Analysis Overview
SHA256
8b0a5fb13309623c3518473551cb1f55d38d8450129d4a3c16b476f7b2867d7d
Threat Level: Shows suspicious behavior
The file yOMHr.exe was found to be: Shows suspicious behavior.
Malicious Activity Summary
Checks computer location settings
Adds Run key to start application
Unsigned PE
Enumerates physical storage devices
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
MITRE ATT&CK Matrix V13
Analysis: static1
Detonation Overview
Reported
2023-07-31 12:37
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2023-07-31 12:37
Reported
2023-07-31 12:37
Platform
win10v2004-20230703-en
Max time kernel
7s
Max time network
14s
Command Line
Signatures
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\yOMHr.exe | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run | C:\Windows\system32\reg.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchos = "C:\\Users\\Admin\\AppData\\Local\\Temp\\yOMHr.exe" | C:\Windows\system32\reg.exe | N/A |
Enumerates physical storage devices
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\yOMHr.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\yOMHr.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\yOMHr.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 4172 wrote to memory of 2612 | N/A | C:\Users\Admin\AppData\Local\Temp\yOMHr.exe | C:\Windows\System32\cmd.exe |
| PID 4172 wrote to memory of 2612 | N/A | C:\Users\Admin\AppData\Local\Temp\yOMHr.exe | C:\Windows\System32\cmd.exe |
| PID 4172 wrote to memory of 2704 | N/A | C:\Users\Admin\AppData\Local\Temp\yOMHr.exe | C:\Windows\system32\sihost.exe |
| PID 2612 wrote to memory of 1504 | N/A | C:\Windows\System32\cmd.exe | C:\Windows\system32\reg.exe |
| PID 2612 wrote to memory of 1504 | N/A | C:\Windows\System32\cmd.exe | C:\Windows\system32\reg.exe |
| PID 4172 wrote to memory of 2764 | N/A | C:\Users\Admin\AppData\Local\Temp\yOMHr.exe | C:\Windows\system32\svchost.exe |
| PID 4172 wrote to memory of 2864 | N/A | C:\Users\Admin\AppData\Local\Temp\yOMHr.exe | C:\Windows\system32\taskhostw.exe |
| PID 4172 wrote to memory of 3260 | N/A | C:\Users\Admin\AppData\Local\Temp\yOMHr.exe | C:\Windows\system32\svchost.exe |
Processes
C:\Windows\system32\svchost.exe
C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
C:\Windows\system32\taskhostw.exe
taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
C:\Windows\system32\svchost.exe
C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
C:\Windows\system32\sihost.exe
sihost.exe
C:\Users\Admin\AppData\Local\Temp\yOMHr.exe
"C:\Users\Admin\AppData\Local\Temp\yOMHr.exe"
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\yOMHr.exe" /f
C:\Windows\system32\reg.exe
REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\yOMHr.exe" /f
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 146.78.124.51.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 74.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 55.36.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 59.128.231.4.in-addr.arpa | udp |
Files
memory/2704-133-0x00007FF6A83F0000-0x00007FF6A877E000-memory.dmp
memory/2704-134-0x00007FF6A83F0000-0x00007FF6A877E000-memory.dmp