Analysis
-
max time kernel
173s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07-11-2022 20:50
Static task
static1
Behavioral task
behavioral1
Sample
e351323c82bdd201c5f2aef335eb8490b4f223295e32cd275c9710c084d46869.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e351323c82bdd201c5f2aef335eb8490b4f223295e32cd275c9710c084d46869.exe
Resource
win10v2004-20220901-en
General
-
Target
e351323c82bdd201c5f2aef335eb8490b4f223295e32cd275c9710c084d46869.exe
-
Size
316KB
-
MD5
0f192a69911fc92e52be627e4a22aff0
-
SHA1
6a91014092e6cd17d178be7646dc10bb8725a3ea
-
SHA256
e351323c82bdd201c5f2aef335eb8490b4f223295e32cd275c9710c084d46869
-
SHA512
6df499069f851625774a7b95174b92cbca283d6c4674fb9f6bfa2db632b8b404c9b186d4e22bbf373c11769960d826e192986031e2962498aa42a75aa33409f6
-
SSDEEP
6144:8M2F4wsq8gFV91GGGLVTmrshXj0MQH1DUhu1GJu+DODryKnKx:TKUgFV6Hm1JKx
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" e351323c82bdd201c5f2aef335eb8490b4f223295e32cd275c9710c084d46869.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" yieizum.exe -
Executes dropped EXE 1 IoCs
pid Process 1108 yieizum.exe -
Loads dropped DLL 2 IoCs
pid Process 860 e351323c82bdd201c5f2aef335eb8490b4f223295e32cd275c9710c084d46869.exe 860 e351323c82bdd201c5f2aef335eb8490b4f223295e32cd275c9710c084d46869.exe -
Adds Run key to start application 2 TTPs 54 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\yieizum = "C:\\Users\\Admin\\yieizum.exe /h" yieizum.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\yieizum = "C:\\Users\\Admin\\yieizum.exe /M" yieizum.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\yieizum = "C:\\Users\\Admin\\yieizum.exe /j" yieizum.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\yieizum = "C:\\Users\\Admin\\yieizum.exe /p" yieizum.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\yieizum = "C:\\Users\\Admin\\yieizum.exe /a" yieizum.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\yieizum = "C:\\Users\\Admin\\yieizum.exe /d" yieizum.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\yieizum = "C:\\Users\\Admin\\yieizum.exe /e" yieizum.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\yieizum = "C:\\Users\\Admin\\yieizum.exe /O" yieizum.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\yieizum = "C:\\Users\\Admin\\yieizum.exe /U" yieizum.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\yieizum = "C:\\Users\\Admin\\yieizum.exe /q" yieizum.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\yieizum = "C:\\Users\\Admin\\yieizum.exe /G" yieizum.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\yieizum = "C:\\Users\\Admin\\yieizum.exe /s" yieizum.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\yieizum = "C:\\Users\\Admin\\yieizum.exe /T" yieizum.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\yieizum = "C:\\Users\\Admin\\yieizum.exe /W" yieizum.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\yieizum = "C:\\Users\\Admin\\yieizum.exe /v" yieizum.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\yieizum = "C:\\Users\\Admin\\yieizum.exe /y" yieizum.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\yieizum = "C:\\Users\\Admin\\yieizum.exe /i" yieizum.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\yieizum = "C:\\Users\\Admin\\yieizum.exe /n" yieizum.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\yieizum = "C:\\Users\\Admin\\yieizum.exe /o" yieizum.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\yieizum = "C:\\Users\\Admin\\yieizum.exe /P" yieizum.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\yieizum = "C:\\Users\\Admin\\yieizum.exe /D" yieizum.