Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2022, 20:13
Static task
static1
Behavioral task
behavioral1
Sample
888e9420a0bcd87f21b94633045ff2ca1887269d377082cd9b2527ddc255785a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
888e9420a0bcd87f21b94633045ff2ca1887269d377082cd9b2527ddc255785a.exe
Resource
win10v2004-20220901-en
General
-
Target
888e9420a0bcd87f21b94633045ff2ca1887269d377082cd9b2527ddc255785a.exe
-
Size
216KB
-
MD5
827ab36318a92aa7b17c056550a59951
-
SHA1
e2a8c80d75954b556ba2c872d4279cdfe67f357c
-
SHA256
888e9420a0bcd87f21b94633045ff2ca1887269d377082cd9b2527ddc255785a
-
SHA512
14f022ed45b6d94557cdda9f410ec161ceb78274db0fee369526a59c0e4274b5924dee9d98b62bbc00c871c953edc6bb6dceecb7118a1c2478c5cf2350cd248e
-
SSDEEP
6144:32SIfrt3+TetonBi3QxRy4g09ICSnqf9uSUgkxtpsaPjK/bEoK828fwAoEn+MKy:32Nrt3+TetonBi3QxRwfnqf9uSUgkxtS
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" yekiq.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 888e9420a0bcd87f21b94633045ff2ca1887269d377082cd9b2527ddc255785a.exe -
Executes dropped EXE 1 IoCs
pid Process 5116 yekiq.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 888e9420a0bcd87f21b94633045ff2ca1887269d377082cd9b2527ddc255785a.exe -
Adds Run key to start application 2 TTPs 54 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yekiq = "C:\\Users\\Admin\\yekiq.exe /y" yekiq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yekiq = "C:\\Users\\Admin\\yekiq.exe /c" yekiq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yekiq = "C:\\Users\\Admin\\yekiq.exe /t" yekiq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yekiq = "C:\\Users\\Admin\\yekiq.exe /V" yekiq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yekiq = "C:\\Users\\Admin\\yekiq.exe /N" yekiq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yekiq = "C:\\Users\\Admin\\yekiq.exe /L" yekiq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yekiq = "C:\\Users\\Admin\\yekiq.exe /b" yekiq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yekiq = "C:\\Users\\Admin\\yekiq.exe /R" yekiq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yekiq = "C:\\Users\\Admin\\yekiq.exe /Z" yekiq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yekiq = "C:\\Users\\Admin\\yekiq.exe /x" yekiq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yekiq = "C:\\Users\\Admin\\yekiq.exe /M" yekiq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yekiq = "C:\\Users\\Admin\\yekiq.exe /G" yekiq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yekiq = "C:\\Users\\Admin\\yekiq.exe /T" yekiq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yekiq = "C:\\Users\\Admin\\yekiq.exe /I" yekiq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yekiq = "C:\\Users\\Admin\\yekiq.exe /f" yekiq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yekiq = "C:\\Users\\Admin\\yekiq.exe /q" yekiq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yekiq = "C:\\Users\\Admin\\yekiq.exe /A" yekiq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yekiq = "C:\\Users\\Admin\\yekiq.exe /X" yekiq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yekiq = "C:\\Users\\Admin\\yekiq.exe /P" yekiq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yekiq = "C:\\Users\\Admin\\yekiq.exe /F" yekiq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yekiq = "C:\\Users\\Admin\\yekiq.exe /B" yekiq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yekiq = "C:\\Users\\Admin\\yekiq.exe /n" yekiq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yekiq = "C:\\Users\\Admin\\yekiq.exe /W" yekiq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yekiq = "C:\\Users\\Admin\\yekiq.exe /d" yekiq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yekiq = "C:\\Users\\Admin\\yekiq.exe /i" yekiq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yekiq = "C:\\Users\\Admin\\yekiq.exe /e" yekiq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yekiq = "C:\\Users\\Admin\\yekiq.exe /k" yekiq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yekiq = "C:\\Users\\Admin\\yekiq.exe /K" yekiq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yekiq = "C:\\Users\\Admin\\yekiq.exe /Y" yekiq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yekiq = "C:\\Users\\Admin\\yekiq.exe /w" yekiq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yekiq = "C:\\Users\\Admin\\yekiq.exe /U" yekiq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yekiq = "C:\\Users\\Admin\\yekiq.exe /O" yekiq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yekiq = "C:\\Users\\Admin\\yekiq.exe /h" yekiq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yekiq = "C:\\Users\\Admin\\yekiq.exe /r" yekiq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yekiq = "C:\\Users\\Admin\\yekiq.exe /S" yekiq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yekiq = "C:\\Users\\Admin\\yekiq.exe /q" 888e9420a0bcd87f21b94633045ff2ca1887269d377082cd9b2527ddc255785a.