Analysis
-
max time kernel
150s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
07-03-2024 17:32
Static task
static1
Behavioral task
behavioral1
Sample
b94504dd45589f48b6db7e5a22904b98.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
b94504dd45589f48b6db7e5a22904b98.exe
Resource
win10v2004-20240226-en
General
-
Target
b94504dd45589f48b6db7e5a22904b98.exe
-
Size
363KB
-
MD5
b94504dd45589f48b6db7e5a22904b98
-
SHA1
a86474ae38c46fe0464f34b003c0cc5eae96c24c
-
SHA256
03f8de6672375e409116e694e4ca148324a9e32c6b27fb8fff68c8170540a8a9
-
SHA512
7124ea52af10be8e3bfd7c93e143cbec5096a4ce834300cde6e7f4830454d0d7043bcb9a556e65704ebfe79b847c4274aad283b6114bf016eb536d1c0e214219
-
SSDEEP
6144:yQqfyilArKQWwsctuEDBHlC8w9WuKc9mfhTNSBLJeQAxrs+4:y/fhlAWvwVdNdeuphkBNRArs+4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
ygfiyp.exepid process 1172 ygfiyp.exe -
Loads dropped DLL 1 IoCs
Processes:
b94504dd45589f48b6db7e5a22904b98.exepid process 2356 b94504dd45589f48b6db7e5a22904b98.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
ygfiyp.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\{9EC938C8-8543-AD4E-DD27-CD48CA2DEE55} = "C:\\Users\\Admin\\AppData\\Roaming\\Omaqca\\ygfiyp.exe" ygfiyp.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
b94504dd45589f48b6db7e5a22904b98.exedescription pid process target process PID 2356 set thread context of 2036 2356 b94504dd45589f48b6db7e5a22904b98.exe cmd.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2212 2036 WerFault.exe cmd.exe 2112 2212 WerFault.exe WerFault.exe -
Processes:
b94504dd45589f48b6db7e5a22904b98.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" b94504dd45589f48b6db7e5a22904b98.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Privacy b94504dd45589f48b6db7e5a22904b98.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
Processes:
ygfiyp.exepid process 1172 ygfiyp.exe 1172 ygfiyp.exe 1172 ygfiyp.exe 1172 ygfiyp.exe 1172 ygfiyp.exe 1172 ygfiyp.exe 1172 ygfiyp.exe 1172 ygfiyp.exe 1172 ygfiyp.exe 1172 ygfiyp.exe 1172 ygfiyp.exe 1172 ygfiyp.exe 1172 ygfiyp.exe 1172 ygfiyp.exe 1172 ygfiyp.exe 1172 ygfiyp.exe 1172 ygfiyp.exe 1172 ygfiyp.exe 1172 ygfiyp.exe 1172 ygfiyp.exe 1172 ygfiyp.exe 1172 ygfiyp.exe 1172 ygfiyp.exe 1172 ygfiyp.exe 1172 ygfiyp.exe 1172 ygfiyp.exe 1172 ygfiyp.exe 1172 ygfiyp.exe 1172 ygfiyp.exe 1172 ygfiyp.exe 1172 ygfiyp.exe 1172 ygfiyp.exe -
Suspicious use of UnmapMainImage 2 IoCs
Processes:
b94504dd45589f48b6db7e5a22904b98.exeygfiyp.exepid process 2356 b94504dd45589f48b6db7e5a22904b98.exe 1172 ygfiyp.exe -
Suspicious use of WriteProcessMemory 56 IoCs
Processes:
b94504dd45589f48b6db7e5a22904b98.exeygfiyp.execmd.exeWerFault.exedescription pid process target process PID 2356 wrote to memory of 1172 2356 b94504dd45589f48b6db7e5a22904b98.exe ygfiyp.exe PID 2356 wrote to memory of 1172 2356 b94504dd45589f48b6db7e5a22904b98.exe ygfiyp.exe PID 2356 wrote to memory of 1172 2356 b94504dd45589f48b6db7e5a22904b98.exe ygfiyp.exe PID 2356 wrote to memory of 1172 2356 b94504dd45589f48b6db7e5a22904b98.exe ygfiyp.exe PID 1172 wrote to memory of 1120 1172 ygfiyp.exe taskhost.exe PID 1172 wrote to memory of 1120 1172 ygfiyp.exe taskhost.exe PID 1172 wrote to memory of 1120 1172 ygfiyp.exe taskhost.exe PID 1172 wrote to memory of 1120 1172 ygfiyp.exe taskhost.exe PID 1172 wrote to memory of 1120 1172 ygfiyp.exe taskhost.exe PID 1172 wrote to memory of 1180 1172 ygfiyp.exe Dwm.exe PID 1172 wrote to memory of 1180 1172 ygfiyp.exe Dwm.exe PID 1172 wrote to memory of 1180 1172 ygfiyp.exe Dwm.exe PID 1172 wrote to memory of 1180 1172 ygfiyp.exe Dwm.exe PID 1172 wrote to memory of 1180 1172 ygfiyp.exe Dwm.exe PID 1172 wrote to memory of 1224 1172 ygfiyp.exe Explorer.EXE PID 1172 wrote to memory of 1224 1172 ygfiyp.exe Explorer.EXE PID 1172 wrote to memory of 1224 1172 ygfiyp.exe Explorer.EXE PID 1172 wrote to memory of 1224 1172 ygfiyp.exe Explorer.EXE PID 1172 wrote to