Analysis
-
max time kernel
151s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03-10-2022 03:04
Static task
static1
Behavioral task
behavioral1
Sample
5154a21ef7e8664da1bf7649aefbc41271b3037f81a0a2626b9a609176e7ca3c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5154a21ef7e8664da1bf7649aefbc41271b3037f81a0a2626b9a609176e7ca3c.exe
Resource
win10v2004-20220812-en
General
-
Target
5154a21ef7e8664da1bf7649aefbc41271b3037f81a0a2626b9a609176e7ca3c.exe
-
Size
232KB
-
MD5
680b405aedc62f28b3666c1025c33c2e
-
SHA1
d7631163c1c612a71d70b1dd5f4f1ca0d15a25fd
-
SHA256
5154a21ef7e8664da1bf7649aefbc41271b3037f81a0a2626b9a609176e7ca3c
-
SHA512
c5910ea1bbcdb9e875058b789979cbf957b6029c3d68f8e90b58faf0888404ef0d9839c50b2df7d4a136b4a9df787df2910bd9481844ed40545ef35f8b585f4e
-
SSDEEP
3072:mtAKE9tG8lsaDWYCs5fDF4LJSImbV8UvR77D9G5UEDVR/bwutUqQJ823:m0txzbF4NN28UJ77hGGED/bbJa
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 5154a21ef7e8664da1bf7649aefbc41271b3037f81a0a2626b9a609176e7ca3c.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" yhfeq.exe -
Executes dropped EXE 1 IoCs
pid Process 2028 yhfeq.exe -
Loads dropped DLL 2 IoCs
pid Process 1688 5154a21ef7e8664da1bf7649aefbc41271b3037f81a0a2626b9a609176e7ca3c.exe 1688 5154a21ef7e8664da1bf7649aefbc41271b3037f81a0a2626b9a609176e7ca3c.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yhfeq = "C:\\Users\\Admin\\yhfeq.exe /z" yhfeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yhfeq = "C:\\Users\\Admin\\yhfeq.exe /N" yhfeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yhfeq = "C:\\Users\\Admin\\yhfeq.exe /u" yhfeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yhfeq = "C:\\Users\\Admin\\yhfeq.exe /T" yhfeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yhfeq = "C:\\Users\\Admin\\yhfeq.exe /J" yhfeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yhfeq = "C:\\Users\\Admin\\yhfeq.exe /R" yhfeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yhfeq = "C:\\Users\\Admin\\yhfeq.exe /O" yhfeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yhfeq = "C:\\Users\\Admin\\yhfeq.exe /Q" yhfeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yhfeq = "C:\\Users\\Admin\\yhfeq.exe /h" yhfeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yhfeq = "C:\\Users\\Admin\\yhfeq.exe /o" yhfeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yhfeq = "C:\\Users\\Admin\\yhfeq.exe /d" yhfeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yhfeq = "C:\\Users\\Admin\\yhfeq.exe /w" 5154a21ef7e8664da1bf7649aefbc41271b3037f81a0a2626b9a609176e7ca3c.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ yhfeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yhfeq = "C:\\Users\\Admin\\yhfeq.exe /D" yhfeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yhfeq = "C:\\Users\\Admin\\yhfeq.exe /G" yhfeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yhfeq = "C:\\Users\\Admin\\yhfeq.exe /g" yhfeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yhfeq = "C:\\Users\\Admin\\yhfeq.exe /I" yhfeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yhfeq = "C:\\Users\\Admin\\yhfeq.exe /S" yhfeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yhfeq = "C:\\Users\\Admin\\yhfeq.exe /Y" yhfeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yhfeq = "C:\\Users\\Admin\\yhfeq.exe /X" yhfeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yhfeq = "C:\\Users\\Admin\\yhfeq.exe /B" yhfeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yhfeq = "C:\\Users\\Admin\\yhfeq.exe /W" yhfeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yhfeq = "C:\\Users\\Admin\\yhfeq.exe /F" yhfeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yhfeq = "C:\\Users\\Admin\\yhfeq.exe /b" yhfeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yhfeq = "C:\\Users\\Admin\\yhfeq.exe /a" yhfeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yhfeq = "C:\\Users\\Admin\\yhfeq.exe /K" yhfeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yhfeq = "C:\\Users\\Admin\\yhfeq.exe /E" yhfeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yhfeq = "C:\\Users\\Admin\\yhfeq.exe /q" yhfeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yhfeq = "C:\\Users\\Admin\\yhfeq.exe /j" yhfeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yhfeq = "C:\\Users\\Admin\\yhfeq.exe /Z" yhfeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yhfeq = "C:\\Users\\Admin\\yhfeq.exe /L" yhfeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yhfeq = "C:\\Users\\Admin\\yhfeq.exe /v" yhfeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yhfeq = "C:\\Users\\Admin\\yhfeq.exe /p" yhfeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yhfeq = "C:\\Users\\Admin\\yhfeq.exe /y" yhfeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yhfeq = "C:\\Users\\Admin\\yhfeq.exe /A" yhfeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yhfeq = "C:\\Users\\Admin\\yhfeq.exe /V" yhfeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yhfeq = "C:\\Users\\Admin\\yhfeq.exe /t" yhfeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yhfeq = "C:\\Users\\Admin\\yhfeq.exe /H" yhfeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yhfeq = "C:\\Users\\Admin\\yhfeq.exe /i" yhfeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yhfeq = "C:\\Users\\Admin\\yhfeq.exe /w" yhfeq.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 5154a21ef7e8664da1bf7649aefbc41271b3037f81a0a2626b9a609176e7ca3c.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yhfeq = "C:\\Users\\Admin\\yhfeq.exe /n" yhfeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yhfeq = "C:\\Users\\Admin\\yhfeq.exe /l" yhfeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yhfeq = "C:\\Users\\Admin\\yhfeq.exe /c" yhfeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yhfeq = "C:\\Users\\Admin\\yhfeq.exe /U" yhfeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yhfeq = "C:\\Users\\Admin\\yhfeq.exe /k" yhfeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yhfeq = "C:\\Users\\Admin\\yhfeq.exe /r" yhfeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yhfeq = "C:\\Users\\Admin\\yhfeq.exe /f" yhfeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yhfeq = "C:\\Users\\Admin\\yhfeq.exe /e" yhfeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yhfeq = "C:\\Users\\Admin\\yhfeq.exe /s" yhfeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yhfeq = "C:\\Users\\Admin\\yhfeq.exe /C" yhfeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yhfeq = "C:\\Users\\Admin\\yhfeq.exe /M" yhfeq.