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\yieizum = "C:\\Users\\Admin\\yieizum.exe /N" e351323c82bdd201c5f2aef335eb8490b4f223295e32cd275c9710c084d46869.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\yieizum = "C:\\Users\\Admin\\yieizum.exe /t" yieizum.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\yieizum = "C:\\Users\\Admin\\yieizum.exe /R" yieizum.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\yieizum = "C:\\Users\\Admin\\yieizum.exe /m" yieizum.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\yieizum = "C:\\Users\\Admin\\yieizum.exe /K" yieizum.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\yieizum = "C:\\Users\\Admin\\yieizum.exe /L" yieizum.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\yieizum = "C:\\Users\\Admin\\yieizum.exe /F" yieizum.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\yieizum = "C:\\Users\\Admin\\yieizum.exe /H" yieizum.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\yieizum = "C:\\Users\\Admin\\yieizum.exe /I" yieizum.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\yieizum = "C:\\Users\\Admin\\yieizum.exe /B" yieizum.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\yieizum = "C:\\Users\\Admin\\yieizum.exe /J" yieizum.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\yieizum = "C:\\Users\\Admin\\yieizum.exe /S" yieizum.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\yieizum = "C:\\Users\\Admin\\yieizum.exe /A" yieizum.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\yieizum = "C:\\Users\\Admin\\yieizum.exe /l" yieizum.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\yieizum = "C:\\Users\\Admin\\yieizum.exe /r" yieizum.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\yieizum = "C:\\Users\\Admin\\yieizum.exe /u" yieizum.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\yieizum = "C:\\Users\\Admin\\yieizum.exe /Y" yieizum.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\yieizum = "C:\\Users\\Admin\\yieizum.exe /E" yieizum.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\yieizum = "C:\\Users\\Admin\\yieizum.exe /x" yieizum.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\yieizum = "C:\\Users\\Admin\\yieizum.exe /C" yieizum.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\yieizum = "C:\\Users\\Admin\\yieizum.exe /c" yieizum.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\yieizum = "C:\\Users\\Admin\\yieizum.exe /f" yieizum.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ e351323c82bdd201c5f2aef335eb8490b4f223295e32cd275c9710c084d46869.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\yieizum = "C:\\Users\\Admin\\yieizum.exe /b" yieizum.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\yieizum = "C:\\Users\\Admin\\yieizum.exe /Z" yieizum.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\yieizum = "C:\\Users\\Admin\\yieizum.exe /X" yieizum.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\yieizum = "C:\\Users\\Admin\\yieizum.exe /k" yieizum.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ yieizum.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\yieizum = "C:\\Users\\Admin\\yieizum.exe /z" yieizum.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\yieizum = "C:\\Users\\Admin\\yieizum.exe /Q" yieizum.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\yieizum = "C:\\Users\\Admin\\yieizum.exe /N" yieizum.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\yieizum = "C:\\Users\\Admin\\yieizum.exe /g" yieizum.