Analysis
-
max time kernel
152s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 23:38
Static task
static1
Behavioral task
behavioral1
Sample
61a11d867777f38d855d1513dcf4895144cc662e901a9757c99c2a550dbc6942.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
61a11d867777f38d855d1513dcf4895144cc662e901a9757c99c2a550dbc6942.exe
Resource
win10v2004-20221111-en
General
-
Target
61a11d867777f38d855d1513dcf4895144cc662e901a9757c99c2a550dbc6942.exe
-
Size
172KB
-
MD5
7058a3fc1b41632e6c8f07f085d7dead
-
SHA1
216ec36bc8bd48ef6725081999d91b32e58939b9
-
SHA256
61a11d867777f38d855d1513dcf4895144cc662e901a9757c99c2a550dbc6942
-
SHA512
4fb6c59d0d0a7ce3d35f9bbd4103c0a8a3545e1f38fbf9379fbc03443b523bf79b61f9e0018796445cf20936d7d740a944d660d654efc56ac927501e714092e1
-
SSDEEP
3072:rChDLsNgqT3muDOqkVfbX936NDoZq4rvKtGTV:gDLsNgm3muDOqkpbX937Zq4ryY
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 61a11d867777f38d855d1513dcf4895144cc662e901a9757c99c2a550dbc6942.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" yeainuc.exe -
Executes dropped EXE 1 IoCs
pid Process 1736 yeainuc.exe -
Loads dropped DLL 2 IoCs
pid Process 1688 61a11d867777f38d855d1513dcf4895144cc662e901a9757c99c2a550dbc6942.exe 1688 61a11d867777f38d855d1513dcf4895144cc662e901a9757c99c2a550dbc6942.exe -
Adds Run key to start application 2 TTPs 58 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeainuc = "C:\\Users\\Admin\\yeainuc.exe /v" yeainuc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeainuc = "C:\\Users\\Admin\\yeainuc.exe /c" yeainuc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\yeainuc = "C:\\Users\\Admin\\yeainuc.exe /d" yeainuc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\yeainuc = "C:\\Users\\Admin\\yeainuc.exe /h" yeainuc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\yeainuc = "C:\\Users\\Admin\\yeainuc.exe /a" yeainuc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeainuc = "C:\\Users\\Admin\\yeainuc.exe /t" yeainuc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeainuc = "C:\\Users\\Admin\\yeainuc.exe /z" yeainuc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeainuc = "C:\\Users\\Admin\\yeainuc.exe /p" yeainuc.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 61a11d867777f38d855d1513dcf4895144cc662e901a9757c99c2a550dbc6942.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\yeainuc = "C:\\Users\\Admin\\yeainuc.exe /m" yeainuc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\yeainuc = "C:\\Users\\Admin\\yeainuc.exe /y" yeainuc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\yeainuc = "C:\\Users\\Admin\\yeainuc.exe /t" yeainuc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeainuc = "C:\\Users\\Admin\\yeainuc.exe /e" yeainuc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\yeainuc = "C:\\Users\\Admin\\yeainuc.exe /q" yeainuc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeainuc = "C:\\Users\\Admin\\yeainuc.exe /g" yeainuc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeainuc = "C:\\Users\\Admin\\yeainuc.exe /h" yeainuc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeainuc = "C:\\Users\\Admin\\yeainuc.exe /b" yeainuc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\yeainuc = "C:\\Users\\Admin\\yeainuc.exe /c" yeainuc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeainuc = "C:\\Users\\Admin\\yeainuc.exe /d" yeainuc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\yeainuc = "C:\\Users\\Admin\\yeainuc.exe /l" yeainuc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\yeainuc = "C:\\Users\\Admin\\yeainuc.exe /v" yeainuc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\yeainuc = "C:\\Users\\Admin\\yeainuc.exe /u" yeainuc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\yeainuc = "C:\\Users\\Admin\\yeainuc.exe /q" 61a11d867777f38d855d1513dcf4895144cc662e901a9757c99c2a550dbc6942.