Analysis
-
max time kernel
82s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
30-05-2023 05:01
Behavioral task
behavioral1
Sample
0314199aa6ef6769e7735222a330a099a88b1b0a4b7520abe9ac31ad2d3870c3.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
0314199aa6ef6769e7735222a330a099a88b1b0a4b7520abe9ac31ad2d3870c3.exe
Resource
win10v2004-20230221-en
General
-
Target
0314199aa6ef6769e7735222a330a099a88b1b0a4b7520abe9ac31ad2d3870c3.exe
-
Size
3.6MB
-
MD5
7f0464f01fd9b18b33bcec5631ec7fe0
-
SHA1
84d00c56f6a47c2b8e3f9922032cf2b315b62550
-
SHA256
0314199aa6ef6769e7735222a330a099a88b1b0a4b7520abe9ac31ad2d3870c3
-
SHA512
709cc87d724cedad5391f3734935951630fc8210438f65e6f15d9b7874a59e4a3b2ee19a4c6ba771d039ee1853dcfa690c12a1a36e56c6793c4afa54a4799334
-
SSDEEP
98304:8tZvFx96wioWGPMkj3P+MgZweXIjTN42XesjLqt:8owivwMkbPPDfVbyt
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
YShow.exepid process 3212 YShow.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
YShow.exepid process 3212 YShow.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
0314199aa6ef6769e7735222a330a099a88b1b0a4b7520abe9ac31ad2d3870c3.exedescription pid process target process PID 1216 wrote to memory of 3212 1216 0314199aa6ef6769e7735222a330a099a88b1b0a4b7520abe9ac31ad2d3870c3.exe YShow.exe PID 1216 wrote to memory of 3212 1216 0314199aa6ef6769e7735222a330a099a88b1b0a4b7520abe9ac31ad2d3870c3.exe YShow.exe PID 1216 wrote to memory of 3212 1216 0314199aa6ef6769e7735222a330a099a88b1b0a4b7520abe9ac31ad2d3870c3.exe YShow.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0314199aa6ef6769e7735222a330a099a88b1b0a4b7520abe9ac31ad2d3870c3.exe"C:\Users\Admin\AppData\Local\Temp\0314199aa6ef6769e7735222a330a099a88b1b0a4b7520abe9ac31ad2d3870c3.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\YShow.exeC:\Users\Admin\AppData\Local\Temp\\YShow.exe /i ûÓлñµÃÊÚȨ(ÇëÁªÏµÊÖ»ú£º15989273313--¹ãÖÝÐǿؿƼ¼ÓÐÏÞ¹«Ë¾)£¡ /t ¹ãÖÝÐǿؿƼ¼ÓÐÏÞ¹«Ë¾ /k 162⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3212
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24KB
MD50daeb0bb210da44dcd4fc2bb9c612719
SHA1e33a519c28198eddeb24e346fd8aa2afb698a4e3
SHA25613ac5ca5d3011a38061eab91ed53b295081d6ea21bbdcec8612b7862b72df975
SHA5121d152f0a452bd945f93b536123b7ae7caa188f72dda424c2c42d2f432f4ec9f6972285821629dbff376e18f4025fc29a4f7c1f43a4771a386fb6939e65785672
-
Filesize
24KB
MD50daeb0bb210da44dcd4fc2bb9c612719
SHA1e33a519c28198eddeb24e346fd8aa2afb698a4e3
SHA25613ac5ca5d3011a38061eab91ed53b295081d6ea21bbdcec8612b7862b72df975
SHA5121d152f0a452bd945f93b536123b7ae7caa188f72dda424c2c42d2f432f4ec9f6972285821629dbff376e18f4025fc29a4f7c1f43a4771a386fb6939e65785672