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\yieizum = "C:\\Users\\Admin\\yieizum.exe /w" yieizum.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 860 e351323c82bdd201c5f2aef335eb8490b4f223295e32cd275c9710c084d46869.exe 1108 yieizum.exe 1108 yieizum.exe 1108 yieizum.exe 1108 yieizum.exe 1108 yieizum.exe 1108 yieizum.exe 1108 yieizum.exe 1108 yieizum.exe 1108 yieizum.exe 1108 yieizum.exe 1108 yieizum.exe 1108 yieizum.exe 1108 yieizum.exe 1108 yieizum.exe 1108 yieizum.exe 1108 yieizum.exe 1108 yieizum.exe 1108 yieizum.exe 1108 yieizum.exe 1108 yieizum.exe 1108 yieizum.exe 1108 yieizum.exe 1108 yieizum.exe 1108 yieizum.exe 1108 yieizum.exe 1108 yieizum.exe 1108 yieizum.exe 1108 yieizum.exe 1108 yieizum.exe 1108 yieizum.exe 1108 yieizum.exe 1108 yieizum.exe 1108 yieizum.exe 1108 yieizum.exe 1108 yieizum.exe 1108 yieizum.exe 1108 yieizum.exe 1108 yieizum.exe 1108 yieizum.exe 1108 yieizum.exe 1108 yieizum.exe 1108 yieizum.exe 1108 yieizum.exe 1108 yieizum.exe 1108 yieizum.exe 1108 yieizum.exe 1108 yieizum.exe 1108 yieizum.exe 1108 yieizum.exe 1108 yieizum.exe 1108 yieizum.exe 1108 yieizum.exe 1108 yieizum.exe 1108 yieizum.exe 1108 yieizum.exe 1108 yieizum.exe 1108 yieizum.exe 1108 yieizum.exe 1108 yieizum.exe 1108 yieizum.exe 1108 yieizum.exe 1108 yieizum.exe 1108 yieizum.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 860 e351323c82bdd201c5f2aef335eb8490b4f223295e32cd275c9710c084d46869.exe 1108 yieizum.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 860 wrote to memory of 1108 860 e351323c82bdd201c5f2aef335eb8490b4f223295e32cd275c9710c084d46869.exe 27 PID 860 wrote to memory of 1108 860 e351323c82bdd201c5f2aef335eb8490b4f223295e32cd275c9710c084d46869.exe 27 PID 860 wrote to memory of 1108 860 e351323c82bdd201c5f2aef335eb8490b4f223295e32cd275c9710c084d46869.exe 27 PID 860 wrote to memory of 1108 860 e351323c82bdd201c5f2aef335eb8490b4f223295e32cd275c9710c084d46869.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\e351323c82bdd201c5f2aef335eb8490b4f223295e32cd275c9710c084d46869.exe"C:\Users\Admin\AppData\Local\Temp\e351323c82bdd201c5f2aef335eb8490b4f223295e32cd275c9710c084d46869.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Users\Admin\yieizum.exe"C:\Users\Admin\yieizum.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1108
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
316KB
MD503b7636eb49a7c0868d3ce23f8378e38
SHA1d83e5a4b9bb540522306f966cb5e7d20464ae445
SHA25697ca18d024dbea88e3c6a753fc4287375ba0b471ba8c5490c52fe0082a5e3604
SHA512e06f492c5fb1f2b632503918ab8df16394b3adcc9aaa24118300314ccb935b320ee81236c55e66bbd9822eaafc2c8ebd3717dff35de24ec03a3eb543d1d72484
-
Filesize
316KB
MD503b7636eb49a7c0868d3ce23f8378e38
SHA1d83e5a4b9bb540522306f966cb5e7d20464ae445
SHA25697ca18d024dbea88e3c6a753fc4287375ba0b471ba8c5490c52fe0082a5e3604
SHA512e06f492c5fb1f2b632503918ab8df16394b3adcc9aaa24118300314ccb935b320ee81236c55e66bbd9822eaafc2c8ebd3717dff35de24ec03a3eb543d1d72484
-
Filesize
316KB
MD503b7636eb49a7c0868d3ce23f8378e38
SHA1d83e5a4b9bb540522306f966cb5e7d20464ae445
SHA25697ca18d024dbea88e3c6a753fc4287375ba0b471ba8c5490c52fe0082a5e3604
SHA512e06f492c5fb1f2b632503918ab8df16394b3adcc9aaa24118300314ccb935b320ee81236c55e66bbd9822eaafc2c8ebd3717dff35de24ec03a3eb543d1d72484
-
Filesize
316KB
MD503b7636eb49a7c0868d3ce23f8378e38
SHA1d83e5a4b9bb540522306f966cb5e7d20464ae445
SHA25697ca18d024dbea88e3c6a753fc4287375ba0b471ba8c5490c52fe0082a5e3604
SHA512e06f492c5fb1f2b632503918ab8df16394b3adcc9aaa24118300314ccb935b320ee81236c55e66bbd9822eaafc2c8ebd3717dff35de24ec03a3eb543d1d72484