Analysis
-
max time kernel
151s -
max time network
53s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01-12-2022 23:29
Static task
static1
Behavioral task
behavioral1
Sample
332a113305fd912e31de58f6c2e9b046cc889039422d297c4731b18f46a9f3d7.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
332a113305fd912e31de58f6c2e9b046cc889039422d297c4731b18f46a9f3d7.exe
Resource
win10v2004-20220812-en
General
-
Target
332a113305fd912e31de58f6c2e9b046cc889039422d297c4731b18f46a9f3d7.exe
-
Size
204KB
-
MD5
870519675bccf779f4c76bc61fca99d8
-
SHA1
3c6fd988811468fd4a9b9b002bc44d180e4f32c6
-
SHA256
332a113305fd912e31de58f6c2e9b046cc889039422d297c4731b18f46a9f3d7
-
SHA512
03058f84d97684f0b1202781787fe60e1a61de49cbd690a48a776d03ba524ee48812dc45daab51523644ddb3b452a8fb75d5230a8ee140e415ca63ed3edd782b
-
SSDEEP
3072:AmYW8O+0tQ9nLHbB9W0c1TqECzR/mkSYGrl9ymgYUWiE:btc4QxL7B9W0c1RCzR/fSmlBE
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 332a113305fd912e31de58f6c2e9b046cc889039422d297c4731b18f46a9f3d7.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" yoaihak.exe -
Executes dropped EXE 1 IoCs
pid Process 584 yoaihak.exe -
Loads dropped DLL 2 IoCs
pid Process 2016 332a113305fd912e31de58f6c2e9b046cc889039422d297c4731b18f46a9f3d7.exe 2016 332a113305fd912e31de58f6c2e9b046cc889039422d297c4731b18f46a9f3d7.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoaihak = "C:\\Users\\Admin\\yoaihak.exe /f" yoaihak.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoaihak = "C:\\Users\\Admin\\yoaihak.exe /w" yoaihak.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoaihak = "C:\\Users\\Admin\\yoaihak.exe /r" yoaihak.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoaihak = "C:\\Users\\Admin\\yoaihak.exe /j" yoaihak.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoaihak = "C:\\Users\\Admin\\yoaihak.exe /v" yoaihak.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 332a113305fd912e31de58f6c2e9b046cc889039422d297c4731b18f46a9f3d7.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\ yoaihak.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoaihak = "C:\\Users\\Admin\\yoaihak.exe /a" yoaihak.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoaihak = "C:\\Users\\Admin\\yoaihak.exe /x" yoaihak.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoaihak = "C:\\Users\\Admin\\yoaihak.exe /g" yoaihak.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoaihak = "C:\\Users\\Admin\\yoaihak.exe /o" yoaihak.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoaihak = "C:\\Users\\Admin\\yoaihak.exe /n" yoaihak.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoaihak = "C:\\Users\\Admin\\yoaihak.exe /b" yoaihak.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoaihak = "C:\\Users\\Admin\\yoaihak.exe /c" yoaihak.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoaihak = "C:\\Users\\Admin\\yoaihak.exe /t" yoaihak.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoaihak = "C:\\Users\\Admin\\yoaihak.exe /k" yoaihak.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoaihak = "C:\\Users\\Admin\\yoaihak.exe /s" yoaihak.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoaihak = "C:\\Users\\Admin\\yoaihak.exe /i" yoaihak.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoaihak = "C:\\Users\\Admin\\yoaihak.exe /d" yoaihak.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoaihak = "C:\\Users\\Admin\\yoaihak.exe /z" yoaihak.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoaihak = "C:\\Users\\Admin\\yoaihak.exe /q" yoaihak.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoaihak = "C:\\Users\\Admin\\yoaihak.exe /e" yoaihak.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoaihak = "C:\\Users\\Admin\\yoaihak.exe /l" yoaihak.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoaihak = "C:\\Users\\Admin\\yoaihak.exe /y" yoaihak.