Analysis
-
max time kernel
151s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2023 13:47
Static task
static1
Behavioral task
behavioral1
Sample
2744ee22053b9e8b2189f58be6f1b7f2dfd1e7515d831168d733c149788153f2.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
2744ee22053b9e8b2189f58be6f1b7f2dfd1e7515d831168d733c149788153f2.exe
Resource
win10v2004-20231025-en
General
-
Target
2744ee22053b9e8b2189f58be6f1b7f2dfd1e7515d831168d733c149788153f2.exe
-
Size
5.4MB
-
MD5
c1aea0eb312aa84403059dad41768624
-
SHA1
5e5629028375e0ce6cfa803dfbfe77ab6534395d
-
SHA256
2744ee22053b9e8b2189f58be6f1b7f2dfd1e7515d831168d733c149788153f2
-
SHA512
494ed13b832133c717651acf1a5533cb8ba76ff893f7eadd0f492572037d1be41510f532e8a2efa18dcefe0bc7bbdc4655756d99b6c68f384bfda3ee75c38d3e
-
SSDEEP
98304:HdPFf4k/ErSZKmxN3l9slFgx4HBDeSPn/IkJJMinZ1iAFYG8uL:Hdtf4wQgN1bx4HBDeSokJ2inZ17FzL
Malware Config
Signatures
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation 2744ee22053b9e8b2189f58be6f1b7f2dfd1e7515d831168d733c149788153f2.exe -
Executes dropped EXE 2 IoCs
pid Process 4012 Yloux.exe 2572 {CD780E8C-3CE6-4b7e-8D88-1E799156DCA9}.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\R: Yloux.exe File opened (read-only) \??\S: Yloux.exe File opened (read-only) \??\B: Yloux.exe File opened (read-only) \??\J: Yloux.exe File opened (read-only) \??\M: Yloux.exe File opened (read-only) \??\O: Yloux.exe File opened (read-only) \??\T: Yloux.exe File opened (read-only) \??\X: Yloux.exe File opened (read-only) \??\Y: Yloux.exe File opened (read-only) \??\H: Yloux.exe File opened (read-only) \??\I: Yloux.exe File opened (read-only) \??\N: Yloux.exe File opened (read-only) \??\Q: Yloux.exe File opened (read-only) \??\U: Yloux.exe File opened (read-only) \??\W: Yloux.exe File opened (read-only) \??\G: Yloux.exe File opened (read-only) \??\K: Yloux.exe File opened (read-only) \??\L: Yloux.exe File opened (read-only) \??\Z: Yloux.exe File opened (read-only) \??\E: Yloux.exe File opened (read-only) \??\P: Yloux.exe File opened (read-only) \??\V: Yloux.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\windows\Runn\DuiLib_u.dll 2744ee22053b9e8b2189f58be6f1b7f2dfd1e7515d831168d733c149788153f2.exe File created C:\windows\Runn\sqlite3.dll 2744ee22053b9e8b2189f58be6f1b7f2dfd1e7515d831168d733c149788153f2.exe File created C:\windows\Runn\Yloux.exe 2744ee22053b9e8b2189f58be6f1b7f2dfd1e7515d831168d733c149788153f2.exe File created C:\windows\Runn\1.bin 2744ee22053b9e8b2189f58be6f1b7f2dfd1e7515d831168d733c149788153f2.exe File created C:\windows\Runn\WindowsTask.exe 2744ee22053b9e8b2189f58be6f1b7f2dfd1e7515d831168d733c149788153f2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\regfile\shell\EditFlags = "1699710488" {CD780E8C-3CE6-4b7e-8D88-1E799156DCA9}.exe Key created \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000_Classes\Local Settings 2744ee22053b9e8b2189f58be6f1b7f2dfd1e7515d831168d733c149788153f2.