PUP.Ypack.B
Table of Contents
Analysis Report
General information
| Family Name: | PUP.Ypack.B |
|---|---|
| Signature status: | Self Signed |
Known Samples
Known Samples
This section lists other file samples believed to be associated with this family.|
MD5:
4d8d9898b584e77e4877cca0a1ec9c61
SHA1:
6d152b01b76690f7d8e73328dc0c683f0fc5e9bf
SHA256:
5795924878090C54ABFB5D64B6C7AD3F20E135DE7573E1714A47DA3A47F0A5BF
File Size:
3.31 MB, 3305824 bytes
|
|
MD5:
1b1eab6241c83c69c8635c5552b31488
SHA1:
554385d554a1bf5d8a7c58ae20ede7284f215871
SHA256:
AEC1F9C2F1886DE89C45EA6911B2225720C864A564387C29ED48923A747EF5D0
File Size:
9.46 MB, 9456640 bytes
|
|
MD5:
42cd8341f4d04cb98518c64bc95a07fd
SHA1:
89c977296e5ee49e49f6c75970cc9b5768870d00
SHA256:
FDE1B270C0D80B381BB4DC535FE9657FD7D0EB71A483C2ABC94D345906BF294C
File Size:
9.46 MB, 9456128 bytes
|
|
MD5:
fea07ecb2be0e9caef3e5757e4f0deaa
SHA1:
343aaed09c956ef92a13da6c632f4f9c1acef4f6
SHA256:
ABAE05F38D9FFDA8749F631A868C90A417B5FFB70F4A10AB10A63391588EE2A2
File Size:
430.38 KB, 430376 bytes
|
|
MD5:
1dfca51cbbccb7bc6396fe0e4cb7428f
SHA1:
f728e0b3c034b586fdfe20aa63d7e855645fd472
SHA256:
E249D09956AA2EF44DB6A3CDAB525ABB73D01E7AD46BD83984E0D22D71C9DCC6
File Size:
266.38 KB, 266376 bytes
|
Show More
|
MD5:
13b57b6a7de88d20dee95bfc5810a602
SHA1:
1e72956d33ee599e0e5f41506d20081908a1368e
SHA256:
E49D1C877A146C1FAEC638BA833BA00725573C6B1C1854B8CC9C6830D849E298
File Size:
8.25 MB, 8254304 bytes
|
Windows Portable Executable Attributes
- File doesn't have "Rich" header
- File doesn't have exports table
- File doesn't have relocations information
- File has TLS information
- File is 32-bit executable
- File is either console or GUI application
- File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
- File is Native application (NOT .NET application)
- File is not packed
- IMAGE_FILE_DLL is not set inside PE header (Executable)
Show More
- IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)
File Icons
File Icons
This section displays icon resources found within family samples. Malware often replicates icons commonly associated with legitimate software to mislead users into believing the malware is safe.Windows PE Version Information
Windows PE Version Information
This section displays values and attributes that have been set in the Windows file version information data structure for samples within this family. To mislead users, malware actors often add fake version information mimicking legitimate software.| Name | Value |
|---|---|
| Company Name |
|
| File Description |
|
| File Version |
|
| Internal Name |
|
| Legal Copyright |
|
| Legal Trademarks1 | Microsoft® is a registered trademark of Microsoft Corporation. |
| Legal Trademarks2 | Windows® is a registered trademark of Microsoft Corporation. |
| Original Filename |
|
| Product Name |
|
| Product Version |
|
Digital Signatures
Digital Signatures
This section lists digital signatures that are attached to samples within this family. When analyzing and verifying digital signatures, it is important to confirm that the signature’s root authority is a well-known and trustworthy entity and that the status of the signature is good. Malware is often signed with non-trustworthy “Self Signed” digital signatures (which can be easily created by a malware author with no verification). Malware may also be signed by legitimate signatures that have an invalid status, and by signatures from questionable root authorities with fake or misleading “Signer” names.| Signer | Root | Status |
|---|---|---|
| Air Smart Advertising Solutions FZ-LLC | Air Smart Advertising Solutions FZ-LLC | Self Signed |
| YANDEX LLC | GlobalSign CodeSigning CA - G2 | Self Signed |
| YANDEX LLC | GlobalSign CodeSigning CA - SHA256 - G2 | Self Signed |
| Yandex LLC | Yandex LLC | Self Signed |
File Traits
- HighEntropy
- Installer Manifest
- No Version Info
- x86
Block Information
Block Information
During analysis, EnigmaSoft breaks file samples into logical blocks for classification and comparison with other samples. Blocks can be used to generate malware detection rules and to group file samples into families based on shared source code, functionality and other distinguishing attributes and characteristics. This section lists a summary of this block data, as well as its classification by EnigmaSoft. A visual representation of the block data is also displayed, where available.Similar Families
