Analysis
-
max time kernel
204s -
max time network
210s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 18:58
Static task
static1
Behavioral task
behavioral1
Sample
0458ba650b2ddd9b46fdf74d55a5652b629e34f48cda246fcf7b71d3161cb5ce.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
0458ba650b2ddd9b46fdf74d55a5652b629e34f48cda246fcf7b71d3161cb5ce.exe
Resource
win10v2004-20221111-en
General
-
Target
0458ba650b2ddd9b46fdf74d55a5652b629e34f48cda246fcf7b71d3161cb5ce.exe
-
Size
256KB
-
MD5
4bbdc27a9dea20735b7baf97a4023a20
-
SHA1
26add347fffef9454a50dfc976c66defc3d5cc9f
-
SHA256
0458ba650b2ddd9b46fdf74d55a5652b629e34f48cda246fcf7b71d3161cb5ce
-
SHA512
f3a90919eb9d7c579bbce424a4ac22c665d4d00a8de8ebe7ccee42a7dc91a9456c296ce41ed1d7db36cef6a579576d6c919780db5982739dc163610fd7b4390e
-
SSDEEP
3072:ZxYW6OYVliTJeYbPIBFaoM4QClOehtOCJTiMGB+zFFDb+Lzvd/fFMl4mn2jYgyj:Zxd6ViMF9ps8TiUed/6KjY7
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
0458ba650b2ddd9b46fdf74d55a5652b629e34f48cda246fcf7b71d3161cb5ce.exeyieyoeq.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 0458ba650b2ddd9b46fdf74d55a5652b629e34f48cda246fcf7b71d3161cb5ce.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" yieyoeq.exe -
Executes dropped EXE 1 IoCs
Processes:
yieyoeq.exepid process 1688 yieyoeq.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
0458ba650b2ddd9b46fdf74d55a5652b629e34f48cda246fcf7b71d3161cb5ce.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 0458ba650b2ddd9b46fdf74d55a5652b629e34f48cda246fcf7b71d3161cb5ce.exe -
Adds Run key to start application 2 TTPs 7 IoCs
Processes:
0458ba650b2ddd9b46fdf74d55a5652b629e34f48cda246fcf7b71d3161cb5ce.exeyieyoeq.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yieyoeq = "C:\\Users\\Admin\\yieyoeq.exe /z" 0458ba650b2ddd9b46fdf74d55a5652b629e34f48cda246fcf7b71d3161cb5ce.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows\CurrentVersion\Run\ yieyoeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yieyoeq = "C:\\Users\\Admin\\yieyoeq.exe /h" yieyoeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yieyoeq = "C:\\Users\\Admin\\yieyoeq.exe /u" yieyoeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yieyoeq = "C:\\Users\\Admin\\yieyoeq.exe /w" yieyoeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yieyoeq = "C:\\Users\\Admin\\yieyoeq.exe /e" yieyoeq.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 0458ba650b2ddd9b46fdf74d55a5652b629e34f48cda246fcf7b71d3161cb5ce.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
0458ba650b2ddd9b46fdf74d55a5652b629e34f48cda246fcf7b71d3161cb5ce.exeyieyoeq.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 0458ba650b2ddd9b46fdf74d55a5652b629e34f48cda246fcf7b71d3161cb5ce.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 0458ba650b2ddd9b46fdf74d55a5652b629e34f48cda246fcf7b71d3161cb5ce.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum yieyoeq.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 yieyoeq.exe -
Drops autorun.inf file 1 TTPs 1 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
yieyoeq.exedescription ioc process File opened for modification C:\Users\Admin\c\autorun.inf yieyoeq.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
