Analysis
-
max time kernel
151s -
max time network
79s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
02/12/2022, 19:25
Static task
static1
Behavioral task
behavioral1
Sample
7b3f06aa120fcd168c8de9916f41f7f8835eeffcdf2d68ddad89902697109f8d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7b3f06aa120fcd168c8de9916f41f7f8835eeffcdf2d68ddad89902697109f8d.exe
Resource
win10v2004-20220812-en
General
-
Target
7b3f06aa120fcd168c8de9916f41f7f8835eeffcdf2d68ddad89902697109f8d.exe
-
Size
100KB
-
MD5
3f253e5b4a8b4d5e863ef31dfbac8331
-
SHA1
59254099c6d213c539fbabb35c33a21cea913713
-
SHA256
7b3f06aa120fcd168c8de9916f41f7f8835eeffcdf2d68ddad89902697109f8d
-
SHA512
60ea0b2da816926a2a95ccaf4c55f507dcca92de80a196d50397a50f03ee37e244db2c776d805e7ce66b9bd760003d0ee3cdfa198a9d521b3798c4e8db7b282c
-
SSDEEP
1536:IyW9cX220mQI5xJKIRGWcOUP7vXArnY1ZqAefzyesVNIj/:1hQdNAfzyeOC/
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 7b3f06aa120fcd168c8de9916f41f7f8835eeffcdf2d68ddad89902697109f8d.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" yauinu.exe -
Executes dropped EXE 1 IoCs
pid Process 872 yauinu.exe -
Loads dropped DLL 2 IoCs
pid Process 1600 7b3f06aa120fcd168c8de9916f41f7f8835eeffcdf2d68ddad89902697109f8d.exe 1600 7b3f06aa120fcd168c8de9916f41f7f8835eeffcdf2d68ddad89902697109f8d.exe -
Adds Run key to start application 2 TTPs 54 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\yauinu = "C:\\Users\\Admin\\yauinu.exe /S" yauinu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\yauinu = "C:\\Users\\Admin\\yauinu.exe /U" yauinu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\yauinu = "C:\\Users\\Admin\\yauinu.exe /V" yauinu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\yauinu = "C:\\Users\\Admin\\yauinu.exe /Z" yauinu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\yauinu = "C:\\Users\\Admin\\yauinu.exe /a" yauinu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\yauinu = "C:\\Users\\Admin\\yauinu.exe /H" yauinu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\yauinu = "C:\\Users\\Admin\\yauinu.exe /v" yauinu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\yauinu = "C:\\Users\\Admin\\yauinu.exe /z" yauinu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\yauinu = "C:\\Users\\Admin\\yauinu.exe /I" yauinu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\yauinu = "C:\\Users\\Admin\\yauinu.exe /p" yauinu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\yauinu = "C:\\Users\\Admin\\yauinu.exe /c" yauinu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\yauinu = "C:\\Users\\Admin\\yauinu.exe /u" yauinu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\yauinu = "C:\\Users\\Admin\\yauinu.exe /r" yauinu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\yauinu = "C:\\Users\\Admin\\yauinu.exe /n" yauinu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\yauinu = "C:\\Users\\Admin\\yauinu.exe /b" yauinu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\yauinu = "C:\\Users\\Admin\\yauinu.exe /J" yauinu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\yauinu = "C:\\Users\\Admin\\yauinu.exe /i" yauinu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\yauinu = "C:\\Users\\Admin\\yauinu.exe /A" yauinu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\yauinu = "C:\\Users\\Admin\\yauinu.exe /q" yauinu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\yauinu = "C:\\Users\\Admin\\yauinu.exe /F" yauinu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\yauinu = "C:\\Users\\Admin\\yauinu.exe /P" yauinu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\yauinu = "C:\\Users\\Admin\\yauinu.exe /g" yauinu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\yauinu = "C:\\Users\\Admin\\yauinu.exe /k" yauinu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\yauinu = "C:\\Users\\Admin\\yauinu.exe /j" yauinu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\yauinu = "C:\\Users\\Admin\\yauinu.exe /R" yauinu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\yauinu = "C:\\Users\\Admin\\yauinu.exe /y" yauinu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\yauinu = "C:\\Users\\Admin\\yauinu.exe /M" yauinu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\yauinu = "C:\\Users\\Admin\\yauinu.exe /o" yauinu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\yauinu = "C:\\Users\\Admin\\yauinu.exe /z" 7b3f06aa120fcd168c8de9916f41f7f8835eeffcdf2d68ddad89902697109f8d.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ yauinu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\yauinu = "C:\\Users\\Admin\\yauinu.exe /G" yauinu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\yauinu = "C:\\Users\\Admin\\yauinu.exe /h" yauinu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\yauinu = "C:\\Users\\Admin\\yauinu.exe /L" yauinu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\yauinu = "C:\\Users\\Admin\\yauinu.exe /W" yauinu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\yauinu = "C:\\Users\\Admin\\yauinu.exe /x" yauinu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\yauinu = "C:\\Users\\Admin\\yauinu.exe /T" yauinu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\yauinu = "C:\\Users\\Admin\\yauinu.exe /f" yauinu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\yauinu = "C:\\Users\\Admin\\yauinu.exe /O" yauinu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\yauinu = "C:\\Users\\Admin\\yauinu.exe /l" yauinu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\yauinu = "C:\\Users\\Admin\\yauinu.exe /C" yauinu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\yauinu = "C:\\Users\\Admin\\yauinu.exe /Y" yauinu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\yauinu = "C:\\Users\\Admin\\yauinu.exe /D" yauinu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\yauinu = "C:\\Users\\Admin\\yauinu.exe /K" yauinu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\yauinu = "C:\\Users\\Admin\\yauinu.exe /N" yauinu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\yauinu = "C:\\Users\\Admin\\yauinu.exe /d" yauinu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\yauinu = "C:\\Users\\Admin\\yauinu.exe /w" yauinu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\yauinu = "C:\\Users\\Admin\\yauinu.exe /Q" yauinu.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 7b3f06aa120fcd168c8de9916f41f7f8835eeffcdf2d68ddad89902697109f8d.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\yauinu = "C:\\Users\\Admin\\yauinu.exe /m" yauinu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\yauinu = "C:\\Users\\Admin\\yauinu.exe /B" yauinu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\yauinu = "C:\\Users\\Admin\\yauinu.exe /X" yauinu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\yauinu = "C:\\Users\\Admin\\yauinu.exe /s" yauinu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\yauinu = "C:\\Users\\Admin\\yauinu.exe /e" yauinu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\yauinu = "C:\\Users\\Admin\\yauinu.exe /t" yauinu.