Windows Analysis Report
YBuzMywtqU.exe

Overview

General Information

Sample name: YBuzMywtqU.exe
renamed because original name is a hash value
Original sample name: win_graphical_proton_dc79c213a28493bb4ba2c8e274696a41530a5983c7a3586b31ff69a5291754e6.exe
Analysis ID: 1431551
MD5: a74514a8689c48fdd73fe4a340802ed0
SHA1: aa6b986f6307efe38d25e2140ed3b1c3ef396c4b
SHA256: dc79c213a28493bb4ba2c8e274696a41530a5983c7a3586b31ff69a5291754e6
Tags: apt29exegraphicalprotonunpacked
Infos:

Detection

Score: 52
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Multi AV Scanner detection for submitted file
Found direct / indirect Syscall (likely to bypass EDR)
Contains functionality to dynamically determine API calls
Detected potential crypto function
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)

Classification

AV Detection

barindex
Source: YBuzMywtqU.exe Virustotal: Detection: 11% Perma Link
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global traffic DNS traffic detected: DNS query: login.microsoftonline.com
Source: YBuzMywtqU.exe, 00000000.00000003.2086127232.0000000002CC5000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://crl.micro
Source: YBuzMywtqU.exe, 00000000.00000003.2086127232.0000000002CC5000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: http://crl.microsoft
Source: YBuzMywtqU.exe, 00000000.00000002.3325000916.0000000000587000.00000004.00000020.00020000.00000000.sdmp, YBuzMywtqU.exe, 00000000.00000003.2631249631.0000000000587000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.microsoftonline.com/
Source: YBuzMywtqU.exe, 00000000.00000002.3325000916.0000000000587000.00000004.00000020.00020000.00000000.sdmp, YBuzMywtqU.exe, 00000000.00000003.2631249631.0000000000587000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.microsoftonline.com/8/I
Source: YBuzMywtqU.exe, 00000000.00000002.3325000916.0000000000587000.00000004.00000020.00020000.00000000.sdmp, YBuzMywtqU.exe, 00000000.00000003.2631230487.00000000005F2000.00000004.00000020.00020000.00000000.sdmp, YBuzMywtqU.exe, 00000000.00000002.3324875055.0000000000534000.00000004.00000020.00020000.00000000.sdmp, YBuzMywtqU.exe, 00000000.00000003.2086127232.0000000002CC5000.00000004.00000001.00020000.00000000.sdmp, YBuzMywtqU.exe, 00000000.00000003.2631249631.0000000000587000.00000004.00000020.00020000.00000000.sdmp, YBuzMywtqU.exe, 00000000.00000002.3325069493.00000000005F3000.00000004.00000020.00020000.00000000.sdmp, YBuzMywtqU.exe, 00000000.00000002.3325254749.0000000002CC0000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://login.microsoftonline.com/common/oauth2/v2.0/token
Source: YBuzMywtqU.exe, 00000000.00000003.2086127232.0000000002CC5000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://login.microsoftonline.com/common/oauth2/v2.0/token0
Source: YBuzMywtqU.exe, 00000000.00000003.2631249631.00000000005A4000.00000004.00000020.00020000.00000000.sdmp, YBuzMywtqU.exe, 00000000.00000002.3325000916.00000000005A4000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.microsoftonline.com/common/oauth2/v2.0/token03
Source: YBuzMywtqU.exe, 00000000.00000002.3325000916.0000000000587000.00000004.00000020.00020000.00000000.sdmp, YBuzMywtqU.exe, 00000000.00000003.2631249631.0000000000587000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.microsoftonline.com/common/oauth2/v2.0/token3-
Source: YBuzMywtqU.exe, 00000000.00000002.3325000916.0000000000587000.00000004.00000020.00020000.00000000.sdmp, YBuzMywtqU.exe, 00000000.00000003.2631249631.0000000000587000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.microsoftonline.com/common/oauth2/v2.0/tokenK-
Source: YBuzMywtqU.exe, 00000000.00000003.2631230487.00000000005F2000.00000004.00000020.00020000.00000000.sdmp, YBuzMywtqU.exe, 00000000.00000002.3325069493.00000000005F3000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.microsoftonline.com/common/oauth2/v2.0/tokenSY
Source: YBuzMywtqU.exe, 00000000.00000002.3325254749.0000000002CC0000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://login.microsoftonline.com/common/oauth2/v2.0/tokenlt
Source: YBuzMywtqU.exe, 00000000.00000002.3325254749.0000000002CC0000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://login.microsoftonline.com/common/oauth2/v2.0/tokenltificate
Source: YBuzMywtqU.exe, 00000000.00000003.2086127232.0000000002CC5000.00000004.00000001.00020000.00000000.sdmp String found in binary or memory: https://login.microsoftonline.com/common/oauth2/v2.0/tokenou
Source: YBuzMywtqU.exe, 00000000.00000002.3325000916.00000000005A4000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.microsoftonline.com/error?code=70000
Source: YBuzMywtqU.exe, 00000000.00000002.3325000916.0000000000587000.00000004.00000020.00020000.00000000.sdmp, YBuzMywtqU.exe, 00000000.00000003.2631249631.0000000000587000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.microsoftonline.com/osoftonline.com/5)6
