Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
26-03-2024 17:56
Static task
static1
Behavioral task
behavioral1
Sample
dfc31105387cf0795685098b7c9aabc8.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
dfc31105387cf0795685098b7c9aabc8.exe
Resource
win10v2004-20240226-en
General
-
Target
dfc31105387cf0795685098b7c9aabc8.exe
-
Size
324KB
-
MD5
dfc31105387cf0795685098b7c9aabc8
-
SHA1
82c2fbe1564c2d9ae3b973e220ce24ed64f87ba7
-
SHA256
e9dc039998c294bb4745916c8a17814f2a441422173b20664fd63a3224df2e78
-
SHA512
da44f57ba77207fdf85c8bcca4998f42a369c0e53fb44baf3ca1faea84a8ba8e47e610711c33193ebec4fd2cf7f1b0a0999ee8459a41f803005b4445a9d3b251
-
SSDEEP
6144:s127RLqEA8syum7IjAv+9Ca8o2FUr7d9RupUaFtbziBRT:bVLqEtsyYjAm9Ca12Fmd9RyUa/zi
Malware Config
Signatures
-
Disables taskbar notifications via registry modification
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Deletes itself 1 IoCs
pid Process 2340 ytx.exe -
Executes dropped EXE 1 IoCs
pid Process 2340 ytx.exe -
Loads dropped DLL 2 IoCs
pid Process 2208 dfc31105387cf0795685098b7c9aabc8.exe 2208 dfc31105387cf0795685098b7c9aabc8.exe -
Modifies system executable filetype association 2 TTPs 17 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\exefile\shell\start\command ytx.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\exefile\Content Type = "application/x-msdownload" ytx.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\exefile\shell\runas ytx.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\exefile\shell\start\command\ = "\"%1\" %*" ytx.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\exefile\shell\start\command\IsolatedCommand = "\"%1\" %*" ytx.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\exefile\DefaultIcon ytx.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\exefile\shell\runas\command\ = "\"%1\" %*" ytx.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\exefile\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\ytx.exe\" -a \"%1\" %*" ytx.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\exefile\shell\open\command\IsolatedCommand = "\"%1\" %*" ytx.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\exefile\shell\runas\command ytx.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\exefile\shell\start ytx.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\exefile\DefaultIcon\ = "%1" ytx.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\exefile\shell\open ytx.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\exefile\shell\open\command ytx.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\exefile\shell\runas\command\IsolatedCommand = "\"%1\" %*" ytx.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\exefile\ = "Application" ytx.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\exefile\shell ytx.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\ctfmon.exe = "C:\\WINDOWS\\system32\\ctfmon.exe" ytx.exe -
Modifies registry class 41 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\.exe\shell\start\command ytx.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\.exe\shell\start\command\IsolatedCommand = "\"%1\" %*" ytx.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\exefile ytx.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\exefile\shell\runas ytx.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\exefile\shell\runas\command\ = "\"%1\" %*" ytx.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\exefile\shell\start\command\ = "\"%1\" %*" ytx.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\.exe\Content Type = "application/x-msdownload" ytx.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\ytx.exe\" -a \"%1\" %*" ytx.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_Classes\Local Settings explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\exefile\DefaultIcon\ = "%1" ytx.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\exefile\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\ytx.exe\" -a \"%1\" %*" ytx.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\.exe\shell\start ytx.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\.exe\DefaultIcon ytx.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\.exe\shell\runas\command ytx.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\.exe\shell\runas ytx.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\.exe\shell\start\command\ = "\"%1\" %*" ytx.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\exefile\shell\runas\command\IsolatedCommand = "\"%1\" %*" ytx.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\exefile\shell\start ytx.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\.exe ytx.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\.exe\DefaultIcon\ = "%1" ytx.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\exefile\shell\start\command\IsolatedCommand = "\"%1\" %*" ytx.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\exefile\DefaultIcon ytx.