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1688 5154a21ef7e8664da1bf7649aefbc41271b3037f81a0a2626b9a609176e7ca3c.exe 2028 yhfeq.exe 2028 yhfeq.exe 2028 yhfeq.exe 2028 yhfeq.exe 2028 yhfeq.exe 2028 yhfeq.exe 2028 yhfeq.exe 2028 yhfeq.exe 2028 yhfeq.exe 2028 yhfeq.exe 2028 yhfeq.exe 2028 yhfeq.exe 2028 yhfeq.exe 2028 yhfeq.exe 2028 yhfeq.exe 2028 yhfeq.exe 2028 yhfeq.exe 2028 yhfeq.exe 2028 yhfeq.exe 2028 yhfeq.exe 2028 yhfeq.exe 2028 yhfeq.exe 2028 yhfeq.exe 2028 yhfeq.exe 2028 yhfeq.exe 2028 yhfeq.exe 2028 yhfeq.exe 2028 yhfeq.exe 2028 yhfeq.exe 2028 yhfeq.exe 2028 yhfeq.exe 2028 yhfeq.exe 2028 yhfeq.exe 2028 yhfeq.exe 2028 yhfeq.exe 2028 yhfeq.exe 2028 yhfeq.exe 2028 yhfeq.exe 2028 yhfeq.exe 2028 yhfeq.exe 2028 yhfeq.exe 2028 yhfeq.exe 2028 yhfeq.exe 2028 yhfeq.exe 2028 yhfeq.exe 2028 yhfeq.exe 2028 yhfeq.exe 2028 yhfeq.exe 2028 yhfeq.exe 2028 yhfeq.exe 2028 yhfeq.exe 2028 yhfeq.exe 2028 yhfeq.exe 2028 yhfeq.exe 2028 yhfeq.exe 2028 yhfeq.exe 2028 yhfeq.exe 2028 yhfeq.exe 2028 yhfeq.exe 2028 yhfeq.exe 2028 yhfeq.exe 2028 yhfeq.exe 2028 yhfeq.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1688 5154a21ef7e8664da1bf7649aefbc41271b3037f81a0a2626b9a609176e7ca3c.exe 2028 yhfeq.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1688 wrote to memory of 2028 1688 5154a21ef7e8664da1bf7649aefbc41271b3037f81a0a2626b9a609176e7ca3c.exe 27 PID 1688 wrote to memory of 2028 1688 5154a21ef7e8664da1bf7649aefbc41271b3037f81a0a2626b9a609176e7ca3c.exe 27 PID 1688 wrote to memory of 2028 1688 5154a21ef7e8664da1bf7649aefbc41271b3037f81a0a2626b9a609176e7ca3c.exe 27 PID 1688 wrote to memory of 2028 1688 5154a21ef7e8664da1bf7649aefbc41271b3037f81a0a2626b9a609176e7ca3c.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\5154a21ef7e8664da1bf7649aefbc41271b3037f81a0a2626b9a609176e7ca3c.exe"C:\Users\Admin\AppData\Local\Temp\5154a21ef7e8664da1bf7649aefbc41271b3037f81a0a2626b9a609176e7ca3c.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\yhfeq.exe"C:\Users\Admin\yhfeq.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2028
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
232KB
MD59682b83ea7a9218f4757ab1782fbcb59
SHA1cc5ab326d2339f22c7e4bfe98800195cb4b62ad9
SHA2564d18eb666e0f1a60e6b3d25216a731b8e174d28b6eff16f8df39c05e79f88ebf
SHA51230ce7ea22024b2ace5c7f49586536aff9cece74bd7f897f4e92b0c88b31251e67c3504f073e168365203c4905437750f2dfe0bd0c6fe416a801ff2e4bda36fd8
-
Filesize
232KB
MD59682b83ea7a9218f4757ab1782fbcb59
SHA1cc5ab326d2339f22c7e4bfe98800195cb4b62ad9
SHA2564d18eb666e0f1a60e6b3d25216a731b8e174d28b6eff16f8df39c05e79f88ebf
SHA51230ce7ea22024b2ace5c7f49586536aff9cece74bd7f897f4e92b0c88b31251e67c3504f073e168365203c4905437750f2dfe0bd0c6fe416a801ff2e4bda36fd8
-
Filesize
232KB
MD59682b83ea7a9218f4757ab1782fbcb59
SHA1cc5ab326d2339f22c7e4bfe98800195cb4b62ad9
SHA2564d18eb666e0f1a60e6b3d25216a731b8e174d28b6eff16f8df39c05e79f88ebf
SHA51230ce7ea22024b2ace5c7f49586536aff9cece74bd7f897f4e92b0c88b31251e67c3504f073e168365203c4905437750f2dfe0bd0c6fe416a801ff2e4bda36fd8
-
Filesize
232KB
MD59682b83ea7a9218f4757ab1782fbcb59
SHA1cc5ab326d2339f22c7e4bfe98800195cb4b62ad9
SHA2564d18eb666e0f1a60e6b3d25216a731b8e174d28b6eff16f8df39c05e79f88ebf
SHA51230ce7ea22024b2ace5c7f49586536aff9cece74bd7f897f4e92b0c88b31251e67c3504f073e168365203c4905437750f2dfe0bd0c6fe416a801ff2e4bda36fd8