Analysis
-
max time kernel
238s -
max time network
337s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 00:30
Static task
static1
Behavioral task
behavioral1
Sample
ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exe
Resource
win10v2004-20220812-en
General
-
Target
ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exe
-
Size
60KB
-
MD5
272c8cef702dea53313465f8006a9caf
-
SHA1
22396cc93577c147058d74744d097e5bba2c1dad
-
SHA256
ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7
-
SHA512
cac738e60c7a570caf9ec5f3f120e9063d8c47494b2a3c06804b0483909bc419dfa04425844e7b6195de6968d5ef5068184ef0b64d500d4564726a654831cdf5
-
SSDEEP
1536:FBVOrd5wHFG57GZXw4Eu8nF/w12TIeLtzEb:TVOrUHVZXw4jg/w12Tt2b
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
yauil.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" yauil.exe -
Executes dropped EXE 1 IoCs
Processes:
yauil.exepid process 592 yauil.exe -
Loads dropped DLL 2 IoCs
Processes:
ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exepid process 564 ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exe 564 ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
yauil.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\ yauil.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\yauil = "C:\\Users\\Admin\\yauil.exe" yauil.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
yauil.exepid process 592 yauil.exe 592 yauil.exe 592 yauil.exe 592 yauil.exe 592 yauil.exe 592 yauil.exe 592 yauil.exe 592 yauil.exe 592 yauil.exe 592 yauil.exe 592 yauil.exe 592 yauil.exe 592 yauil.exe 592 yauil.exe 592 yauil.exe 592 yauil.exe 592 yauil.exe 592 yauil.exe 592 yauil.exe 592 yauil.exe 592 yauil.exe 592 yauil.exe 592 yauil.exe 592 yauil.exe 592 yauil.exe 592 yauil.exe 592 yauil.exe 592 yauil.exe 592 yauil.exe 592 yauil.exe 592 yauil.exe 592 yauil.exe 592 yauil.exe 592 yauil.exe 592 yauil.exe 592 yauil.exe 592 yauil.exe 592 yauil.exe 592 yauil.exe 592 yauil.exe 592 yauil.exe 592 yauil.exe 592 yauil.exe 592 yauil.exe 592 yauil.exe 592 yauil.exe 592 yauil.exe 592 yauil.exe 592 yauil.exe 592 yauil.exe 592 yauil.exe 592 yauil.exe 592 yauil.exe 592 yauil.exe 592 yauil.exe 592 yauil.exe 592 yauil.exe 592 yauil.exe 592 yauil.exe 592 yauil.exe 592 yauil.exe 592 yauil.exe 592 yauil.exe 592 yauil.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exeyauil.exepid process 564 ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exe 592 yauil.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exeyauil.exedescription pid process target process PID 564 wrote to memory of 592 564 ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exe yauil.exe PID 564 wrote to memory of 592 564 ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exe yauil.exe PID 564 wrote to memory of 592 564 ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exe yauil.exe PID 564 wrote to memory of 592 564 ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exe yauil.exe PID 592 wrote to memory of 564 592 yauil.exe ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exe PID 592 wrote to memory of 564 592 yauil.exe ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exe PID 592 wrote to memory of 564 592 yauil.exe ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exe PID 592 wrote to memory of 564 592 yauil.exe ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exe PID 592 wrote to memory of 564 592 yauil.exe ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exe PID 592 wrote to memory of 564 592 yauil.exe ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exe PID 592 wrote to memory of 564 592 yauil.exe ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exe PID 592 wrote to memory of 564 592 yauil.exe ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exe PID 592 wrote to memory of 564 592 yauil.exe ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exe PID 592 wrote to memory of 564 592 yauil.exe ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exe PID 592 wrote to memory of 564 592 yauil.exe ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exe PID 592 wrote to memory of 564 592 yauil.exe ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exe PID 592 wrote to memory of 564 592 yauil.exe ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exe PID 592 wrote to memory of 564 592 yauil.exe ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exe PID 592 wrote to memory of 564 592 yauil.exe ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exe PID 592 wrote to memory of 564 592 yauil.exe ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exe PID 592 wrote to memory of 564 592 yauil.exe ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exe PID 592 wrote to memory of 564 592 yauil.exe ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exe PID 592 wrote to memory of 564 592 yauil.exe ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exe PID 592 wrote to memory of 564 592 yauil.exe ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exe PID 592 wrote to memory of 564 592 yauil.exe ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exe PID 592 wrote to memory of 564 592 yauil.exe ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exe PID 592 wrote to memory of 564 592 yauil.exe ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exe