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeainuc = "C:\\Users\\Admin\\yeainuc.exe /x" yeainuc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\yeainuc = "C:\\Users\\Admin\\yeainuc.exe /o" yeainuc.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ yeainuc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeainuc = "C:\\Users\\Admin\\yeainuc.exe /o" yeainuc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeainuc = "C:\\Users\\Admin\\yeainuc.exe /w" yeainuc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\yeainuc = "C:\\Users\\Admin\\yeainuc.exe /p" yeainuc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeainuc = "C:\\Users\\Admin\\yeainuc.exe /q" yeainuc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeainuc = "C:\\Users\\Admin\\yeainuc.exe /k" yeainuc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeainuc = "C:\\Users\\Admin\\yeainuc.exe /y" yeainuc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\yeainuc = "C:\\Users\\Admin\\yeainuc.exe /i" yeainuc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\yeainuc = "C:\\Users\\Admin\\yeainuc.exe /z" yeainuc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeainuc = "C:\\Users\\Admin\\yeainuc.exe /u" yeainuc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeainuc = "C:\\Users\\Admin\\yeainuc.exe /x" 61a11d867777f38d855d1513dcf4895144cc662e901a9757c99c2a550dbc6942.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\yeainuc = "C:\\Users\\Admin\\yeainuc.exe /k" yeainuc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\yeainuc = "C:\\Users\\Admin\\yeainuc.exe /e" yeainuc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\yeainuc = "C:\\Users\\Admin\\yeainuc.exe /n" yeainuc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeainuc = "C:\\Users\\Admin\\yeainuc.exe /r" yeainuc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\yeainuc = "C:\\Users\\Admin\\yeainuc.exe /b" yeainuc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\yeainuc = "C:\\Users\\Admin\\yeainuc.exe /f" yeainuc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeainuc = "C:\\Users\\Admin\\yeainuc.exe /l" yeainuc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeainuc = "C:\\Users\\Admin\\yeainuc.exe /s" yeainuc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\yeainuc = "C:\\Users\\Admin\\yeainuc.exe /j" yeainuc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\yeainuc = "C:\\Users\\Admin\\yeainuc.exe /s" yeainuc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ 61a11d867777f38d855d1513dcf4895144cc662e901a9757c99c2a550dbc6942.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeainuc = "C:\\Users\\Admin\\yeainuc.exe /f" yeainuc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\yeainuc = "C:\\Users\\Admin\\yeainuc.exe /x" yeainuc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeainuc = "C:\\Users\\Admin\\yeainuc.exe /i" yeainuc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\yeainuc = "C:\\Users\\Admin\\yeainuc.exe /w" yeainuc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeainuc = "C:\\Users\\Admin\\yeainuc.exe /a" yeainuc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeainuc = "C:\\Users\\Admin\\yeainuc.exe /n" yeainuc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\yeainuc = "C:\\Users\\Admin\\yeainuc.exe /r" yeainuc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeainuc = "C:\\Users\\Admin\\yeainuc.exe /j" yeainuc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ yeainuc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeainuc = "C:\\Users\\Admin\\yeainuc.exe /m" yeainuc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\yeainuc = "C:\\Users\\Admin\\yeainuc.exe /g" yeainuc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1688 61a11d867777f38d855d1513dcf4895144cc662e901a9757c99c2a550dbc6942.exe 1736 yeainuc.exe 1736 yeainuc.exe 1736 yeainuc.exe 1736 yeainuc.exe 1736 yeainuc.exe 1736 yeainuc.exe 1736 yeainuc.exe 1736 yeainuc.exe 1736 yeainuc.exe 1736 yeainuc.exe 1736 yeainuc.exe 1736 yeainuc.exe 1736 yeainuc.exe 1736 yeainuc.exe 1736 yeainuc.exe 1736 yeainuc.exe 1736 yeainuc.exe 1736 yeainuc.exe 1736 yeainuc.exe 1736 yeainuc.exe 1736 yeainuc.exe 1736 yeainuc.exe 1736 yeainuc.exe 1736 yeainuc.exe 1736 yeainuc.exe 1736 yeainuc.exe 1736 yeainuc.exe 1736 yeainuc.exe 1736 yeainuc.exe 1736 yeainuc.exe 1736 yeainuc.exe 1736 yeainuc.exe 1736 yeainuc.exe 1736 yeainuc.exe 1736 yeainuc.exe 1736 yeainuc.exe 1736 yeainuc.exe 1736 yeainuc.exe 1736 yeainuc.exe 1736 yeainuc.exe 1736 yeainuc.exe 1736 yeainuc.exe 1736 yeainuc.exe 1736 yeainuc.exe 1736 yeainuc.exe 1736 yeainuc.exe 1736 yeainuc.exe 1736 yeainuc.exe 1736 yeainuc.exe 1736 yeainuc.exe 1736 yeainuc.exe 1736 yeainuc.exe 1736 yeainuc.exe 1736 yeainuc.exe 1736 yeainuc.exe 1736 yeainuc.exe 1736 yeainuc.exe 1736 yeainuc.exe 1736 yeainuc.exe 1736 yeainuc.exe 1736 yeainuc.exe 1736 yeainuc.exe 1736 yeainuc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1736 yeainuc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1688 61a11d867777f38d855d1513dcf4895144cc662e901a9757c99c2a550dbc6942.exe 1736 yeainuc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1688 wrote to memory of 1736 1688 61a11d867777f38d855d1513dcf4895144cc662e901a9757c99c2a550dbc6942.exe 27 PID 1688 wrote to memory of 1736 1688 61a11d867777f38d855d1513dcf4895144cc662e901a9757c99c2a550dbc6942.exe 27 PID 1688 wrote to memory of 1736 1688 61a11d867777f38d855d1513dcf4895144cc662e901a9757c99c2a550dbc6942.exe 27 PID 1688 wrote to memory of 1736 1688 61a11d867777f38d855d1513dcf4895144cc662e901a9757c99c2a550dbc6942.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\61a11d867777f38d855d1513dcf4895144cc662e901a9757c99c2a550dbc6942.exe"C:\Users\Admin\AppData\Local\Temp\61a11d867777f38d855d1513dcf4895144cc662e901a9757c99c2a550dbc6942.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\yeainuc.exe"C:\Users\Admin\yeainuc.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1736
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172KB
MD5eea02f4e279390a0ba0a7e1e276bf467
SHA1e18a25c30e8117f4c42ff600ede1ed796e97d4ab
SHA25696b15fcd5930caebb13a4de5474f1959115044d9f3da114ea701e9eb5133ed2d
SHA512b3ec13a78f32439aead49b7338cab5dbace1cf6e2c73d3f1281412e6477998c05e75a1cc1c99121c686d301fc1f36e2836e13d90d6d59450b2d22541f695ae49
-
Filesize
172KB
MD5eea02f4e279390a0ba0a7e1e276bf467
SHA1e18a25c30e8117f4c42ff600ede1ed796e97d4ab
SHA25696b15fcd5930caebb13a4de5474f1959115044d9f3da114ea701e9eb5133ed2d
SHA512b3ec13a78f32439aead49b7338cab5dbace1cf6e2c73d3f1281412e6477998c05e75a1cc1c99121c686d301fc1f36e2836e13d90d6d59450b2d22541f695ae49
-
Filesize
172KB
MD5eea02f4e279390a0ba0a7e1e276bf467
SHA1e18a25c30e8117f4c42ff600ede1ed796e97d4ab
SHA25696b15fcd5930caebb13a4de5474f1959115044d9f3da114ea701e9eb5133ed2d
SHA512b3ec13a78f32439aead49b7338cab5dbace1cf6e2c73d3f1281412e6477998c05e75a1cc1c99121c686d301fc1f36e2836e13d90d6d59450b2d22541f695ae49
-
Filesize
172KB
MD5eea02f4e279390a0ba0a7e1e276bf467
SHA1e18a25c30e8117f4c42ff600ede1ed796e97d4ab
SHA25696b15fcd5930caebb13a4de5474f1959115044d9f3da114ea701e9eb5133ed2d
SHA512b3ec13a78f32439aead49b7338cab5dbace1cf6e2c73d3f1281412e6477998c05e75a1cc1c99121c686d301fc1f36e2836e13d90d6d59450b2d22541f695ae49