Source: C:\Users\user\Desktop\YBuzMywtqU.exe Code function: 0_3_02160000 0_3_02160000
Source: classification engine Classification label: mal52.evad.winEXE@2/0@1/0
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1100:120:WilError_03
Source: YBuzMywtqU.exe Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\YBuzMywtqU.exe Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: YBuzMywtqU.exe Virustotal: Detection: 11%
Source: unknown Process created: C:\Users\user\Desktop\YBuzMywtqU.exe "C:\Users\user\Desktop\YBuzMywtqU.exe"
Source: C:\Users\user\Desktop\YBuzMywtqU.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\YBuzMywtqU.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\Desktop\YBuzMywtqU.exe Section loaded: urlmon.dll Jump to behavior
Source: C:\Users\user\Desktop\YBuzMywtqU.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Users\user\Desktop\YBuzMywtqU.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Users\user\Desktop\YBuzMywtqU.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Users\user\Desktop\YBuzMywtqU.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Users\user\Desktop\YBuzMywtqU.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Users\user\Desktop\YBuzMywtqU.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\Desktop\YBuzMywtqU.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Users\user\Desktop\YBuzMywtqU.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\Desktop\YBuzMywtqU.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\Desktop\YBuzMywtqU.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Users\user\Desktop\YBuzMywtqU.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\Desktop\YBuzMywtqU.exe Section loaded: winhttp.dll Jump to behavior
Source: C:\Users\user\Desktop\YBuzMywtqU.exe Section loaded: mswsock.dll Jump to behavior
Source: C:\Users\user\Desktop\YBuzMywtqU.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Users\user\Desktop\YBuzMywtqU.exe Section loaded: winnsi.dll Jump to behavior
Source: C:\Users\user\Desktop\YBuzMywtqU.exe Section loaded: dnsapi.dll Jump to behavior
Source: C:\Users\user\Desktop\YBuzMywtqU.exe Section loaded: rasadhlp.dll Jump to behavior
Source: C:\Users\user\Desktop\YBuzMywtqU.exe Section loaded: fwpuclnt.dll Jump to behavior
Source: C:\Users\user\Desktop\YBuzMywtqU.exe Section loaded: schannel.dll Jump to behavior
Source: C:\Users\user\Desktop\YBuzMywtqU.exe Section loaded: mskeyprotect.dll Jump to behavior
Source: C:\Users\user\Desktop\YBuzMywtqU.exe Section loaded: ntasn1.dll Jump to behavior
Source: C:\Users\user\Desktop\YBuzMywtqU.exe Section loaded: msasn1.dll Jump to behavior
Source: C:\Users\user\Desktop\YBuzMywtqU.exe Section loaded: dpapi.dll Jump to behavior
Source: C:\Users\user\Desktop\YBuzMywtqU.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Users\user\Desktop\YBuzMywtqU.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Users\user\Desktop\YBuzMywtqU.exe Section loaded: gpapi.dll Jump to behavior
Source: C:\Users\user\Desktop\YBuzMywtqU.exe Section loaded: ncrypt.dll Jump to behavior
Source: C:\Users\user\Desktop\YBuzMywtqU.exe Section loaded: ncryptsslp.dll Jump to behavior
Source: C:\Users\user\Desktop\YBuzMywtqU.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32 Jump to behavior
Source: YBuzMywtqU.exe Static PE information: Virtual size of .text is bigger than: 0x100000
Source: YBuzMywtqU.exe Static PE information: Image base 0x140000000 > 0x60000000
Source: YBuzMywtqU.exe Static file information: File size 1412096 > 1048576
Source: YBuzMywtqU.exe Static PE information: Raw size of .text is bigger than: 0x100000 < 0x117400
Source: C:\Users\user\Desktop\YBuzMywtqU.exe Code function: 0_2_00000001400F6C6C LoadLibraryW,GetProcAddressForCaller, 0_2_00000001400F6C6C
Source: YBuzMywtqU.exe Static PE information: section name: .00cfg
Source: YBuzMywtqU.exe Static PE information: section name: .gehcont
Source: YBuzMywtqU.exe Static PE information: section name: _RDATA
Source: C:\Users\user\Desktop\YBuzMywtqU.exe Registry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdate Jump to behavior
Source: C:\Users\user\Desktop\YBuzMywtqU.exe Registry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot Jump to behavior
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: YBuzMywtqU.exe, 00000000.00000003.2631249631.00000000005A4000.00000004.00000020.00020000.00000000.sdmp, YBuzMywtqU.exe, 00000000.00000002.3324875055.0000000000565000.00000004.00000020.00020000.00000000.sdmp, YBuzMywtqU.exe, 00000000.00000002.3325000916.00000000005A4000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW
Source: C:\Users\user\Desktop\YBuzMywtqU.exe Code function: 0_2_00000001400F6C6C LoadLibraryW,GetProcAddressForCaller, 0_2_00000001400F6C6C

