Trojan.MSIL.Krypt.YAGR
Table of Contents
Analysis Report
General information
| Family Name: | Trojan.MSIL.Krypt.YAGR |
|---|---|
| Signature status: | No Signature |
Known Samples
Known Samples
This section lists other file samples believed to be associated with this family.|
MD5:
1851dc48b25b34d01dce54dd74e1a7f0
SHA1:
ba240969db2c865063a75f8186f2fc83860d52ae
SHA256:
A21EA3BE11DAB8FF00566411BCA41EA6C635AC29ED71BCA8274DA560387701C9
File Size:
237.57 KB, 237568 bytes
|
|
MD5:
7c968b3c5b474607fe2ba1d998d2e68b
SHA1:
7def8f6562006e1e6ba46c4cf6a315fc1e5a5c84
SHA256:
F7927714DDEFA45C1DCE30F54E1E9DD405BC4DF8ED2B6717F85B65C36F82E6DB
File Size:
238.08 KB, 238080 bytes
|
|
MD5:
52ed58414c9385c1419d25ce8e7c7470
SHA1:
10347954b28abd70b310394568a9f866c572ce17
SHA256:
ACF2CCDC79812724088FABA738E2C5C7E90F1A123A4F5768049598294386CB6F
File Size:
767.49 KB, 767488 bytes
|
|
MD5:
e11050ad2344966429e9a3e1f2de7f01
SHA1:
bf19623702c28c8dcc8d2427af5fdb8f280b8123
SHA256:
1A439B3701F1C48F1F437238CAE021D0B8511A3D3EE91A24D50D91A413BE31CF
File Size:
260.10 KB, 260096 bytes
|
|
MD5:
afc7e7ba33fba55805881d5dab525240
SHA1:
5bc8bab48f8e79c15f284f738b9eb016746ce8b6
SHA256:
771FF1A6C26C0D685708D42E1944F1E71769A353E67FD9C7A27452F1FFB6914A
File Size:
232.96 KB, 232960 bytes
|
Show More
|
MD5:
889fb295e41ba717b142e0550177d28d
SHA1:
45ebf61a87178b34bcdfcd0b357dc8c056de4148
SHA256:
7EB8ABBE117E5387B888F951FD617F1C89A2F242064C0A4068EDB067FBFF8431
File Size:
3.09 MB, 3090343 bytes
|
|
MD5:
af74393459340f474dcf388e99578731
SHA1:
b5aff129e5d0ac5d50eefbee0d6927cd94b48739
SHA256:
763A17480F0161745104ECA863584F2B09594EF8A3AC8FD79F306D1A90ED38F1
File Size:
239.62 KB, 239616 bytes
|
Windows Portable Executable Attributes
- File doesn't have "Rich" header
- File doesn't have debug information
- File doesn't have exports table
- File doesn't have security information
- File has exports table
- File has TLS information
- File is .NET application
- File is 32-bit executable
- File is 64-bit executable
- File is either console or GUI application
Show More
- File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
- File is Native application (NOT .NET application)
- File is not packed
- IMAGE_FILE_DLL is not set inside PE header (Executable)
- IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)
File Icons
File Icons
This section displays icon resources found within family samples. Malware often replicates icons commonly associated with legitimate software to mislead users into believing the malware is safe.Windows PE Version Information
Windows PE Version Information
This section displays values and attributes that have been set in the Windows file version information data structure for samples within this family. To mislead users, malware actors often add fake version information mimicking legitimate software.| Name | Value |
|---|---|
| Assembly Version |
|
| Company Name | Microsoft Corporation |
| File Description | Usermode Font Driver Host |
| File Version |
|
| Internal Name |
|
| Legal Copyright | © Microsoft Corporation. All rights reserved. |
| Original Filename |
|
| Product Name | Microsoft® Windows® Operating System |
| Product Version |
|
File Traits
- .NET
- HighEntropy
- NewLateBinding
- ntdll
- RijndaelManaged
- x86
Block Information
Block Information
During analysis, EnigmaSoft breaks file samples into logical blocks for classification and comparison with other samples. Blocks can be used to generate malware detection rules and to group file samples into families based on shared source code, functionality and other distinguishing attributes and characteristics. This section lists a summary of this block data, as well as its classification by EnigmaSoft. A visual representation of the block data is also displayed, where available.| Total Blocks: | 731 |
|---|---|
| Potentially Malicious Blocks: | 162 |
| Whitelisted Blocks: | 565 |
| Unknown Blocks: | 4 |
Visual Map
0
0
0
0
0
0
?
x
0
x
?
x
x
?