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoaihak = "C:\\Users\\Admin\\yoaihak.exe /q" 332a113305fd912e31de58f6c2e9b046cc889039422d297c4731b18f46a9f3d7.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoaihak = "C:\\Users\\Admin\\yoaihak.exe /h" yoaihak.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoaihak = "C:\\Users\\Admin\\yoaihak.exe /u" yoaihak.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoaihak = "C:\\Users\\Admin\\yoaihak.exe /m" yoaihak.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoaihak = "C:\\Users\\Admin\\yoaihak.exe /p" yoaihak.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2016 332a113305fd912e31de58f6c2e9b046cc889039422d297c4731b18f46a9f3d7.exe 584 yoaihak.exe 584 yoaihak.exe 584 yoaihak.exe 584 yoaihak.exe 584 yoaihak.exe 584 yoaihak.exe 584 yoaihak.exe 584 yoaihak.exe 584 yoaihak.exe 584 yoaihak.exe 584 yoaihak.exe 584 yoaihak.exe 584 yoaihak.exe 584 yoaihak.exe 584 yoaihak.exe 584 yoaihak.exe 584 yoaihak.exe 584 yoaihak.exe 584 yoaihak.exe 584 yoaihak.exe 584 yoaihak.exe 584 yoaihak.exe 584 yoaihak.exe 584 yoaihak.exe 584 yoaihak.exe 584 yoaihak.exe 584 yoaihak.exe 584 yoaihak.exe 584 yoaihak.exe 584 yoaihak.exe 584 yoaihak.exe 584 yoaihak.exe 584 yoaihak.exe 584 yoaihak.exe 584 yoaihak.exe 584 yoaihak.exe 584 yoaihak.exe 584 yoaihak.exe 584 yoaihak.exe 584 yoaihak.exe 584 yoaihak.exe 584 yoaihak.exe 584 yoaihak.exe 584 yoaihak.exe 584 yoaihak.exe 584 yoaihak.exe 584 yoaihak.exe 584 yoaihak.exe 584 yoaihak.exe 584 yoaihak.exe 584 yoaihak.exe 584 yoaihak.exe 584 yoaihak.exe 584 yoaihak.exe 584 yoaihak.exe 584 yoaihak.exe 584 yoaihak.exe 584 yoaihak.exe 584 yoaihak.exe 584 yoaihak.exe 584 yoaihak.exe 584 yoaihak.exe 584 yoaihak.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2016 332a113305fd912e31de58f6c2e9b046cc889039422d297c4731b18f46a9f3d7.exe 584 yoaihak.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2016 wrote to memory of 584 2016 332a113305fd912e31de58f6c2e9b046cc889039422d297c4731b18f46a9f3d7.exe 28 PID 2016 wrote to memory of 584 2016 332a113305fd912e31de58f6c2e9b046cc889039422d297c4731b18f46a9f3d7.exe 28 PID 2016 wrote to memory of 584 2016 332a113305fd912e31de58f6c2e9b046cc889039422d297c4731b18f46a9f3d7.exe 28 PID 2016 wrote to memory of 584 2016 332a113305fd912e31de58f6c2e9b046cc889039422d297c4731b18f46a9f3d7.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\332a113305fd912e31de58f6c2e9b046cc889039422d297c4731b18f46a9f3d7.exe"C:\Users\Admin\AppData\Local\Temp\332a113305fd912e31de58f6c2e9b046cc889039422d297c4731b18f46a9f3d7.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\yoaihak.exe"C:\Users\Admin\yoaihak.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:584
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD596bd153ca9cb23ba4a749e0f9104094b
SHA11d0bac0407b9b4f52b5ea9dd17ab310c8ddc9fc7
SHA256359a9a7b51b03623542e81e6e02d3340c8427d50cac696acc99b75baf83aa8dc
SHA512de5448ec603845d3b4325970e298172035c07b204d0833a4961cbf79676e7c1d79646bc5c36625739e2474764b17ae1330f6bea34728b2f7403233334c48b4c4
-
Filesize
204KB
MD596bd153ca9cb23ba4a749e0f9104094b
SHA11d0bac0407b9b4f52b5ea9dd17ab310c8ddc9fc7
SHA256359a9a7b51b03623542e81e6e02d3340c8427d50cac696acc99b75baf83aa8dc
SHA512de5448ec603845d3b4325970e298172035c07b204d0833a4961cbf79676e7c1d79646bc5c36625739e2474764b17ae1330f6bea34728b2f7403233334c48b4c4
-
Filesize
204KB
MD596bd153ca9cb23ba4a749e0f9104094b
SHA11d0bac0407b9b4f52b5ea9dd17ab310c8ddc9fc7
SHA256359a9a7b51b03623542e81e6e02d3340c8427d50cac696acc99b75baf83aa8dc
SHA512de5448ec603845d3b4325970e298172035c07b204d0833a4961cbf79676e7c1d79646bc5c36625739e2474764b17ae1330f6bea34728b2f7403233334c48b4c4
-
Filesize
204KB
MD596bd153ca9cb23ba4a749e0f9104094b
SHA11d0bac0407b9b4f52b5ea9dd17ab310c8ddc9fc7
SHA256359a9a7b51b03623542e81e6e02d3340c8427d50cac696acc99b75baf83aa8dc
SHA512de5448ec603845d3b4325970e298172035c07b204d0833a4961cbf79676e7c1d79646bc5c36625739e2474764b17ae1330f6bea34728b2f7403233334c48b4c4