Analysis
-
max time kernel
120s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22/11/2024, 18:42
Static task
static1
Behavioral task
behavioral1
Sample
de5a463ab460f8d517a678001b0532dfe1a9f40bf0de2a5c77d4631cb08b6304N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
de5a463ab460f8d517a678001b0532dfe1a9f40bf0de2a5c77d4631cb08b6304N.exe
Resource
win10v2004-20241007-en
General
-
Target
de5a463ab460f8d517a678001b0532dfe1a9f40bf0de2a5c77d4631cb08b6304N.exe
-
Size
60KB
-
MD5
cf254bd70e12a2268931fff43de470e0
-
SHA1
811c8dd65ec4f0d45a0d334a6dac1f9de4a3b634
-
SHA256
de5a463ab460f8d517a678001b0532dfe1a9f40bf0de2a5c77d4631cb08b6304
-
SHA512
7a173a8a7cf414ba28edb64fa8d88608e4dd39eca47caed3d378f04e49ee839aa7693be0c09c76a407758dc835a2cffdb7f7b9da5a88e032c24000d862132886
-
SSDEEP
1536:ysSH2LffjwHIG571Zpw25L0zF/w12T30S5z4+:gkffMHdZpw2dO/w12Tk3+
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" youbo.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation de5a463ab460f8d517a678001b0532dfe1a9f40bf0de2a5c77d4631cb08b6304N.exe -
Executes dropped EXE 1 IoCs
pid Process 1860 youbo.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\youbo = "C:\\Users\\Admin\\youbo.exe" youbo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language de5a463ab460f8d517a678001b0532dfe1a9f40bf0de2a5c77d4631cb08b6304N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language youbo.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1860 youbo.exe 1860 youbo.exe 1860 youbo.exe 1860 youbo.exe 1860 youbo.exe 1860 youbo.exe 1860 youbo.exe 1860 youbo.exe 1860 youbo.exe 1860 youbo.exe 1860 youbo.exe 1860 youbo.exe 1860 youbo.exe 1860 youbo.exe 1860 youbo.exe 1860 youbo.exe 1860 youbo.exe 1860 youbo.exe 1860 youbo.exe 1860 youbo.exe 1860 youbo.exe 1860 youbo.exe 1860 youbo.exe 1860 youbo.exe 1860 youbo.exe 1860 youbo.exe 1860 youbo.exe 1860 youbo.exe 1860 youbo.exe 1860 youbo.exe 1860 youbo.exe 1860 youbo.exe 1860 youbo.exe 1860 youbo.exe 1860 youbo.exe 1860 youbo.exe 1860 youbo.exe 1860 youbo.exe 1860 youbo.exe 1860 youbo.exe 1860 youbo.exe 1860 youbo.exe 1860 youbo.exe 1860 youbo.exe 1860 youbo.exe 1860 youbo.exe 1860 youbo.exe 1860 youbo.exe 1860 youbo.exe 1860 youbo.exe 1860 youbo.exe 1860 youbo.exe 1860 youbo.exe 1860 youbo.exe 1860 youbo.exe 1860 youbo.exe 1860 youbo.exe 1860 youbo.exe 1860 youbo.exe 1860 youbo.exe 1860 youbo.exe 1860 youbo.exe 1860 youbo.exe 1860 youbo.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4436 de5a463ab460f8d517a678001b0532dfe1a9f40bf0de2a5c77d4631cb08b6304N.exe 1860 youbo.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4436 wrote to memory of 1860 4436 de5a463ab460f8d517a678001b0532dfe1a9f40bf0de2a5c77d4631cb08b6304N.exe 86 PID 4436 wrote to memory of 1860 4436 de5a463ab460f8d517a678001b0532dfe1a9f40bf0de2a5c77d4631cb08b6304N.exe 86 PID 4436 wrote to memory of 1860 4436 de5a463ab460f8d517a678001b0532dfe1a9f40bf0de2a5c77d4631cb08b6304N.exe 86 PID 1860 wrote to memory of 4436 1860 youbo.exe 81 PID 1860 wrote to memory of 4436 1860 youbo.exe 81 PID 1860 wrote to memory of 4436 1860 youbo.exe 81 PID 1860 wrote to memory of 4436 1860 youbo.exe 81 PID 1860 wrote to memory of 4436 1860 youbo.exe 81 PID 1860 wrote to memory of 4436 1860 youbo.exe 81 PID 1860 wrote to memory of 4436 1860 youbo.exe 81 PID 1860 wrote to memory of 4436 1860 youbo.exe 81 PID 1860 wrote to memory of 4436 1860 youbo.exe 