Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2023, 22:19
Static task
static1
Behavioral task
behavioral1
Sample
df1afc01e6a11a84b3b2ef68699b2d595706b2be99a2d74ce74183d557bca850.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
df1afc01e6a11a84b3b2ef68699b2d595706b2be99a2d74ce74183d557bca850.exe
Resource
win10v2004-20230915-en
General
-
Target
df1afc01e6a11a84b3b2ef68699b2d595706b2be99a2d74ce74183d557bca850.exe
-
Size
198KB
-
MD5
4ca8b84594831aafaddc5857acdc2aaf
-
SHA1
a84382add2921689e47af4b3cd322047e6718d92
-
SHA256
df1afc01e6a11a84b3b2ef68699b2d595706b2be99a2d74ce74183d557bca850
-
SHA512
fc97d8ac81ca8121304f5251003582065b5b5edc6fa6e9d732434c2185ddeb457a8295a0dc676047f84a3449deaddfbc9903cc363cba17a51d6092628cda55d5
-
SSDEEP
6144:rBs27MMLyX5HXXXDTXXXOGqIII+pXXX5AYjKXXXDoXXXG6XXXxXXXLIIIEAkOCO3:rK20HXXX/XXXFqIIIcXXX5j2XXXcXXXO
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation df1afc01e6a11a84b3b2ef68699b2d595706b2be99a2d74ce74183d557bca850.exe -
Executes dropped EXE 1 IoCs
pid Process 1716 yyghost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Debug\yyghost.exe df1afc01e6a11a84b3b2ef68699b2d595706b2be99a2d74ce74183d557bca850.exe File opened for modification C:\Windows\Debug\yyghost.exe df1afc01e6a11a84b3b2ef68699b2d595706b2be99a2d74ce74183d557bca850.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 yyghost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz yyghost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3548 df1afc01e6a11a84b3b2ef68699b2d595706b2be99a2d74ce74183d557bca850.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3548 wrote to memory of 3664 3548 df1afc01e6a11a84b3b2ef68699b2d595706b2be99a2d74ce74183d557bca850.exe 87 PID 3548 wrote to memory of 3664 3548 df1afc01e6a11a84b3b2ef68699b2d595706b2be99a2d74ce74183d557bca850.exe 87 PID 3548 wrote to memory of 3664 3548 df1afc01e6a11a84b3b2ef68699b2d595706b2be99a2d74ce74183d557bca850.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\df1afc01e6a11a84b3b2ef68699b2d595706b2be99a2d74ce74183d557bca850.exe"C:\Users\Admin\AppData\Local\Temp\df1afc01e6a11a84b3b2ef68699b2d595706b2be99a2d74ce74183d557bca850.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\DF1AFC~1.EXE > nul2⤵PID:3664
-
-
C:\Windows\Debug\yyghost.exeC:\Windows\Debug\yyghost.exe1⤵
- Executes dropped EXE
- Checks processor information in registry
PID:1716
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
198KB
MD5ee2b13ae7b24bed7f47a11067932a4f7
SHA190ad437c7c87e68dc709774a5d318846b564188c
SHA256a62a0f91e4dc318f4e280f82c246beb6799b20828b4ffcd716039286237e114c
SHA5123af58f2a9d11d2f8479a7cde42aa826547e8c0a473cc745b5207846dcd5bd3d9fa9f0fb1a823efabdc529e60596111b4fb64e0d3e0310c701fbc94ebf4542d0e
-
Filesize
198KB
MD5ee2b13ae7b24bed7f47a11067932a4f7
SHA190ad437c7c87e68dc709774a5d318846b564188c
SHA256a62a0f91e4dc318f4e280f82c246beb6799b20828b4ffcd716039286237e114c
SHA5123af58f2a9d11d2f8479a7cde42aa826547e8c0a473cc745b5207846dcd5bd3d9fa9f0fb1a823efabdc529e60596111b4fb64e0d3e0310c701fbc94ebf4542d0e