Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 20:07
Static task
static1
Behavioral task
behavioral1
Sample
31499437179132245c49ee9e1264e8c43bd274a37c769d8be4f98ad483047966.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
31499437179132245c49ee9e1264e8c43bd274a37c769d8be4f98ad483047966.exe
Resource
win10v2004-20240426-en
General
-
Target
31499437179132245c49ee9e1264e8c43bd274a37c769d8be4f98ad483047966.exe
-
Size
480KB
-
MD5
3eabf16fb90b819216e42f9ffe8f81f7
-
SHA1
d367b566c00fcbee2708a2aa9fbfd69cf6f219de
-
SHA256
31499437179132245c49ee9e1264e8c43bd274a37c769d8be4f98ad483047966
-
SHA512
21389815ee5120240a6b794f70bba8e2c59d3665b7a3a66997ae3b455a100f204179239084a3397677928d34821897b25aba19b08c935cb7c26bb68aef5b8a6d
-
SSDEEP
6144:AjlYKRF/LReWAsUyoJ9WFr2eu1ZDRNaw7y6JAwGqu7MJaNJjIRx3M8FPQsaRQMui:AjauDReWm0G1VAwGq9aIy/QLi
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2984 ylbsc.exe -
Loads dropped DLL 2 IoCs
pid Process 1904 31499437179132245c49ee9e1264e8c43bd274a37c769d8be4f98ad483047966.exe 1904 31499437179132245c49ee9e1264e8c43bd274a37c769d8be4f98ad483047966.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\ProgramData\\ylbsc.exe" ylbsc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1904 wrote to memory of 2984 1904 31499437179132245c49ee9e1264e8c43bd274a37c769d8be4f98ad483047966.exe 28 PID 1904 wrote to memory of 2984 1904 31499437179132245c49ee9e1264e8c43bd274a37c769d8be4f98ad483047966.exe 28 PID 1904 wrote to memory of 2984 1904 31499437179132245c49ee9e1264e8c43bd274a37c769d8be4f98ad483047966.exe 28 PID 1904 wrote to memory of 2984 1904 31499437179132245c49ee9e1264e8c43bd274a37c769d8be4f98ad483047966.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\31499437179132245c49ee9e1264e8c43bd274a37c769d8be4f98ad483047966.exe"C:\Users\Admin\AppData\Local\Temp\31499437179132245c49ee9e1264e8c43bd274a37c769d8be4f98ad483047966.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\ProgramData\ylbsc.exe"C:\ProgramData\ylbsc.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2984
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
480KB
MD595be663f9e288e436883cafaebcc9e53
SHA1a2700f4e520b25429c2e72ec617e107981b78a4a
SHA256885bc3f9b6eac7f60ffa7c2ac5496ad55058a3c7cbe80a1030227ba8ad3e2a40
SHA51266ee270aa6e2f0ab65c54bd06ec6f0c13945457a1094fc8f374468bc8b3e461ae7505a7b051fb90a24ac8826121491f74436dfc59bc0d7770e7d2520f9c1c324
-
Filesize
136KB
MD52bd01b99551cc639ddb5cb66914904a6
SHA150beb8bab8be15271951130ac833eb19566f9333
SHA2569764e531dd52e37a454c7f052a17fe7b68821dc3570286aab7bb4706639efe40
SHA512374436459d62bdd62fc79b779e5aef155d7b8817e3d64e53639130be49d061a251d04a3882d403c1cacf890f91fa53e9137e551f3f6479341e09fe97c7bf2390
-
Filesize
343KB
MD55d41410cbf4e76dc9b36bd6ef581c304
SHA133cb42491fcd6561257c15b0102f143e4fdbafd5
SHA2567d97e7f025b9a006efcc41bbc48a77015e414b53c2b737c7f4deaff7c33fabb6
SHA5126bb815b6c4bf8dd8da38d2f9032dcb6c8222a400001b5c0854f9305f8943ddb5ee284455c7afda7c568429ef2b881d74f63de3d41e671f594d4b0e56da743233