Similar Families
This section lists other families that share similarities with this family, based on EnigmaSoft’s analysis. Many malware families are created from the same malware toolkits and use the same packing and encryption techniques but uniquely extend functionality. Similar families may also share source code, attributes, icons, subcomponents, compromised and/or invalid digital signatures, and network characteristics. Researchers leverage these similarities to rapidly and effectively triage file samples and extend malware detection rules.- Ypack.B
Files Modified
Files Modified
This section lists files that were created, modified, moved and/or deleted by samples in this family. File system activity can provide valuable insight into how malware functions on the operating system.| File | Attributes |
|---|---|
| \device\namedpipe\wkssvc | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\343aaed09c956ef92a13da6c632f4f9c1acef4f6_0000430376@8008.log | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\343aaed09c956ef92a13da6c632f4f9c1acef4f6_0000430376@8008.log | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\f728e0b3c034b586fdfe20aa63d7e855645fd472_0000266376@2340.log | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\f728e0b3c034b586fdfe20aa63d7e855645fd472_0000266376@2340.log | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\yandexsearch00000.log | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\{5b964e0e-b9a3-4276-9ed9-4d5a5720747a}\yandexsearch.msi | Generic Write,Read Attributes |
| c:\users\user\appdata\roaming\yandex\ui | Generic Write,Read Attributes |
| c:\users\user\downloads\temp\shsandbox-win32.dll-5.22.1.9999-x86.dmp | Generic Read,Write Data,Write Attributes,Write extended,Append data |
Registry Modifications
Registry Modifications
This section lists registry keys and values that were created, modified and/or deleted by samples in this family. Windows Registry activity can provide valuable insight into malware functionality. Additionally, malware often creates registry values to allow itself to automatically start and indefinitely persist after an initial infection has compromised the system.| Key::Value | Data | API Name |
|---|---|---|
| HKLM\software\microsoft\systemcertificates\authroot\certificates\d69b561148f01c77c54578c10926df5b856976ad::blob | ⥒ᖺ᮳漌쩌슉冘靷❃뛑ꎉ㖹붠喗꼲ꬢ T 到ࠆثԁ܅ȃࠆثԁ܅̃ਆثЁ舁Ѓࠆثԁ܅Ѓࠆثԁ܅ࠆثԁ܅܃ࠆثԁ܅ăࠆثԁ܅ࠃS @ 㸰ἰआثЁꀁIJ、〒ؐ⬊ĆĄ㞂ļ́ダ؛朅ಁ́ሰူਆثЁ舁㰷āȃ쀀 0 GlobalSign Roo | RegNtPreCreateKey |
| HKLM\software\microsoft\systemcertificates\authroot\certificates\d69b561148f01c77c54578c10926df5b856976ad::blob | RegNtPreCreateKey | |
| HKLM\software\microsoft\systemcertificates\authroot\certificates\d69b561148f01c77c54578c10926df5b856976ad::blob | 鰼സ敻毢㾚폭辛 ⥒ᖺ᮳漌쩌슉冘靷❃뛑ꎉ㖹붠喗꼲ꬢ T 到ࠆثԁ܅ȃࠆثԁ܅̃ਆثЁ舁Ѓࠆثԁ܅Ѓࠆثԁ܅ࠆثԁ܅܃ࠆثԁ܅ăࠆثԁ܅ࠃS @ 㸰ἰआثЁꀁIJ、〒ؐ⬊ĆĄ㞂ļ́ダ؛朅ಁ́ሰူਆثЁ舁㰷āȃ쀀 0 | RegNtPreCreateKey |
| HKLM\software\microsoft\systemcertificates\authroot\certificates\d69b561148f01c77c54578c10926df5b856976ad::blob | RegNtPreCreateKey | |
| HKLM\software\microsoft\systemcertificates\authroot\certificates\0563b8630d62d75abbc8ab1e4bdfb5a899b24d43::blob | 캇笋สI壡魱꠷犓 쩭큛켍༜瀲퍙뉴ꚜ엣ꘊS @ 㸰ἰआ虠ňﶆɬ、〒ؐ⬊ĆĄ㞂ļ́ダ؛朅ಁ́ሰူਆثЁ舁㰷āȃ쀀 4 ㈰ࠆثԁ܅ȃࠆثԁ܅̃ࠆثԁ܅Ѓࠆثԁ܅ăࠆثԁ܅ࠃb 逾떙币䢏lᆝ﨡㖺襚槟Ṗ옽尲 | RegNtPreCreateKey |
| HKLM\software\microsoft\systemcertificates\authroot\certificates\0563b8630d62d75abbc8ab1e4bdfb5a899b24d43::blob | RegNtPreCreateKey | |
| HKCU\software\appdatalow\yandex::uicreated_user | RegNtPreCreateKey | |
| HKLM\software\microsoft\systemcertificates\authroot\certificates\d69b561148f01c77c54578c10926df5b856976ad::blob | RegNtPreCreateKey | |
| HKLM\software\microsoft\systemcertificates\authroot\certificates\d69b561148f01c77c54578c10926df5b856976ad::blob | RegNtPreCreateKey |
Windows API Usage
Windows API Usage
This section lists Windows API calls that are used by the samples in this family. Windows API usage analysis is a valuable tool that can help identify malicious activity, such as keylogging, security privilege escalation, data encryption, data exfiltration, interference with antivirus software, and network request manipulation.| Category | API |
|---|---|
| Anti Debug |
|
| User Data Access |
|
| Other Suspicious |
|
| Encryption Used |
|
| Network Winhttp |
|
| Process Manipulation Evasion |
|