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3784 2744ee22053b9e8b2189f58be6f1b7f2dfd1e7515d831168d733c149788153f2.exe 3784 2744ee22053b9e8b2189f58be6f1b7f2dfd1e7515d831168d733c149788153f2.exe 4012 Yloux.exe 4012 Yloux.exe 4012 Yloux.exe 4012 Yloux.exe 4012 Yloux.exe 4012 Yloux.exe 4012 Yloux.exe 4012 Yloux.exe 4012 Yloux.exe 4012 Yloux.exe 4012 Yloux.exe 4012 Yloux.exe 4012 Yloux.exe 4012 Yloux.exe 4012 Yloux.exe 4012 Yloux.exe 4012 Yloux.exe 4012 Yloux.exe 4012 Yloux.exe 4012 Yloux.exe 4012 Yloux.exe 4012 Yloux.exe 4012 Yloux.exe 4012 Yloux.exe 4012 Yloux.exe 4012 Yloux.exe 4012 Yloux.exe 4012 Yloux.exe 4012 Yloux.exe 4012 Yloux.exe 4012 Yloux.exe 4012 Yloux.exe 4012 Yloux.exe 4012 Yloux.exe 4012 Yloux.exe 4012 Yloux.exe 4012 Yloux.exe 4012 Yloux.exe 4012 Yloux.exe 4012 Yloux.exe 4012 Yloux.exe 4012 Yloux.exe 4012 Yloux.exe 4012 Yloux.exe 4012 Yloux.exe 4012 Yloux.exe 4012 Yloux.exe 4012 Yloux.exe 4012 Yloux.exe 4012 Yloux.exe 4012 Yloux.exe 4012 Yloux.exe 4012 Yloux.exe 4012 Yloux.exe 4012 Yloux.exe 4012 Yloux.exe 4012 Yloux.exe 4012 Yloux.exe 4012 Yloux.exe 4012 Yloux.exe 4012 Yloux.exe 4012 Yloux.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4012 Yloux.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3784 wrote to memory of 4012 3784 2744ee22053b9e8b2189f58be6f1b7f2dfd1e7515d831168d733c149788153f2.exe 102 PID 3784 wrote to memory of 4012 3784 2744ee22053b9e8b2189f58be6f1b7f2dfd1e7515d831168d733c149788153f2.exe 102 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2744ee22053b9e8b2189f58be6f1b7f2dfd1e7515d831168d733c149788153f2.exe"C:\Users\Admin\AppData\Local\Temp\2744ee22053b9e8b2189f58be6f1b7f2dfd1e7515d831168d733c149788153f2.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\windows\Runn\Yloux.exe"C:\windows\Runn\Yloux.exe"2⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4012
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2116
-
C:\Users\Admin\AppData\Local\Temp\{CD780E8C-3CE6-4b7e-8D88-1E799156DCA9}.exe"C:\Users\Admin\AppData\Local\Temp\{CD780E8C-3CE6-4b7e-8D88-1E799156DCA9}.exe" /s "C:\Users\Admin\AppData\Local\Temp\\{32022D8C-6C21-4aec-B2A8-E519E2110B38}"1⤵
- Executes dropped EXE
- Modifies registry class
PID:2572
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5453a5be3cb26851af55ce4b62829f0ab
SHA19b2d74e0d4a8d711f91f577fafe5c52e67e679e3
SHA2565dc56b7f3742d72aa5d77662e1e89f16d9430e2a284c7d23c7fdb6fc07b44ff7
SHA5123ec3b923448babcaf7242a8a8be836d203dccd56409503c0f007e0a9a88116dabf2f27a4cbe2f7a748456a79ca9a18ae70aa7a0ff05661ed733e1e99bb3bd00c
-