memory of 1224 1172 ygfiyp.exe Explorer.EXE PID 1172 wrote to memory of 1008 1172 ygfiyp.exe DllHost.exe PID 1172 wrote to memory of 1008 1172 ygfiyp.exe DllHost.exe PID 1172 wrote to memory of 1008 1172 ygfiyp.exe DllHost.exe PID 1172 wrote to memory of 1008 1172 ygfiyp.exe DllHost.exe PID 1172 wrote to memory of 1008 1172 ygfiyp.exe DllHost.exe PID 1172 wrote to memory of 2356 1172 ygfiyp.exe b94504dd45589f48b6db7e5a22904b98.exe PID 1172 wrote to memory of 2356 1172 ygfiyp.exe b94504dd45589f48b6db7e5a22904b98.exe PID 1172 wrote to memory of 2356 1172 ygfiyp.exe b94504dd45589f48b6db7e5a22904b98.exe PID 1172 wrote to memory of 2356 1172 ygfiyp.exe b94504dd45589f48b6db7e5a22904b98.exe PID 1172 wrote to memory of 2356 1172 ygfiyp.exe b94504dd45589f48b6db7e5a22904b98.exe PID 2356 wrote to memory of 2036 2356 b94504dd45589f48b6db7e5a22904b98.exe cmd.exe PID 2356 wrote to memory of 2036 2356 b94504dd45589f48b6db7e5a22904b98.exe cmd.exe PID 2356 wrote to memory of 2036 2356 b94504dd45589f48b6db7e5a22904b98.exe cmd.exe PID 2356 wrote to memory of 2036 2356 b94504dd45589f48b6db7e5a22904b98.exe cmd.exe PID 2356 wrote to memory of 2036 2356 b94504dd45589f48b6db7e5a22904b98.exe cmd.exe PID 2356 wrote to memory of 2036 2356 b94504dd45589f48b6db7e5a22904b98.exe cmd.exe PID 2356 wrote to memory of 2036 2356 b94504dd45589f48b6db7e5a22904b98.exe cmd.exe PID 2356 wrote to memory of 2036 2356 b94504dd45589f48b6db7e5a22904b98.exe cmd.exe PID 2356 wrote to memory of 2036 2356 b94504dd45589f48b6db7e5a22904b98.exe cmd.exe PID 2036 wrote to memory of 2212 2036 cmd.exe WerFault.exe PID 2036 wrote to memory of 2212 2036 cmd.exe WerFault.exe PID 2036 wrote to memory of 2212 2036 cmd.exe WerFault.exe PID 2036 wrote to memory of 2212 2036 cmd.exe WerFault.exe PID 1172 wrote to memory of 1436 1172 ygfiyp.exe conhost.exe PID 1172 wrote to memory of 1436 1172 ygfiyp.exe conhost.exe PID 1172 wrote to memory of 1436 1172 ygfiyp.exe conhost.exe PID 1172 wrote to memory of 1436 1172 ygfiyp.exe conhost.exe PID 1172 wrote to memory of 1436 1172 ygfiyp.exe conhost.exe PID 1172 wrote to memory of 2212 1172 ygfiyp.exe WerFault.exe PID 1172 wrote to memory of 2212 1172 ygfiyp.exe WerFault.exe PID 1172 wrote to memory of 2212 1172 ygfiyp.exe WerFault.exe PID 1172 wrote to memory of 2212 1172 ygfiyp.exe WerFault.exe PID 1172 wrote to memory of 2212 1172 ygfiyp.exe WerFault.exe PID 2212 wrote to memory of 2112 2212 WerFault.exe WerFault.exe PID 2212 wrote to memory of 2112 2212 WerFault.exe WerFault.exe PID 2212 wrote to memory of 2112 2212 WerFault.exe WerFault.exe PID 2212 wrote to memory of 2112 2212 WerFault.exe WerFault.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1120
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1180
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\b94504dd45589f48b6db7e5a22904b98.exe"C:\Users\Admin\AppData\Local\Temp\b94504dd45589f48b6db7e5a22904b98.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Users\Admin\AppData\Roaming\Omaqca\ygfiyp.exe"C:\Users\Admin\AppData\Roaming\Omaqca\ygfiyp.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1172
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpf254cc23.bat"3⤵
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2036 -s 1124⤵
- Program crash
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2212 -s 5285⤵
- Program crash
PID:2112
-
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1008
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-18957572092032728790-1201611613102363964-185570640519242553181616937039-2104987912"1⤵PID:1436
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
363KB
MD53304f456992bd2859d2aa9a96dfd7240
SHA1c7823210d56b51497afd619e1a16495b0f6532e4
SHA256c4565e695795819ab25454874e66a4831b05580c332b66685fd4d7caf7a3d404
SHA512174ff6c5a365b5976f4f3a330be589a10ea96b15984ba298f34d41fa6c5086dc4d1325574b7999c3eb91a56396591755f60901c2daa8de3481177b05e8d19e88