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yekiq = "C:\\Users\\Admin\\yekiq.exe /o" yekiq.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 888e9420a0bcd87f21b94633045ff2ca1887269d377082cd9b2527ddc255785a.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yekiq = "C:\\Users\\Admin\\yekiq.exe /D" yekiq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yekiq = "C:\\Users\\Admin\\yekiq.exe /a" yekiq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yekiq = "C:\\Users\\Admin\\yekiq.exe /J" yekiq.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run\ yekiq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yekiq = "C:\\Users\\Admin\\yekiq.exe /p" yekiq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yekiq = "C:\\Users\\Admin\\yekiq.exe /l" yekiq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yekiq = "C:\\Users\\Admin\\yekiq.exe /s" yekiq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yekiq = "C:\\Users\\Admin\\yekiq.exe /u" yekiq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yekiq = "C:\\Users\\Admin\\yekiq.exe /Q" yekiq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yekiq = "C:\\Users\\Admin\\yekiq.exe /j" yekiq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yekiq = "C:\\Users\\Admin\\yekiq.exe /z" yekiq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yekiq = "C:\\Users\\Admin\\yekiq.exe /g" yekiq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yekiq = "C:\\Users\\Admin\\yekiq.exe /H" yekiq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yekiq = "C:\\Users\\Admin\\yekiq.exe /E" yekiq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yekiq = "C:\\Users\\Admin\\yekiq.exe /m" yekiq.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yekiq = "C:\\Users\\Admin\\yekiq.exe /C" yekiq.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3796 888e9420a0bcd87f21b94633045ff2ca1887269d377082cd9b2527ddc255785a.exe 3796 888e9420a0bcd87f21b94633045ff2ca1887269d377082cd9b2527ddc255785a.exe 5116 yekiq.exe 5116 yekiq.exe 5116 yekiq.exe 5116 yekiq.exe 5116 yekiq.exe 5116 yekiq.exe 5116 yekiq.exe 5116 yekiq.exe 5116 yekiq.exe 5116 yekiq.exe 5116 yekiq.exe 5116 yekiq.exe 5116 yekiq.exe 5116 yekiq.exe 5116 yekiq.exe 5116 yekiq.exe 5116 yekiq.exe 5116 yekiq.exe 5116 yekiq.exe 5116 yekiq.exe 5116 yekiq.exe 5116 yekiq.exe 5116 yekiq.exe 5116 yekiq.exe 5116 yekiq.exe 5116 yekiq.exe 5116 yekiq.exe 5116 yekiq.exe 5116 yekiq.exe 5116 yekiq.exe 5116 yekiq.exe 5116 yekiq.exe 5116 yekiq.exe 5116 yekiq.exe 5116 yekiq.exe 5116 yekiq.exe 5116 yekiq.exe 5116 yekiq.exe 5116 yekiq.exe 5116 yekiq.exe 5116 yekiq.exe 5116 yekiq.exe 5116 yekiq.exe 5116 yekiq.exe 5116 yekiq.exe 5116 yekiq.exe 5116 yekiq.exe 5116 yekiq.exe 5116 yekiq.exe 5116 yekiq.exe 5116 yekiq.exe 5116 yekiq.exe 5116 yekiq.exe 5116 yekiq.exe 5116 yekiq.exe 5116 yekiq.exe 5116 yekiq.exe 5116 yekiq.exe 5116 yekiq.exe 5116 yekiq.exe 5116 yekiq.exe 5116 yekiq.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3796 888e9420a0bcd87f21b94633045ff2ca1887269d377082cd9b2527ddc255785a.exe 5116 yekiq.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3796 wrote to memory of 5116 3796 888e9420a0bcd87f21b94633045ff2ca1887269d377082cd9b2527ddc255785a.exe 82 PID 3796 wrote to memory of 5116 3796 888e9420a0bcd87f21b94633045ff2ca1887269d377082cd9b2527ddc255785a.exe 82 PID 3796 wrote to memory of 5116 3796 888e9420a0bcd87f21b94633045ff2ca1887269d377082cd9b2527ddc255785a.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\888e9420a0bcd87f21b94633045ff2ca1887269d377082cd9b2527ddc255785a.exe"C:\Users\Admin\AppData\Local\Temp\888e9420a0bcd87f21b94633045ff2ca1887269d377082cd9b2527ddc255785a.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Users\Admin\yekiq.exe"C:\Users\Admin\yekiq.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5116
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216KB
MD57a7f98f6c3ef333002580e0925557209
SHA1c748ee9db6ec5409bb1f374c6b7bbcb0c3ce43ab
SHA25685619e6b29b431b385afc9aa3df45240280e315b623455b7bbba03a130af026e
SHA512b34fb560cd6c735c22ec1773e2583dc6ab782246ee3aa3f6eb5d26c93adfce01cced7bcd01897300767fd84864fb8d78ed3b73dd5321f327a25645d8184a35bc
-
Filesize
216KB
MD57a7f98f6c3ef333002580e0925557209
SHA1c748ee9db6ec5409bb1f374c6b7bbcb0c3ce43ab
SHA25685619e6b29b431b385afc9aa3df45240280e315b623455b7bbba03a130af026e
SHA512b34fb560cd6c735c22ec1773e2583dc6ab782246ee3aa3f6eb5d26c93adfce01cced7bcd01897300767fd84864fb8d78ed3b73dd5321f327a25645d8184a35bc