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1600 7b3f06aa120fcd168c8de9916f41f7f8835eeffcdf2d68ddad89902697109f8d.exe 872 yauinu.exe 872 yauinu.exe 872 yauinu.exe 872 yauinu.exe 872 yauinu.exe 872 yauinu.exe 872 yauinu.exe 872 yauinu.exe 872 yauinu.exe 872 yauinu.exe 872 yauinu.exe 872 yauinu.exe 872 yauinu.exe 872 yauinu.exe 872 yauinu.exe 872 yauinu.exe 872 yauinu.exe 872 yauinu.exe 872 yauinu.exe 872 yauinu.exe 872 yauinu.exe 872 yauinu.exe 872 yauinu.exe 872 yauinu.exe 872 yauinu.exe 872 yauinu.exe 872 yauinu.exe 872 yauinu.exe 872 yauinu.exe 872 yauinu.exe 872 yauinu.exe 872 yauinu.exe 872 yauinu.exe 872 yauinu.exe 872 yauinu.exe 872 yauinu.exe 872 yauinu.exe 872 yauinu.exe 872 yauinu.exe 872 yauinu.exe 872 yauinu.exe 872 yauinu.exe 872 yauinu.exe 872 yauinu.exe 872 yauinu.exe 872 yauinu.exe 872 yauinu.exe 872 yauinu.exe 872 yauinu.exe 872 yauinu.exe 872 yauinu.exe 872 yauinu.exe 872 yauinu.exe 872 yauinu.exe 872 yauinu.exe 872 yauinu.exe 872 yauinu.exe 872 yauinu.exe 872 yauinu.exe 872 yauinu.exe 872 yauinu.exe 872 yauinu.exe 872 yauinu.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1600 7b3f06aa120fcd168c8de9916f41f7f8835eeffcdf2d68ddad89902697109f8d.exe 872 yauinu.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1600 wrote to memory of 872 1600 7b3f06aa120fcd168c8de9916f41f7f8835eeffcdf2d68ddad89902697109f8d.exe 27 PID 1600 wrote to memory of 872 1600 7b3f06aa120fcd168c8de9916f41f7f8835eeffcdf2d68ddad89902697109f8d.exe 27 PID 1600 wrote to memory of 872 1600 7b3f06aa120fcd168c8de9916f41f7f8835eeffcdf2d68ddad89902697109f8d.exe 27 PID 1600 wrote to memory of 872 1600 7b3f06aa120fcd168c8de9916f41f7f8835eeffcdf2d68ddad89902697109f8d.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b3f06aa120fcd168c8de9916f41f7f8835eeffcdf2d68ddad89902697109f8d.exe"C:\Users\Admin\AppData\Local\Temp\7b3f06aa120fcd168c8de9916f41f7f8835eeffcdf2d68ddad89902697109f8d.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Users\Admin\yauinu.exe"C:\Users\Admin\yauinu.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:872
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
100KB
MD585f8c37d221641c6232219bef264fd6c
SHA1ee617605ddaba1ac44a8bb2a7824bf0f37a312f4
SHA2569c9b6d99ffcdec233a2d7db2ca5947065db1d8d292ff782b5e569d3e7ff81cdf
SHA512064fbace208d96f4abcc7eebbcef45a07d9f9255c74b92fbc7623f97bb6c959da2c7ad0a93e07c11ecdeff115ff064e04247f4871314b4e8ec020ec27d80fc5f
-
Filesize
100KB
MD585f8c37d221641c6232219bef264fd6c
SHA1ee617605ddaba1ac44a8bb2a7824bf0f37a312f4
SHA2569c9b6d99ffcdec233a2d7db2ca5947065db1d8d292ff782b5e569d3e7ff81cdf
SHA512064fbace208d96f4abcc7eebbcef45a07d9f9255c74b92fbc7623f97bb6c959da2c7ad0a93e07c11ecdeff115ff064e04247f4871314b4e8ec020ec27d80fc5f
-
Filesize
100KB
MD585f8c37d221641c6232219bef264fd6c
SHA1ee617605ddaba1ac44a8bb2a7824bf0f37a312f4
SHA2569c9b6d99ffcdec233a2d7db2ca5947065db1d8d292ff782b5e569d3e7ff81cdf
SHA512064fbace208d96f4abcc7eebbcef45a07d9f9255c74b92fbc7623f97bb6c959da2c7ad0a93e07c11ecdeff115ff064e04247f4871314b4e8ec020ec27d80fc5f
-
Filesize
100KB
MD585f8c37d221641c6232219bef264fd6c
SHA1ee617605ddaba1ac44a8bb2a7824bf0f37a312f4
SHA2569c9b6d99ffcdec233a2d7db2ca5947065db1d8d292ff782b5e569d3e7ff81cdf
SHA512064fbace208d96f4abcc7eebbcef45a07d9f9255c74b92fbc7623f97bb6c959da2c7ad0a93e07c11ecdeff115ff064e04247f4871314b4e8ec020ec27d80fc5f