Analysis
-
max time kernel
240s -
max time network
244s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
07-02-2025 14:34
Static task
static1
Behavioral task
behavioral1
Sample
yWorAvKu.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
yWorAvKu.exe
Resource
win10v2004-20241007-en
General
-
Target
yWorAvKu.exe
-
Size
1.0MB
-
MD5
acf7ad3cd2ff2f71d7aeaf8a78ee641e
-
SHA1
2c2dd1a2a5b9703737db85c2f5374955f0af5f06
-
SHA256
f25d6b99e30f5c689eb4e8112d5fa8a58529aeb36d6d9b7905b9e5eec94bdac4
-
SHA512
7db0d59d63e9d92c234fb9c374b910c7cfcec972e874a57a41e014d7786dea5da63d7a686750ac73a9c1ed568fff2a1f5426730bc953077c8f7851fb118dfd53
-
SSDEEP
24576:ZrORE29TTVx8aBRd1h1orq+GWE0Jc5bDTj1Vyv9Tva0h5z:Z2EYTb8atv1orq+pEiSDTj1VyvBa0h
Malware Config
Extracted
http://93.88.203.116/BagelsTR23
Extracted
http://93.88.203.116/jre-1.8.zip
Extracted
http://93.88.203.116/PopUp2023TR.pdf
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 4 2604 powershell.exe 7 2868 powershell.exe 8 2896 powershell.exe -
pid Process 2604 powershell.exe 2868 powershell.exe 2896 powershell.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2348 yWorAvKu.exe 2604 powershell.exe 2868 powershell.exe 2896 powershell.exe 2896 powershell.exe 2896 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1384 AcroRd32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2604 powershell.exe Token: SeDebugPrivilege 2868 powershell.exe Token: SeDebugPrivilege 2896 powershell.exe -
Suspicious use of FindShellTrayWindow 9 IoCs
pid Process 2348 yWorAvKu.exe 2348 yWorAvKu.exe 2348 yWorAvKu.exe 2348 yWorAvKu.exe 2348 yWorAvKu.exe 2348 yWorAvKu.exe 2348 yWorAvKu.exe 2348 yWorAvKu.exe 2348 yWorAvKu.exe -
Suspicious use of SendNotifyMessage 9 IoCs
pid Process 2348 yWorAvKu.exe 2348 yWorAvKu.exe 2348 yWorAvKu.exe 2348 yWorAvKu.exe 2348 yWorAvKu.exe 2348 yWorAvKu.exe 2348 yWorAvKu.exe 2348 yWorAvKu.exe 2348 yWorAvKu.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1384 AcroRd32.exe 1384 AcroRd32.exe 1384 AcroRd32.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2348 wrote to memory of 2604 2348 yWorAvKu.exe 30 PID 2348 wrote to memory of 2604 2348 yWorAvKu.exe 30 PID 2348 wrote to memory of 2604 2348 yWorAvKu.exe 30 PID 2348 wrote to memory of 2896 2348 yWorAvKu.exe 32 PID 2348 wrote to memory of 2896 2348 yWorAvKu.exe 32 PID 2348 wrote to memory of 2896 2348 yWorAvKu.exe 32 PID 2348 wrote to memory of 2868 2348 yWorAvKu.exe 33 PID 2348 wrote to memory of 2868 2348 yWorAvKu.exe 33 PID 2348 wrote to memory of 2868 2348 yWorAvKu.exe 33 PID 2896 wrote to memory of 1384 2896 powershell.exe 36 PID 2896 wrote to memory of 1384 2896 powershell.exe 36 PID 2896 wrote to memory of 1384 2896 powershell.exe 36 PID 2896 wrote to memory of 1384 2896 powershell.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\yWorAvKu.exe"C:\Users\Admin\AppData\Local\Temp\yWorAvKu.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\cKmpIwCkO.ps1"2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2604
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\TavnQURwkLXpRU.ps1"2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\TavnQURwkLXpRU.pdf"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1384
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\gJjfhvVkyrFF.ps1"2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2868
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD558201ad042b6b286a6dc1a37d71b4742
SHA11bf88a6fd953315c7617435b0dadd732d3305678
SHA25654e35e2363d5f6d6977e4adf74d2f0f72bd5d095574fd93157813bde4c2e1d5d
SHA5123dc2b64323e151922f7d609dac1da43dc54a5fe245033799a6ea107756f1ac5400378bfdf60bd54854168a249d388f0b1a6719da2b92e6fdf2ee510e1c26953b
-
Filesize
534B
MD5a64028a2acb1c58c00c5242946f58c9c
SHA1352e26e43c322db3b1643a8ffeb0fad0e5549259
SHA256c2d9264c4bde6225998c5da0201da0b6c8e7f48121cf55fd837d86ef6d4606fd
SHA512b1afac1dd3b10308377af2b03cd188aab2810e184b2d019f4bee77b8096fea69ffb37346ded7c13e3868855baf47a7d3cbeca72cc1cd22761c6c5896f123e47c
-
Filesize
646B
MD5ab621449b1acc88a3b374eea51d49c9a
SHA1bbf67121fdafbd76c8eeb7c09f201bf2c1090db7
SHA2568120e4693352d587b506bff96b066700a6192cfa916090fa6c6ead29c5511aa6
SHA512847bd5af9c20bc29c0828bb8cb75b8bef2a8cd462d4e12dbb363d54f5e783d1c71006171fe4e78d3a9dfca9a56385422a8468d52692be40b97f41e0b0e4a21f9
-
Filesize
1KB
MD5dd4cd8a5a68c798ff62b7f9f0ec5e724
SHA16531ce5997564834f3c6341639af46c23bbdd3ab
SHA2561337813ba48522510ee97329f25325813f82592b4c8ca53bc6fa864484366184
SHA51244b866a549487144ffa6338b4600ba75f5eecebcf60c2027cd90f27216c009548532c64e2088fd444b20828abb2ae31b0632d2f883e95c8a3a2ce05c0c2d6529
-
Filesize
3KB
MD5a2451738b524cc91f0ab07edf7ddedc3
SHA1e7c5b56a7e977f619e8320013f64e458aadb6750
SHA2565d1f3a9b00c217bbdcc3818f6fbc76900ba55945b23cad4cad4192fb0313ca16
SHA5121ed7be1a13ef4dfcc416d765aeb4f5291390a98b57cc71b4abacf1e98f210750024434d535146acd97c253c725b07e5b788f9efe3de6efa00a08aa24a51b19c3
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5f10496c6da2c8c1542f74b99103d0ecf
SHA12bed59d9a6f1e7148e23133dbd4fecd1449f62c2
SHA2566da1e5c889737a787c2a9e2e1e6147333e95217628fd13eaefa9863a8e09f2f3
SHA512da71824b0f947ee363a48993b0b056836641666323a896ca289e12a5fe3d9e69af3766b03a3bee6b4cb05882dbb9658576bc34e39eff8778743dbf73ec3c7253