Filesize
2KB
MD5ff0c7c2667dff4f3ed588f40d047c642
SHA11162c83bd0bb0d81b7ab7f616cb012b790aa4adf
SHA25602af5cb061fd8075e9475c45ab20e86cf2bb4ca9511ddad348645ed5183b9fc7
SHA512539b1d443232758b6c60a287f2a40200e6e3ba7353f11f18e29ba265c9569a4610e4a80910f79660368a916576ab9c486efa248bf3257e522ef5bfb3d42ef3c3
-
Filesize
354B
MD5369433e7b0e08cd5fe41dc447f082739
SHA115759a7e3c41db372bf273a236fefc9675a74396
SHA25612525c1b541a187c87ec547e052277af35e0ba49209875ed749541c094718d7a
SHA51253f10464cbd7c168305c1002382282fc4eca808673a537110c68cdae151ef87c3b462a613b88c3d7cf5ae0aa9f8df0e08399fc77feb227db31836313750e73dd
-
Filesize
215B
MD53249b8e295b1d72ccd6101a00dc5373f
SHA1da716273ca03b8a73a5b8f20d05e4fd3fc43808f
SHA256afeb9b6905cd31b2f50ef8a03ac61837a6f410640f0d7e7fd1bd951e30c6d7fe
SHA5127b85e298a321c842cf9cf2905b04a521e9276e417e93fe137273832864e34f43e947d54f1396f2c6ae1875484aed0e9576191c1717d0d01e683eadd61e63583c
-
Filesize
1.0MB
MD5217dc98e219a340cb09915244c992a52
SHA1a04f101ca7180955d62e4a1aaeccdcca489209da
SHA25627c8bd76150ddda5b09d6db11f67269cee2eecac345df67f93aab3e3aaabde7c
SHA512dddc15992533c8c13000163c7dd59b20e2fbdedbf611338c04f6f9209ec1a95d1f93aaeeae2778890214d333320978f5d2554348722ea6c8489320f0ef1c4c85
-
Filesize
1.0MB
MD5217dc98e219a340cb09915244c992a52
SHA1a04f101ca7180955d62e4a1aaeccdcca489209da
SHA25627c8bd76150ddda5b09d6db11f67269cee2eecac345df67f93aab3e3aaabde7c
SHA512dddc15992533c8c13000163c7dd59b20e2fbdedbf611338c04f6f9209ec1a95d1f93aaeeae2778890214d333320978f5d2554348722ea6c8489320f0ef1c4c85
-
Filesize
335KB
MD504df97d03e04be2564d2840cc38b8972
SHA15288fb5c2e6e187348a392b565c3d73552131490
SHA25678a52dda357dfc0d26a5bc5abdde97b46439fcd6cb0d9d2a0bb5c51fef6b23ce
SHA512771357d49980b0ff665fd5086861c27edc4f70b9b5e26bd9d467e7f93bda5abef32aebcc72b06c37141693304464fbf11f3ea5fab7a8f57c058cce036aed8b95
-
Filesize
335KB
MD504df97d03e04be2564d2840cc38b8972
SHA15288fb5c2e6e187348a392b565c3d73552131490
SHA25678a52dda357dfc0d26a5bc5abdde97b46439fcd6cb0d9d2a0bb5c51fef6b23ce
SHA512771357d49980b0ff665fd5086861c27edc4f70b9b5e26bd9d467e7f93bda5abef32aebcc72b06c37141693304464fbf11f3ea5fab7a8f57c058cce036aed8b95
-
Filesize
176KB
MD5758d06af8e7717885864e76d2dcabdf5
SHA1d1b40373854f40eebf9c445c6e1a6143d56a0d4b
SHA2566844de58de61e2c3cb67706f3dbb91d0d245c64740c7d139517fc0b335183b7e
SHA512499702f7aff6b63195af1d234648dd4814fe7a099ddbad177ade49d1f4aa0926ed5cce7a7369f8a7f480c20957b52416184deb5d85290e70f326875bb8503e23
-
Filesize
335KB
MD504df97d03e04be2564d2840cc38b8972
SHA15288fb5c2e6e187348a392b565c3d73552131490
SHA25678a52dda357dfc0d26a5bc5abdde97b46439fcd6cb0d9d2a0bb5c51fef6b23ce
SHA512771357d49980b0ff665fd5086861c27edc4f70b9b5e26bd9d467e7f93bda5abef32aebcc72b06c37141693304464fbf11f3ea5fab7a8f57c058cce036aed8b95