387dbae71f02d1caf014a78f8b2580723ae.exe 28 PID 1372 wrote to memory of 1908 1372 dbe85bc7eca62f53d553b6b5ae6a0387dbae71f02d1caf014a78f8b2580723ae.exe 28 PID 1372 wrote to memory of 1908 1372 dbe85bc7eca62f53d553b6b5ae6a0387dbae71f02d1caf014a78f8b2580723ae.exe 28 PID 1372 wrote to memory of 1908 1372 dbe85bc7eca62f53d553b6b5ae6a0387dbae71f02d1caf014a78f8b2580723ae.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\dbe85bc7eca62f53d553b6b5ae6a0387dbae71f02d1caf014a78f8b2580723ae.exe"C:\Users\Admin\AppData\Local\Temp\dbe85bc7eca62f53d553b6b5ae6a0387dbae71f02d1caf014a78f8b2580723ae.exe"1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Windows\Ymuwoa.exeC:\Windows\Ymuwoa.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:1908
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408B
MD513c562fa3087bb35dc6779180c91363b
SHA1e9dd0f0a9fb2ed73a95221976e3406cf9b64f7b1
SHA256405c7353696c89facea5b9ebe89f7dd5c55baebd741dab794e54a389542eef21
SHA512fc38fa1fb8a61df29a3de8e62231d2bcc79c5412f24d48f94ff4f737debbfa1f14a607dfeb7dab8a4bc9f3101c6d6e99575dc80112c3e0db1e4638c74aa5009b
-
Filesize
212KB
MD5dde62651d20d9b8b386b69c9bbb6b1c1
SHA16a70a8ff79f53da5954eb6f6fd0f9823710e515b
SHA256dbe85bc7eca62f53d553b6b5ae6a0387dbae71f02d1caf014a78f8b2580723ae
SHA512c4bf277723690faf81d6e6cfecccafc62790e24f371a76f18bc14b6749814c3e488d314f005fc3b88b7e4870fe348f89b134887426956d242de00b1ff101ad58