Analysis
-
max time kernel
174s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2024, 20:33
Static task
static1
Behavioral task
behavioral1
Sample
b81f03a7b0f27008d02a56141505b177.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
b81f03a7b0f27008d02a56141505b177.exe
Resource
win10v2004-20240226-en
General
-
Target
b81f03a7b0f27008d02a56141505b177.exe
-
Size
260KB
-
MD5
b81f03a7b0f27008d02a56141505b177
-
SHA1
ee2d317281a39ecfeb927ed58497b4e80c954822
-
SHA256
6602bb869e32867841efde6707f28c8da85165c74d2ab4c528736c76bcf08b06
-
SHA512
29cbf36d3203db0f8ce03736b3b1f154c0b01e2c840dd91b43f15087d3212aebd23aadb3190c099e03902d434647b64f99d6edc38d921fcaa73cc803c20d9b7e
-
SSDEEP
6144:x4HSUUp7WQn6mr1R4bKLnXejKloO6JU1J7QnpRZ7Ta9kzU2/pn:xkUp6Qn6mr1R4bKLnXaKaO6O1JApvH
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" youmib.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation b81f03a7b0f27008d02a56141505b177.exe -
Executes dropped EXE 1 IoCs
pid Process 4864 youmib.exe -
Adds Run key to start application 2 TTPs 50 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\youmib = "C:\\Users\\Admin\\youmib.exe /T" youmib.exe Set value (str) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\youmib = "C:\\Users\\Admin\\youmib.exe /x" youmib.exe Set value (str) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\youmib = "C:\\Users\\Admin\\youmib.exe /v" youmib.exe Set value (str) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\youmib = "C:\\Users\\Admin\\youmib.exe /t" youmib.exe Set value (str) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\youmib = "C:\\Users\\Admin\\youmib.exe /b" youmib.exe Set value (str) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\youmib = "C:\\Users\\Admin\\youmib.exe /h" youmib.exe Set value (str) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\youmib = "C:\\Users\\Admin\\youmib.exe /P" youmib.exe Set value (str) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\youmib = "C:\\Users\\Admin\\youmib.exe /X" youmib.exe Set value (str) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\youmib = "C:\\Users\\Admin\\youmib.exe /n" youmib.exe Set value (str) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\youmib = "C:\\Users\\Admin\\youmib.exe /K" youmib.exe Set value (str) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\youmib = "C:\\Users\\Admin\\youmib.exe /o" youmib.exe Set value (str) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\youmib = "C:\\Users\\Admin\\youmib.exe /k" youmib.exe Set value (str) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\youmib = "C:\\Users\\Admin\\youmib.exe /V" youmib.exe Set value (str) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\youmib = "C:\\Users\\Admin\\youmib.exe /E" youmib.exe Set value (str) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\youmib = "C:\\Users\\Admin\\youmib.exe /d" youmib.exe Set value (str) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\youmib = "C:\\Users\\Admin\\youmib.exe /D" youmib.exe Set value (str) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\youmib = "C:\\Users\\Admin\\youmib.exe /I" youmib.exe Set value (str) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\youmib = "C:\\Users\\Admin\\youmib.exe /B" youmib.exe Set value (str) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\youmib = "C:\\Users\\Admin\\youmib.exe /j" youmib.exe Set value (str) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\youmib = "C:\\Users\\Admin\\youmib.exe /Y" youmib.exe Set value (str) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\youmib = "C:\\Users\\Admin\\youmib.exe /u" youmib.exe Set value (str) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\youmib = "C:\\Users\\Admin\\youmib.exe /F" youmib.exe Set value (str) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\youmib = "C:\\Users\\Admin\\youmib.exe /g" youmib.exe Set value (str) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\youmib = "C:\\Users\\Admin\\youmib.exe /J" youmib.exe Set value (str) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\youmib = "C:\\Users\\Admin\\youmib.exe /N" youmib.exe Set value (str) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\youmib = "C:\\Users\\Admin\\youmib.exe /y" youmib.exe Set value (str) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\youmib = "C:\\Users\\Admin\\youmib.exe /m" youmib.exe Set value (str) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\youmib = "C:\\Users\\Admin\\youmib.exe /L" youmib.exe Set value (str) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\youmib = "C:\\Users\\Admin\\youmib.exe /M" youmib.exe Set value (str) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\youmib = "C:\\Users\\Admin\\youmib.exe /f" youmib.exe Set value (str) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\youmib = "C:\\Users\\Admin\\youmib.exe /l" youmib.exe Set value (str) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\youmib = "C:\\Users\\Admin\\youmib.exe /O" youmib.exe Set value (str) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\youmib = "C:\\Users\\Admin\\youmib.exe /C" youmib.exe Set value (str) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\youmib = "C:\\Users\\Admin\\youmib.exe /i" youmib.exe Set value (str) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\youmib = "C:\\Users\\Admin\\youmib.exe /S" youmib.exe Set value (str) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\youmib = "C:\\Users\\Admin\\youmib.exe /c" youmib.exe Set value (str) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\youmib = "C:\\Users\\Admin\\youmib.exe /G" youmib.exe Set value (str) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\youmib = "C:\\Users\\Admin\\youmib.exe /R" youmib.exe Set value (str) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\youmib = "C:\\Users\\Admin\\youmib.exe /z" youmib.exe Set value (str) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\youmib = "C:\\Users\\Admin\\youmib.exe /p" youmib.exe Set value (str) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\youmib = "C:\\Users\\Admin\\youmib.exe /H" youmib.exe Set value (str) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\youmib = "C:\\Users\\Admin\\youmib.exe /s" youmib.exe Set value (str) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\youmib = "C:\\Users\\Admin\\youmib.exe /Q" youmib.exe Set value (str) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\youmib = "C:\\Users\\Admin\\youmib.exe /U" youmib.exe Set value (str) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\youmib = "C:\\Users\\Admin\\youmib.exe /w" youmib.exe Set value (str) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\youmib = "C:\\Users\\Admin\\youmib.exe /r" youmib.exe Set value (str) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\youmib = "C:\\Users\\Admin\\youmib.exe /a" youmib.exe Set value (str) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\youmib = "C:\\Users\\Admin\\youmib.exe /q" youmib.exe Set value (str) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\youmib = "C:\\Users\\Admin\\youmib.exe /e" youmib.exe Set value (str) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\youmib = "C:\\Users\\Admin\\youmib.exe /Z" youmib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4864 youmib.exe 4864 youmib.exe 4864 youmib.exe 4864 youmib.exe 4864 youmib.exe 4864 youmib.exe 4864 youmib.exe 4864 youmib.exe 4864 youmib.exe 4864 youmib.exe 4864 youmib.exe 4864 youmib.exe 4864 youmib.exe 4864 youmib.exe 4864 youmib.exe 4864 youmib.exe 4864 youmib.exe 4864 youmib.exe 4864 youmib.exe 4864 youmib.exe 4864 youmib.exe 4864 youmib.exe 4864 youmib.exe 4864 youmib.exe 4864 youmib.exe 4864 youmib.exe 4864 youmib.exe 4864 youmib.exe 4864 youmib.exe 4864 youmib.exe 4864 youmib.exe 4864 youmib.exe 4864 youmib.exe 4864 youmib.exe 4864 youmib.exe 4864 youmib.exe 4864 youmib.exe 4864 youmib.exe 4864 youmib.exe 4864 youmib.exe 4864 youmib.exe 4864 youmib.exe 4864 youmib.exe 4864 youmib.exe 4864 youmib.exe 4864 youmib.exe 4864 youmib.exe 4864 youmib.exe 4864 youmib.exe 4864 youmib.exe 4864 youmib.exe 4864 youmib.exe 4864 youmib.exe 4864 youmib.exe 4864 youmib.exe 4864 youmib.exe 4864 youmib.exe 4864 youmib.exe 4864 youmib.exe 4864 youmib.exe 4864 youmib.exe 4864 youmib.exe 4864 youmib.exe 4864 youmib.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1792 b81f03a7b0f27008d02a56141505b177.exe 4864 youmib.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1792 wrote to memory of 4864 1792 b81f03a7b0f27008d02a56141505b177.exe 96 PID 1792 wrote to memory of 4864 1792 b81f03a7b0f27008d02a56141505b177.exe 96 PID 1792 wrote to memory of 4864 1792 b81f03a7b0f27008d02a56141505b177.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\b81f03a7b0f27008d02a56141505b177.exe"C:\Users\Admin\AppData\Local\Temp\b81f03a7b0f27008d02a56141505b177.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Users\Admin\youmib.exe"C:\Users\Admin\youmib.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4864
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
260KB
MD507d4a1a9dec95a8a035466d44b3c3afe
SHA1c74e36548a43cc0d0d2d5289c112c85a5271b484
SHA25675cf604f69335f270742f04a4b48107beb8c4e684dd4f8f4d40cfcd4ac220e77
SHA5121a716d8a4f0bdadf5fab5f4eb18daf133c7221af57db59a9a5188a0f718d4bbff4ed2e2eb0b2fb70fd7ce9f3eb7dd52e36b391d9611a2a6c25d7737234f224ca