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\YBuzMywtqU.exe NtQueryInformationToken: Direct from: 0x1400616AC Jump to behavior
Source: C:\Users\user\Desktop\YBuzMywtqU.exe NtProtectVirtualMemory: Direct from: 0x1400619AA Jump to behavior
Source: C:\Users\user\Desktop\YBuzMywtqU.exe NtMapViewOfSection: Direct from: 0x140017816 Jump to behavior
Source: C:\Users\user\Desktop\YBuzMywtqU.exe NtProtectVirtualMemory: Direct from: 0x14001804B Jump to behavior
Source: C:\Users\user\Desktop\YBuzMywtqU.exe NtAllocateVirtualMemory: Direct from: 0x140061CA5 Jump to behavior
Source: C:\Users\user\Desktop\YBuzMywtqU.exe NtProtectVirtualMemory: Direct from: 0x140017A30 Jump to behavior
Source: C:\Users\user\Desktop\YBuzMywtqU.exe NtAllocateVirtualMemory: Direct from: 0x1400038A1 Jump to behavior
Source: C:\Users\user\Desktop\YBuzMywtqU.exe NtAllocateVirtualMemory: Direct from: 0x216034F Jump to behavior
Source: C:\Users\user\Desktop\YBuzMywtqU.exe NtAllocateVirtualMemory: Direct from: 0x21603A3 Jump to behavior
Source: C:\Users\user\Desktop\YBuzMywtqU.exe NtDeviceIoControlFile: Direct from: 0x140064861 Jump to behavior
Source: C:\Users\user\Desktop\YBuzMywtqU.exe NtProtectVirtualMemory: Direct from: 0x1400180A7 Jump to behavior
Source: C:\Users\user\Desktop\YBuzMywtqU.exe NtAllocateVirtualMemory: Direct from: 0x1400F476C Jump to behavior
Source: C:\Users\user\Desktop\YBuzMywtqU.exe NtProtectVirtualMemory: Direct from: 0x2160AE3 Jump to behavior
Source: C:\Users\user\Desktop\YBuzMywtqU.exe NtCreateFile: Direct from: 0x1400177A5 Jump to behavior
Source: C:\Users\user\Desktop\YBuzMywtqU.exe NtSetSecurityObject: Direct from: 0x7FF8C88A26A1 Jump to behavior
Source: C:\Users\user\Desktop\YBuzMywtqU.exe NtAllocateVirtualMemory: Direct from: 0x2160379 Jump to behavior
Source: C:\Users\user\Desktop\YBuzMywtqU.exe NtAllocateVirtualMemory: Direct from: 0x14006114D Jump to behavior
Source: C:\Users\user\Desktop\YBuzMywtqU.exe NtAllocateVirtualMemory: Direct from: 0x7FF8C88C4B5E Jump to behavior
Source: C:\Users\user\Desktop\YBuzMywtqU.exe NtProtectVirtualMemory: Direct from: 0x2140265 Jump to behavior
Source: C:\Users\user\Desktop\YBuzMywtqU.exe NtAllocateVirtualMemory: Direct from: 0x21403A3 Jump to behavior
Source: C:\Users\user\Desktop\YBuzMywtqU.exe NtAllocateVirtualMemory: Direct from: 0x214034F Jump to behavior
Source: C:\Users\user\Desktop\YBuzMywtqU.exe NtWriteVirtualMemory: Direct from: 0x14001807E Jump to behavior
Source: C:\Users\user\Desktop\YBuzMywtqU.exe NtProtectVirtualMemory: Direct from: 0x140017989 Jump to behavior
Source: C:\Users\user\Desktop\YBuzMywtqU.exe NtAllocateVirtualMemory: Direct from: 0x140004874 Jump to behavior
Source: C:\Users\user\Desktop\YBuzMywtqU.exe NtProtectVirtualMemory: Direct from: 0x1400623CA Jump to behavior
Source: C:\Users\user\Desktop\YBuzMywtqU.exe NtProtectVirtualMemory: Direct from: 0x140061F3A Jump to behavior
Source: C:\Users\user\Desktop\YBuzMywtqU.exe NtAllocateVirtualMemory: Direct from: 0x2140379 Jump to behavior
Source: C:\Users\user\Desktop\YBuzMywtqU.exe NtProtectVirtualMemory: Direct from: 0x1400048CC Jump to behavior
Source: C:\Users\user\Desktop\YBuzMywtqU.exe NtProtectVirtualMemory: Direct from: 0x2160265 Jump to behavior
No contacted IP infos