?
x
x
x
x
x
x
x
x
x
x
0
x
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
x
0
0
0
0
0
x
0
0
0
0
0
0
0
0
x
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
x
0
0
0
0
0
0
0
x
0
0
0
0
0
0
x
x
x
x
0
0
x
0
0
x
0
0
0
x
x
0
0
x
x
x
x
x
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
x
0
x
0
0
0
x
0
0
0
0
0
0
0
0
0
0
0
0
0
x
x
0
0
0
x
0
0
0
0
x
0
0
0
x
x
0
x
0
0
0
x
0
0
x
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
x
0
0
0
0
0
0
x
0
x
x
x
x
0
x
0
0
0
0
0
0
0
x
x
0
0
0
0
0
0
x
0
0
x
x
x
0
0
0
x
0
x
0
0
0
0
0
x
x
0
0
0
0
x
0
0
0
0
0
x
x
x
0
0
0
0
x
x
0
x
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
x
x
0
x
x
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
x
0
x
0
0
0
0
0
0
0
0
0
x
0
0
0
0
0
x
x
x
0
0
0
0
0
0
x
x
x
x
0
0
0
0
0
0
0
0
0
0
0
0
x
0
0
0
0
x
x
0
0
x
x
0
0
0
0
0
x
x
0
0
0
0
0
0
0
0
0
0
0
0
0
0
x
x
0
x
x
0
0
0
0
x
x
x
0
0
0
0
0
0
0
x
0
0
x
0
0
0
0
0
0
0
0
x
0
0
0
0
0
0
0
0
0
0
0
0
x
0
x
0
0
0
0
0
x
x
0
x
0
x
0
0
0
0
0
0
x
0
0
0
0
0
0
0
0
x
x
x
0
0
0
0
x
x
x
x
x
x
x
0
0
0
x
x
0
0
0
0
0
0
0
0
x
0
x
0
0
0
0
0
0
0
x
0
0
0
0
0
0
x
0
x
0
0
0
0
0
0
0
0
0
0
0
x
0
x
x
0
0
x
x
0
0
0
x
0
0
0
0
0
x
x
0
0
x
0
0
0
0
0
0
0
0
0
x
0
0
x
0
x
0
x
0
x
x
0
0
x
0
0
0
0
0
x
0
0
0
x
x
x
0
0
0
0
x
0
0
0
0
0
x
x
x
0
x
x
0
x
0
x
x
0
x
x
0
0
0
0
x
0
x
0
0
0
0
0
0
0
0
x
0
0
0
0
0
x
0
x
0
0
x
0
0
0
0
x
0
0
0
0
0
0
0
0
0
0
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block
? - Unknown Block
x - Potentially Malicious Block
Similar Families
Similar Families
This section lists other families that share similarities with this family, based on EnigmaSoft’s analysis. Many malware families are created from the same malware toolkits and use the same packing and encryption techniques but uniquely extend functionality. Similar families may also share source code, attributes, icons, subcomponents, compromised and/or invalid digital signatures, and network characteristics. Researchers leverage these similarities to rapidly and effectively triage file samples and extend malware detection rules.- MSIL.Agent.GDSE
- MSIL.Agent.KS
- MSIL.Agent.XO
- MSIL.AgentTesla.AH
- MSIL.Krypt.YAGO
Show More
- MSIL.Krypt.YAGR
- MSIL.Krypt.YAGT
- MSIL.Krypt.YAGV
- Tedy.L
Registry Modifications
Registry Modifications
This section lists registry keys and values that were created, modified and/or deleted by samples in this family. Windows Registry activity can provide valuable insight into malware functionality. Additionally, malware often creates registry values to allow itself to automatically start and indefinitely persist after an initial infection has compromised the system.| Key::Value | Data | API Name |
|---|---|---|
| HKLM\software\microsoft\tracing\rasapi32::enablefiletracing | RegNtPreCreateKey | |
| HKLM\software\microsoft\tracing\rasapi32::enableautofiletracing | RegNtPreCreateKey | |
| HKLM\software\microsoft\tracing\rasapi32::enableconsoletracing | RegNtPreCreateKey | |
| HKLM\software\microsoft\tracing\rasapi32::filetracingmask | RegNtPreCreateKey | |
| HKLM\software\microsoft\tracing\rasapi32::consoletracingmask | RegNtPreCreateKey | |
| HKLM\software\microsoft\tracing\rasapi32::maxfilesize | RegNtPreCreateKey | |
| HKLM\software\microsoft\tracing\rasapi32::filedirectory | %windir%\tracing | RegNtPreCreateKey |
| HKLM\software\microsoft\tracing\rasmancs::enablefiletracing | RegNtPreCreateKey | |
| HKLM\software\microsoft\tracing\rasmancs::enableautofiletracing | RegNtPreCreateKey | |
| HKLM\software\microsoft\tracing\rasmancs::enableconsoletracing | RegNtPreCreateKey |
Show More
| HKLM\software\microsoft\tracing\rasmancs::filetracingmask | RegNtPreCreateKey | |
| HKLM\software\microsoft\tracing\rasmancs::consoletracingmask | RegNtPreCreateKey | |
| HKLM\software\microsoft\tracing\rasmancs::maxfilesize | RegNtPreCreateKey | |
| HKLM\software\microsoft\tracing\rasmancs::filedirectory | %windir%\tracing | RegNtPreCreateKey |
Windows API Usage
Windows API Usage
This section lists Windows API calls that are used by the samples in this family. Windows API usage analysis is a valuable tool that can help identify malicious activity, such as keylogging, security privilege escalation, data encryption, data exfiltration, interference with antivirus software, and network request manipulation.| Category | API |
|---|---|
| Syscall Use |
Show More
2 additional items are not displayed above. |
| User Data Access |
|
| Other Suspicious |
|
| Anti Debug |
|
| Process Manipulation Evasion |
|
| Network Winsock2 |
|
| Network Winsock |
|
| Network Winhttp |
|
| Network Info Queried |
|