Analysis
-
max time kernel
119s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/09/2024, 12:23
Static task
static1
Behavioral task
behavioral1
Sample
bda3de761c64ccf41be150e34e0f0eeeb266eb35da98d5adb68b5281e9f81012N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bda3de761c64ccf41be150e34e0f0eeeb266eb35da98d5adb68b5281e9f81012N.exe
Resource
win10v2004-20240802-en
General
-
Target
bda3de761c64ccf41be150e34e0f0eeeb266eb35da98d5adb68b5281e9f81012N.exe
-
Size
140KB
-
MD5
e3defdbd43e0ba5e94335b6a207da8e0
-
SHA1
7ccacfc8aa8c7a3599cfdcf831309f595eacfb76
-
SHA256
bda3de761c64ccf41be150e34e0f0eeeb266eb35da98d5adb68b5281e9f81012
-
SHA512
ea515c3d897afc7cfcbc115846aebdb0b5a4ab0da54a9b651c0ea76ef450c593f23e1833c4875829f2ce864ce79d780fd5f9286123a436efa48eb7d29024960b
-
SSDEEP
3072:+lf1fGL02W2N0fAU9x5Ea3hN4oQZiEzb6:89GL012efAU9x5BxfWRm
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" bda3de761c64ccf41be150e34e0f0eeeb266eb35da98d5adb68b5281e9f81012N.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" yuudiob.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation bda3de761c64ccf41be150e34e0f0eeeb266eb35da98d5adb68b5281e9f81012N.exe -
Executes dropped EXE 1 IoCs
pid Process 2352 yuudiob.exe -
Adds Run key to start application 2 TTPs 51 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuudiob = "C:\\Users\\Admin\\yuudiob.exe /p" yuudiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuudiob = "C:\\Users\\Admin\\yuudiob.exe /W" yuudiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuudiob = "C:\\Users\\Admin\\yuudiob.exe /c" yuudiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuudiob = "C:\\Users\\Admin\\yuudiob.exe /n" yuudiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuudiob = "C:\\Users\\Admin\\yuudiob.exe /C" yuudiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuudiob = "C:\\Users\\Admin\\yuudiob.exe /J" yuudiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuudiob = "C:\\Users\\Admin\\yuudiob.exe /x" yuudiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuudiob = "C:\\Users\\Admin\\yuudiob.exe /F" yuudiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuudiob = "C:\\Users\\Admin\\yuudiob.exe /Z" yuudiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuudiob = "C:\\Users\\Admin\\yuudiob.exe /L" yuudiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuudiob = "C:\\Users\\Admin\\yuudiob.exe /i" yuudiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuudiob = "C:\\Users\\Admin\\yuudiob.exe /h" yuudiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuudiob = "C:\\Users\\Admin\\yuudiob.exe /r" yuudiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuudiob = "C:\\Users\\Admin\\yuudiob.exe /w" yuudiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuudiob = "C:\\Users\\Admin\\yuudiob.exe /N" yuudiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuudiob = "C:\\Users\\Admin\\yuudiob.exe /R" yuudiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuudiob = "C:\\Users\\Admin\\yuudiob.exe /e" yuudiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuudiob = "C:\\Users\\Admin\\yuudiob.exe /t" yuudiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuudiob = "C:\\Users\\Admin\\yuudiob.exe /g" yuudiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuudiob = "C:\\Users\\Admin\\yuudiob.exe /m" yuudiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuudiob = "C:\\Users\\Admin\\yuudiob.exe /P" yuudiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuudiob = "C:\\Users\\Admin\\yuudiob.exe /B" yuudiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuudiob = "C:\\Users\\Admin\\yuudiob.exe /y" yuudiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuudiob = "C:\\Users\\Admin\\yuudiob.exe /H" yuudiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuudiob = "C:\\Users\\Admin\\yuudiob.exe /I" yuudiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuudiob = "C:\\Users\\Admin\\yuudiob.exe /v" yuudiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuudiob = "C:\\Users\\Admin\\yuudiob.exe /s" yuudiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuudiob = "C:\\Users\\Admin\\yuudiob.exe /z" yuudiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuudiob = "C:\\Users\\Admin\\yuudiob.exe /V" yuudiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuudiob = "C:\\Users\\Admin\\yuudiob.exe /l" yuudiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuudiob = "C:\\Users\\Admin\\yuudiob.exe /O" yuudiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuudiob = "C:\\Users\\Admin\\yuudiob.exe /o" yuudiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuudiob = "C:\\Users\\Admin\\yuudiob.exe /S" yuudiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuudiob = "C:\\Users\\Admin\\yuudiob.exe /Q" yuudiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuudiob = "C:\\Users\\Admin\\yuudiob.exe /U" yuudiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuudiob = "C:\\Users\\Admin\\yuudiob.exe /q" yuudiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuudiob = "C:\\Users\\Admin\\yuudiob.exe /E" yuudiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuudiob = "C:\\Users\\Admin\\yuudiob.exe /M" yuudiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuudiob = "C:\\Users\\Admin\\yuudiob.exe /D" yuudiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuudiob = "C:\\Users\\Admin\\yuudiob.exe /j" yuudiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuudiob = "C:\\Users\\Admin\\yuudiob.exe /X" yuudiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuudiob = "C:\\Users\\Admin\\yuudiob.exe /G" yuudiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuudiob = "C:\\Users\\Admin\\yuudiob.exe /f" yuudiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuudiob = "C:\\Users\\Admin\\yuudiob.exe /T" yuudiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuudiob = "C:\\Users\\Admin\\yuudiob.exe /b" yuudiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuudiob = "C:\\Users\\Admin\\yuudiob.exe /k" yuudiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuudiob = "C:\\Users\\Admin\\yuudiob.exe /a" yuudiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuudiob = "C:\\Users\\Admin\\yuudiob.exe /O" bda3de761c64ccf41be150e34e0f0eeeb266eb35da98d5adb68b5281e9f81012N.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuudiob = "C:\\Users\\Admin\\yuudiob.exe /d" yuudiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuudiob = "C:\\Users\\Admin\\yuudiob.exe /A" yuudiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuudiob = "C:\\Users\\Admin\\yuudiob.exe /u" yuudiob.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bda3de761c64ccf41be150e34e0f0eeeb266eb35da98d5adb68b5281e9f81012N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yuudiob.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5004 bda3de761c64ccf41be150e34e0f0eeeb266eb35da98d5adb68b5281e9f81012N.exe 5004 bda3de761c64ccf41be150e34e0f0eeeb266eb35da98d5adb68b5281e9f81012N.exe 2352 yuudiob.exe 2352 yuudiob.exe 2352 yuudiob.exe 2352 yuudiob.exe 2352 yuudiob.exe 2352 yuudiob.exe 2352 yuudiob.exe 2352 yuudiob.exe 2352 yuudiob.exe 2352 yuudiob.exe 2352 yuudiob.exe 2352 yuudiob.exe 2352 yuudiob.exe 2352 yuudiob.exe 2352 yuudiob.exe 2352 yuudiob.exe 2352 yuudiob.exe 2352 yuudiob.exe 2352 yuudiob.exe 2352 yuudiob.exe 2352 yuudiob.exe 2352 yuudiob.exe 2352 yuudiob.exe 2352 yuudiob.exe 2352 yuudiob.exe 2352 yuudiob.exe 2352 yuudiob.exe 2352 yuudiob.exe 2352 yuudiob.exe 2352 yuudiob.exe 2352 yuudiob.exe 2352 yuudiob.exe 2352 yuudiob.exe 2352 yuudiob.exe 2352 yuudiob.exe 2352 yuudiob.exe 2352 yuudiob.exe 2352 yuudiob.exe 2352 yuudiob.exe 2352 yuudiob.exe 2352 yuudiob.exe 2352 yuudiob.exe 2352 yuudiob.exe 2352 yuudiob.exe 2352 yuudiob.exe 2352 yuudiob.exe 2352 yuudiob.exe 2352 yuudiob.exe 2352 yuudiob.exe 2352 yuudiob.exe 2352 yuudiob.exe 2352 yuudiob.exe 2352 yuudiob.exe 2352 yuudiob.exe 2352 yuudiob.exe 2352 yuudiob.exe 2352 yuudiob.exe 2352 yuudiob.exe 2352 yuudiob.exe 2352 yuudiob.exe 2352 yuudiob.exe 2352 yuudiob.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 5004 bda3de761c64ccf41be150e34e0f0eeeb266eb35da98d5adb68b5281e9f81012N.exe 2352 yuudiob.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5004 wrote to memory of 2352 5004 bda3de761c64ccf41be150e34e0f0eeeb266eb35da98d5adb68b5281e9f81012N.exe 84 PID 5004 wrote to memory of 2352 5004 bda3de761c64ccf41be150e34e0f0eeeb266eb35da98d5adb68b5281e9f81012N.exe 84 PID 5004 wrote to memory of 2352 5004 bda3de761c64ccf41be150e34e0f0eeeb266eb35da98d5adb68b5281e9f81012N.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\bda3de761c64ccf41be150e34e0f0eeeb266eb35da98d5adb68b5281e9f81012N.exe"C:\Users\Admin\AppData\Local\Temp\bda3de761c64ccf41be150e34e0f0eeeb266eb35da98d5adb68b5281e9f81012N.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Users\Admin\yuudiob.exe"C:\Users\Admin\yuudiob.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2352
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
140KB
MD581cc54723c52abc598861af2833a7b94
SHA1a11c4cf4a51b129effe0db49cf22960a4961ec4d
SHA25611b8e703f38500d35d22eea7183e03ce36d0cfe57ec52d27d65ecbbe9a5486cd
SHA512ffb2fc2c7ce55fb4ea8049566a5f6ac65fc9294944135240d92b9b22989a9c0472c74450b7452dde202d9f6c5dba1db8992fa640bb7cd6a174c4ec56d5fab216