Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 05:41
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
YuQu Loader V2.exe
Resource
win7-20240708-en
3 signatures
150 seconds
General
-
Target
YuQu Loader V2.exe
-
Size
529KB
-
MD5
c4877fe54aabca2a36aa085a8649a402
-
SHA1
6a198b5bdd42598d63c48724d00416ef697d3f98
-
SHA256
940c056664ba85263b81dcba315312658e5a734fda76b459b0dab49439df1662
-
SHA512
6e8dc3977b7af0f5fc1f9793bc53c489eee59a6d09039c6c90eb4565e9a72324808a49eecb3d0617ebd6952b107c3235ce1102b4e263a9137f9db6924ad7d91d
-
SSDEEP
12288:beO9acLNkzcMQ4qyMPinNF/MJ7OmKfByuKtyDgir2aPboLbV1R:1ezcMj/tM0JErsk/aMLb/
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2624 1960 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language YuQu Loader V2.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1960 wrote to memory of 2624 1960 YuQu Loader V2.exe 31 PID 1960 wrote to memory of 2624 1960 YuQu Loader V2.exe 31 PID 1960 wrote to memory of 2624 1960 YuQu Loader V2.exe 31 PID 1960 wrote to memory of 2624 1960 YuQu Loader V2.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\YuQu Loader V2.exe"C:\Users\Admin\AppData\Local\Temp\YuQu Loader V2.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1960 -s 1122⤵
- Program crash
PID:2624
-