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\.exe\ = "exefile" ytx.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\exefile\Content Type = "application/x-msdownload" ytx.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" ytx.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\exefile\shell ytx.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\exefile\shell\open\command\IsolatedCommand = "\"%1\" %*" ytx.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\.exe\shell\open ytx.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" ytx.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\.exe\shell\runas\command\ = "\"%1\" %*" ytx.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\exefile\ = "Application" ytx.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\exefile\shell\open ytx.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\exefile\shell\open\command ytx.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\exefile\shell\runas\command ytx.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\exefile\shell\start\command ytx.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\.exe\shell ytx.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\.exe\shell\open\command ytx.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2208 dfc31105387cf0795685098b7c9aabc8.exe 2208 dfc31105387cf0795685098b7c9aabc8.exe 2208 dfc31105387cf0795685098b7c9aabc8.exe 2208 dfc31105387cf0795685098b7c9aabc8.exe 2208 dfc31105387cf0795685098b7c9aabc8.exe 2208 dfc31105387cf0795685098b7c9aabc8.exe 2208 dfc31105387cf0795685098b7c9aabc8.exe 2208 dfc31105387cf0795685098b7c9aabc8.exe 2208 dfc31105387cf0795685098b7c9aabc8.exe 2340 ytx.exe 2340 ytx.exe 2340 ytx.exe 2340 ytx.exe 2340 ytx.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2620 explorer.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeShutdownPrivilege 2620 explorer.exe Token: SeShutdownPrivilege 2620 explorer.exe Token: SeShutdownPrivilege 2620 explorer.exe Token: SeShutdownPrivilege 2620 explorer.exe Token: SeShutdownPrivilege 2620 explorer.exe Token: SeShutdownPrivilege 2620 explorer.exe Token: SeShutdownPrivilege 2620 explorer.exe Token: SeShutdownPrivilege 2620 explorer.exe Token: SeShutdownPrivilege 2620 explorer.exe Token: SeShutdownPrivilege 2620 explorer.exe Token: SeShutdownPrivilege 2620 explorer.exe Token: SeShutdownPrivilege 2620 explorer.exe Token: SeShutdownPrivilege 2620 explorer.exe Token: SeShutdownPrivilege 2620 explorer.exe Token: SeShutdownPrivilege 2620 explorer.exe Token: SeShutdownPrivilege 2620 explorer.exe -
Suspicious use of FindShellTrayWindow 37 IoCs
pid Process 2340 ytx.exe 2340 ytx.exe 2340 ytx.exe 2620 explorer.exe 2620 explorer.exe 2620 explorer.exe 2620 explorer.exe 2620 explorer.exe 2620 explorer.exe 2620 explorer.exe 2620 explorer.exe 2620 explorer.exe 2620 explorer.exe 2620 explorer.exe 2620 explorer.exe 2620 explorer.exe 2620 explorer.exe 2620 explorer.exe 2620 explorer.exe 2620 explorer.exe 2620 explorer.exe 2620 explorer.exe 2620 explorer.exe 2620 explorer.exe 2620 explorer.exe 2620 explorer.exe 2620 explorer.exe 2620 explorer.exe 2620 explorer.exe 2620 explorer.exe 2620 explorer.exe 2340 ytx.exe 2620 explorer.exe 2620 explorer.exe 2340 ytx.exe 2340 ytx.exe 2620 explorer.exe -
Suspicious use of SendNotifyMessage 20 IoCs
pid Process 2620 explorer.exe 2620 explorer.exe 2620 explorer.exe 2620 explorer.exe 2620 explorer.exe 2620 explorer.exe 2620 explorer.exe 2620 explorer.exe 2620 explorer.exe 2620 explorer.exe 2620 explorer.exe 2620 explorer.exe 2620 explorer.exe 2620 explorer.exe 2620 explorer.exe 2620 explorer.exe 2620 explorer.exe 2620 explorer.exe 2340 ytx.exe 2340 ytx.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2340 ytx.exe 2340 ytx.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2340 2208 dfc31105387cf0795685098b7c9aabc8.exe 29 PID 2208 wrote to memory of 2340 2208 dfc31105387cf0795685098b7c9aabc8.exe 29 PID 2208 wrote to memory of 2340 2208 dfc31105387cf0795685098b7c9aabc8.exe 29 PID 2208 wrote to memory of 2340 2208 dfc31105387cf0795685098b7c9aabc8.exe 29 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\dfc31105387cf0795685098b7c9aabc8.exe"C:\Users\Admin\AppData\Local\Temp\dfc31105387cf0795685098b7c9aabc8.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\ytx.exe"C:\Users\Admin\AppData\Local\ytx.exe" -gav C:\Users\Admin\AppData\Local\Temp\dfc31105387cf0795685098b7c9aabc8.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2340
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2620
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
324KB
MD5dfc31105387cf0795685098b7c9aabc8
SHA182c2fbe1564c2d9ae3b973e220ce24ed64f87ba7
SHA256e9dc039998c294bb4745916c8a17814f2a441422173b20664fd63a3224df2e78
SHA512da44f57ba77207fdf85c8bcca4998f42a369c0e53fb44baf3ca1faea84a8ba8e47e610711c33193ebec4fd2cf7f1b0a0999ee8459a41f803005b4445a9d3b251