Analysis
-
max time kernel
190s -
max time network
204s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2022 09:12
Static task
static1
Behavioral task
behavioral1
Sample
9ecb68cb09886f52d9ba0727017ef40414da821906c4925e7c559766fc2a7798.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9ecb68cb09886f52d9ba0727017ef40414da821906c4925e7c559766fc2a7798.exe
Resource
win10v2004-20221111-en
General
-
Target
9ecb68cb09886f52d9ba0727017ef40414da821906c4925e7c559766fc2a7798.exe
-
Size
248KB
-
MD5
badef9f09aef4c8a6dcf7733a07f6de6
-
SHA1
3f688cfbd1bac714fdef18352b017e9998fa389d
-
SHA256
9ecb68cb09886f52d9ba0727017ef40414da821906c4925e7c559766fc2a7798
-
SHA512
9c83b1a6320b0ecb42e622c8bccf8d75c476e8ba365ab2bafd5a7aa038988b6665d06206e6b762b4d53fcef57bc8cf8a8082e333f1267492d2bfff71483af3df
-
SSDEEP
6144:urG4eE4kqADEty4kHuEAXhXyzFyEAv/sJ5UB6+u5onKPU/c/FH98uuO2:uneE4kpgdkOEAXAFHyH/c/FH98
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" yaoim.exe -
Executes dropped EXE 1 IoCs
pid Process 4804 yaoim.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation 9ecb68cb09886f52d9ba0727017ef40414da821906c4925e7c559766fc2a7798.exe -
Adds Run key to start application 2 TTPs 53 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaoim = "C:\\Users\\Admin\\yaoim.exe /P" yaoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaoim = "C:\\Users\\Admin\\yaoim.exe /K" yaoim.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows\CurrentVersion\Run\ yaoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaoim = "C:\\Users\\Admin\\yaoim.exe /G" yaoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaoim = "C:\\Users\\Admin\\yaoim.exe /S" yaoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaoim = "C:\\Users\\Admin\\yaoim.exe /j" yaoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaoim = "C:\\Users\\Admin\\yaoim.exe /i" yaoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaoim = "C:\\Users\\Admin\\yaoim.exe /T" yaoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaoim = "C:\\Users\\Admin\\yaoim.exe /D" yaoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaoim = "C:\\Users\\Admin\\yaoim.exe /m" yaoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaoim = "C:\\Users\\Admin\\yaoim.exe /E" yaoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaoim = "C:\\Users\\Admin\\yaoim.exe /l" yaoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaoim = "C:\\Users\\Admin\\yaoim.exe /Z" yaoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaoim = "C:\\Users\\Admin\\yaoim.exe /t" yaoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaoim = "C:\\Users\\Admin\\yaoim.exe /O" yaoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaoim = "C:\\Users\\Admin\\yaoim.exe /U" yaoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaoim = "C:\\Users\\Admin\\yaoim.exe /o" yaoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaoim = "C:\\Users\\Admin\\yaoim.exe /n" yaoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaoim = "C:\\Users\\Admin\\yaoim.exe /k" yaoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaoim = "C:\\Users\\Admin\\yaoim.exe /a" yaoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaoim = "C:\\Users\\Admin\\yaoim.exe /e" yaoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaoim = "C:\\Users\\Admin\\yaoim.exe /Q" yaoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaoim = "C:\\Users\\Admin\\yaoim.exe /M" yaoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaoim = "C:\\Users\\Admin\\yaoim.exe /Y" yaoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaoim = "C:\\Users\\Admin\\yaoim.exe /s" yaoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaoim = "C:\\Users\\Admin\\yaoim.exe /h" yaoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaoim = "C:\\Users\\Admin\\yaoim.exe /x" yaoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaoim = "C:\\Users\\Admin\\yaoim.exe /I" yaoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaoim = "C:\\Users\\Admin\\yaoim.exe /X" yaoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaoim = "C:\\Users\\Admin\\yaoim.exe /v" yaoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaoim = "C:\\Users\\Admin\\yaoim.exe /H" yaoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaoim = "C:\\Users\\Admin\\yaoim.exe /R" yaoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaoim = "C:\\Users\\Admin\\yaoim.exe /y" yaoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaoim = "C:\\Users\\Admin\\yaoim.exe /r" yaoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaoim = "C:\\Users\\Admin\\yaoim.exe /g" yaoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaoim = "C:\\Users\\Admin\\yaoim.exe /c" yaoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaoim = "C:\\Users\\Admin\\yaoim.exe /f" yaoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaoim = "C:\\Users\\Admin\\yaoim.exe /q" yaoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaoim = "C:\\Users\\Admin\\yaoim.exe /C" yaoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaoim = "C:\\Users\\Admin\\yaoim.exe /N" yaoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaoim = "C:\\Users\\Admin\\yaoim.exe /d" yaoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaoim = "C:\\Users\\Admin\\yaoim.exe /w" yaoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaoim = "C:\\Users\\Admin\\yaoim.exe /p" yaoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaoim = "C:\\Users\\Admin\\yaoim.exe /J" yaoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaoim = "C:\\Users\\Admin\\yaoim.exe /L" yaoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaoim = "C:\\Users\\Admin\\yaoim.exe /u" yaoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaoim = "C:\\Users\\Admin\\yaoim.exe /A" yaoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaoim = "C:\\Users\\Admin\\yaoim.exe /B" yaoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaoim = "C:\\Users\\Admin\\yaoim.exe /z" yaoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaoim = "C:\\Users\\Admin\\yaoim.exe /V" yaoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaoim = "C:\\Users\\Admin\\yaoim.exe /F" yaoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaoim = "C:\\Users\\Admin\\yaoim.exe /b" yaoim.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaoim = "C:\\Users\\Admin\\yaoim.exe /W" yaoim.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4804 yaoim.exe 4804 yaoim.exe 4804 yaoim.exe 4804 yaoim.exe 4804 yaoim.exe 4804 yaoim.exe 4804 yaoim.exe 4804 yaoim.exe 4804 yaoim.exe 4804 yaoim.exe 4804 yaoim.exe 4804 yaoim.exe 4804 yaoim.exe 4804 yaoim.exe 4804 yaoim.exe 4804 yaoim.exe 4804 yaoim.exe 4804 yaoim.exe 4804 yaoim.exe 4804 yaoim.exe 4804 yaoim.exe 4804 yaoim.exe 4804 yaoim.exe 4804 yaoim.exe 4804 yaoim.exe 4804 yaoim.exe 4804 yaoim.exe 4804 yaoim.exe 4804 yaoim.exe 4804 yaoim.exe 4804 yaoim.exe 4804 yaoim.exe 4804 yaoim.exe 4804 yaoim.exe 4804 yaoim.exe 4804 yaoim.exe 4804 yaoim.exe 4804 yaoim.exe 4804 yaoim.exe 4804 yaoim.exe 4804 yaoim.exe 4804 yaoim.exe 4804 yaoim.exe 4804 yaoim.exe 4804 yaoim.exe 4804 yaoim.exe 4804 yaoim.exe 4804 yaoim.exe 4804 yaoim.exe 4804 yaoim.exe 4804 yaoim.exe 4804 yaoim.exe 4804 yaoim.exe 4804 yaoim.exe 4804 yaoim.exe 4804 yaoim.exe 4804 yaoim.exe 4804 yaoim.exe 4804 yaoim.exe 4804 yaoim.exe 4804 yaoim.exe 4804 yaoim.exe 4804 yaoim.exe 4804 yaoim.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 344 9ecb68cb09886f52d9ba0727017ef40414da821906c4925e7c559766fc2a7798.exe 4804 yaoim.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 344 wrote to memory of 4804 344 9ecb68cb09886f52d9ba0727017ef40414da821906c4925e7c559766fc2a7798.exe 83 PID 344 wrote to memory of 4804 344 9ecb68cb09886f52d9ba0727017ef40414da821906c4925e7c559766fc2a7798.exe 83 PID 344 wrote to memory of 4804 344 9ecb68cb09886f52d9ba0727017ef40414da821906c4925e7c559766fc2a7798.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\9ecb68cb09886f52d9ba0727017ef40414da821906c4925e7c559766fc2a7798.exe"C:\Users\Admin\AppData\Local\Temp\9ecb68cb09886f52d9ba0727017ef40414da821906c4925e7c559766fc2a7798.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:344 -
C:\Users\Admin\yaoim.exe"C:\Users\Admin\yaoim.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4804
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
248KB
MD5bbee8337438fce90b649914a99cc3733
SHA1b8052508e4bec01c2635b52db676c1fad4f08f42
SHA2564d2a0c026a0aa851f12a7bf603214db8d922359151a82f367f58a71c7604d181
SHA5123ee776f42071187d44add70c9aa596d2e7db57554bfec21928ca4f2bbf15fd190e8eb29015cc531aba3b4e66fe638f0b3c4db25c7dc840c556ad1830db14da58
-
Filesize
248KB
MD5bbee8337438fce90b649914a99cc3733
SHA1b8052508e4bec01c2635b52db676c1fad4f08f42
SHA2564d2a0c026a0aa851f12a7bf603214db8d922359151a82f367f58a71c7604d181
SHA5123ee776f42071187d44add70c9aa596d2e7db57554bfec21928ca4f2bbf15fd190e8eb29015cc531aba3b4e66fe638f0b3c4db25c7dc840c556ad1830db14da58