0458ba650b2ddd9b46fdf74d55a5652b629e34f48cda246fcf7b71d3161cb5ce.exeyieyoeq.exepid process 1620 0458ba650b2ddd9b46fdf74d55a5652b629e34f48cda246fcf7b71d3161cb5ce.exe 1620 0458ba650b2ddd9b46fdf74d55a5652b629e34f48cda246fcf7b71d3161cb5ce.exe 1620 0458ba650b2ddd9b46fdf74d55a5652b629e34f48cda246fcf7b71d3161cb5ce.exe 1620 0458ba650b2ddd9b46fdf74d55a5652b629e34f48cda246fcf7b71d3161cb5ce.exe 1620 0458ba650b2ddd9b46fdf74d55a5652b629e34f48cda246fcf7b71d3161cb5ce.exe 1620 0458ba650b2ddd9b46fdf74d55a5652b629e34f48cda246fcf7b71d3161cb5ce.exe 1620 0458ba650b2ddd9b46fdf74d55a5652b629e34f48cda246fcf7b71d3161cb5ce.exe 1620 0458ba650b2ddd9b46fdf74d55a5652b629e34f48cda246fcf7b71d3161cb5ce.exe 1620 0458ba650b2ddd9b46fdf74d55a5652b629e34f48cda246fcf7b71d3161cb5ce.exe 1620 0458ba650b2ddd9b46fdf74d55a5652b629e34f48cda246fcf7b71d3161cb5ce.exe 1620 0458ba650b2ddd9b46fdf74d55a5652b629e34f48cda246fcf7b71d3161cb5ce.exe 1620 0458ba650b2ddd9b46fdf74d55a5652b629e34f48cda246fcf7b71d3161cb5ce.exe 1688 yieyoeq.exe 1688 yieyoeq.exe 1688 yieyoeq.exe 1688 yieyoeq.exe 1688 yieyoeq.exe 1688 yieyoeq.exe 1688 yieyoeq.exe 1688 yieyoeq.exe 1688 yieyoeq.exe 1688 yieyoeq.exe 1688 yieyoeq.exe 1688 yieyoeq.exe 1688 yieyoeq.exe 1688 yieyoeq.exe 1688 yieyoeq.exe 1688 yieyoeq.exe 1688 yieyoeq.exe 1688 yieyoeq.exe 1688 yieyoeq.exe 1688 yieyoeq.exe 1688 yieyoeq.exe 1688 yieyoeq.exe 1688 yieyoeq.exe 1688 yieyoeq.exe 1688 yieyoeq.exe 1688 yieyoeq.exe 1688 yieyoeq.exe 1688 yieyoeq.exe 1688 yieyoeq.exe 1688 yieyoeq.exe 1688 yieyoeq.exe 1688 yieyoeq.exe 1688 yieyoeq.exe 1688 yieyoeq.exe 1688 yieyoeq.exe 1688 yieyoeq.exe 1688 yieyoeq.exe 1688 yieyoeq.exe 1688 yieyoeq.exe 1688 yieyoeq.exe 1688 yieyoeq.exe 1688 yieyoeq.exe 1688 yieyoeq.exe 1688 yieyoeq.exe 1688 yieyoeq.exe 1688 yieyoeq.exe 1688 yieyoeq.exe 1688 yieyoeq.exe 1688 yieyoeq.exe 1688 yieyoeq.exe 1688 yieyoeq.exe 1688 yieyoeq.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
0458ba650b2ddd9b46fdf74d55a5652b629e34f48cda246fcf7b71d3161cb5ce.exeyieyoeq.exepid process 1620 0458ba650b2ddd9b46fdf74d55a5652b629e34f48cda246fcf7b71d3161cb5ce.exe 1688 yieyoeq.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
0458ba650b2ddd9b46fdf74d55a5652b629e34f48cda246fcf7b71d3161cb5ce.exedescription pid process target process PID 1620 wrote to memory of 1688 1620 0458ba650b2ddd9b46fdf74d55a5652b629e34f48cda246fcf7b71d3161cb5ce.exe yieyoeq.exe PID 1620 wrote to memory of 1688 1620 0458ba650b2ddd9b46fdf74d55a5652b629e34f48cda246fcf7b71d3161cb5ce.exe yieyoeq.exe PID 1620 wrote to memory of 1688 1620 0458ba650b2ddd9b46fdf74d55a5652b629e34f48cda246fcf7b71d3161cb5ce.exe yieyoeq.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0458ba650b2ddd9b46fdf74d55a5652b629e34f48cda246fcf7b71d3161cb5ce.exe"C:\Users\Admin\AppData\Local\Temp\0458ba650b2ddd9b46fdf74d55a5652b629e34f48cda246fcf7b71d3161cb5ce.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Users\Admin\yieyoeq.exe"C:\Users\Admin\yieyoeq.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Maps connected drives based on registry
- Drops autorun.inf file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1688
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD54bbdc27a9dea20735b7baf97a4023a20
SHA126add347fffef9454a50dfc976c66defc3d5cc9f
SHA2560458ba650b2ddd9b46fdf74d55a5652b629e34f48cda246fcf7b71d3161cb5ce
SHA512f3a90919eb9d7c579bbce424a4ac22c665d4d00a8de8ebe7ccee42a7dc91a9456c296ce41ed1d7db36cef6a579576d6c919780db5982739dc163610fd7b4390e
-
Filesize
256KB
MD54bbdc27a9dea20735b7baf97a4023a20
SHA126add347fffef9454a50dfc976c66defc3d5cc9f
SHA2560458ba650b2ddd9b46fdf74d55a5652b629e34f48cda246fcf7b71d3161cb5ce
SHA512f3a90919eb9d7c579bbce424a4ac22c665d4d00a8de8ebe7ccee42a7dc91a9456c296ce41ed1d7db36cef6a579576d6c919780db5982739dc163610fd7b4390e