PID 592 wrote to memory of 564 592 yauil.exe ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exe PID 592 wrote to memory of 564 592 yauil.exe ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exe PID 592 wrote to memory of 564 592 yauil.exe ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exe PID 592 wrote to memory of 564 592 yauil.exe ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exe PID 592 wrote to memory of 564 592 yauil.exe ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exe PID 592 wrote to memory of 564 592 yauil.exe ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exe PID 592 wrote to memory of 564 592 yauil.exe ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exe PID 592 wrote to memory of 564 592 yauil.exe ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exe PID 592 wrote to memory of 564 592 yauil.exe ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exe PID 592 wrote to memory of 564 592 yauil.exe ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exe PID 592 wrote to memory of 564 592 yauil.exe ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exe PID 592 wrote to memory of 564 592 yauil.exe ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exe PID 592 wrote to memory of 564 592 yauil.exe ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exe PID 592 wrote to memory of 564 592 yauil.exe ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exe PID 592 wrote to memory of 564 592 yauil.exe ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exe PID 592 wrote to memory of 564 592 yauil.exe ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exe PID 592 wrote to memory of 564 592 yauil.exe ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exe PID 592 wrote to memory of 564 592 yauil.exe ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exe PID 592 wrote to memory of 564 592 yauil.exe ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exe PID 592 wrote to memory of 564 592 yauil.exe ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exe PID 592 wrote to memory of 564 592 yauil.exe ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exe PID 592 wrote to memory of 564 592 yauil.exe ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exe PID 592 wrote to memory of 564 592 yauil.exe ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exe PID 592 wrote to memory of 564 592 yauil.exe ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exe PID 592 wrote to memory of 564 592 yauil.exe ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exe PID 592 wrote to memory of 564 592 yauil.exe ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exe PID 592 wrote to memory of 564 592 yauil.exe ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exe PID 592 wrote to memory of 564 592 yauil.exe ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exe PID 592 wrote to memory of 564 592 yauil.exe ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exe PID 592 wrote to memory of 564 592 yauil.exe ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exe PID 592 wrote to memory of 564 592 yauil.exe ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exe PID 592 wrote to memory of 564 592 yauil.exe ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exe PID 592 wrote to memory of 564 592 yauil.exe ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exe PID 592 wrote to memory of 564 592 yauil.exe ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exe PID 592 wrote to memory of 564 592 yauil.exe ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exe PID 592 wrote to memory of 564 592 yauil.exe ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exe PID 592 wrote to memory of 564 592 yauil.exe ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exe"C:\Users\Admin\AppData\Local\Temp\ce47fbb8fd49fc5ea094c645de737bc214eafc35fa3842a27a81e96fb459feb7.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Users\Admin\yauil.exe"C:\Users\Admin\yauil.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:592
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD528e803f35ba5803d0650396fbfefa33e
SHA13e4cfa742e65ef90f29dab6aeffc17c22687b034
SHA256ac1d2fce548f9334b7999cf49ea03b5e11525148523a76136da5c2544635b604
SHA5123dbc5813af35dedf209f1402de68016b16ca70ffc9d5dc43f50180687e1039c52edcc9f4da2a9bb12aa676f3da887cce8a4786deb8ca02f58f21e77672c8af9b
-
Filesize
60KB
MD528e803f35ba5803d0650396fbfefa33e
SHA13e4cfa742e65ef90f29dab6aeffc17c22687b034
SHA256ac1d2fce548f9334b7999cf49ea03b5e11525148523a76136da5c2544635b604
SHA5123dbc5813af35dedf209f1402de68016b16ca70ffc9d5dc43f50180687e1039c52edcc9f4da2a9bb12aa676f3da887cce8a4786deb8ca02f58f21e77672c8af9b
-
Filesize
60KB
MD528e803f35ba5803d0650396fbfefa33e
SHA13e4cfa742e65ef90f29dab6aeffc17c22687b034
SHA256ac1d2fce548f9334b7999cf49ea03b5e11525148523a76136da5c2544635b604
SHA5123dbc5813af35dedf209f1402de68016b16ca70ffc9d5dc43f50180687e1039c52edcc9f4da2a9bb12aa676f3da887cce8a4786deb8ca02f58f21e77672c8af9b
-
Filesize
60KB
MD528e803f35ba5803d0650396fbfefa33e
SHA13e4cfa742e65ef90f29dab6aeffc17c22687b034
SHA256ac1d2fce548f9334b7999cf49ea03b5e11525148523a76136da5c2544635b604
SHA5123dbc5813af35dedf209f1402de68016b16ca70ffc9d5dc43f50180687e1039c52edcc9f4da2a9bb12aa676f3da887cce8a4786deb8ca02f58f21e77672c8af9b