81 PID 1860 wrote to memory of 4436 1860 youbo.exe 81 PID 1860 wrote to memory of 4436 1860 youbo.exe 81 PID 1860 wrote to memory of 4436 1860 youbo.exe 81 PID 1860 wrote to memory of 4436 1860 youbo.exe 81 PID 1860 wrote to memory of 4436 1860 youbo.exe 81 PID 1860 wrote to memory of 4436 1860 youbo.exe 81 PID 1860 wrote to memory of 4436 1860 youbo.exe 81 PID 1860 wrote to memory of 4436 1860 youbo.exe 81 PID 1860 wrote to memory of 4436 1860 youbo.exe 81 PID 1860 wrote to memory of 4436 1860 youbo.exe 81 PID 1860 wrote to memory of 4436 1860 youbo.exe 81 PID 1860 wrote to memory of 4436 1860 youbo.exe 81 PID 1860 wrote to memory of 4436 1860 youbo.exe 81 PID 1860 wrote to memory of 4436 1860 youbo.exe 81 PID 1860 wrote to memory of 4436 1860 youbo.exe 81 PID 1860 wrote to memory of 4436 1860 youbo.exe 81 PID 1860 wrote to memory of 4436 1860 youbo.exe 81 PID 1860 wrote to memory of 4436 1860 youbo.exe 81 PID 1860 wrote to memory of 4436 1860 youbo.exe 81 PID 1860 wrote to memory of 4436 1860 youbo.exe 81 PID 1860 wrote to memory of 4436 1860 youbo.exe 81 PID 1860 wrote to memory of 4436 1860 youbo.exe 81 PID 1860 wrote to memory of 4436 1860 youbo.exe 81 PID 1860 wrote to memory of 4436 1860 youbo.exe 81 PID 1860 wrote to memory of 4436 1860 youbo.exe 81 PID 1860 wrote to memory of 4436 1860 youbo.exe 81 PID 1860 wrote to memory of 4436 1860 youbo.exe 81 PID 1860 wrote to memory of 4436 1860 youbo.exe 81 PID 1860 wrote to memory of 4436 1860 youbo.exe 81 PID 1860 wrote to memory of 4436 1860 youbo.exe 81 PID 1860 wrote to memory of 4436 1860 youbo.exe 81 PID 1860 wrote to memory of 4436 1860 youbo.exe 81 PID 1860 wrote to memory of 4436 1860 youbo.exe 81 PID 1860 wrote to memory of 4436 1860 youbo.exe 81 PID 1860 wrote to memory of 4436 1860 youbo.exe 81 PID 1860 wrote to memory of 4436 1860 youbo.exe 81 PID 1860 wrote to memory of 4436 1860 youbo.exe 81 PID 1860 wrote to memory of 4436 1860 youbo.exe 81 PID 1860 wrote to memory of 4436 1860 youbo.exe 81 PID 1860 wrote to memory of 4436 1860 youbo.exe 81 PID 1860 wrote to memory of 4436 1860 youbo.exe 81 PID 1860 wrote to memory of 4436 1860 youbo.exe 81 PID 1860 wrote to memory of 4436 1860 youbo.exe 81 PID 1860 wrote to memory of 4436 1860 youbo.exe 81 PID 1860 wrote to memory of 4436 1860 youbo.exe 81 PID 1860 wrote to memory of 4436 1860 youbo.exe 81 PID 1860 wrote to memory of 4436 1860 youbo.exe 81 PID 1860 wrote to memory of 4436 1860 youbo.exe 81 PID 1860 wrote to memory of 4436 1860 youbo.exe 81 PID 1860 wrote to memory of 4436 1860 youbo.exe 81 PID 1860 wrote to memory of 4436 1860 youbo.exe 81 PID 1860 wrote to memory of 4436 1860 youbo.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\de5a463ab460f8d517a678001b0532dfe1a9f40bf0de2a5c77d4631cb08b6304N.exe"C:\Users\Admin\AppData\Local\Temp\de5a463ab460f8d517a678001b0532dfe1a9f40bf0de2a5c77d4631cb08b6304N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Users\Admin\youbo.exe"C:\Users\Admin\youbo.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1860
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5ad13a4a2bf19cb9356a8a7e56d36a345
SHA130ccb86d3532b8324f53ed1a4921af0f3d6e768b
SHA256c59b33d1ff14fc665f36455e1f8f14a89b032b712b121d5e1622b416caf7bfd0
SHA512b8dd5350258b5875d951023cbb69455fa32229de70712609f28f8a28281206e5e337278ae80e956e9d1c3761cda85e5f8dfca802eeb79dec2d24031bc7b93e43