Analysis
-
max time kernel
150s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2023, 23:35
Static task
static1
Behavioral task
behavioral1
Sample
yandere.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
yandere.exe
Resource
win10v2004-20230915-en
General
-
Target
yandere.exe
-
Size
496KB
-
MD5
771bb53824809e438fa9c6be25a04ca1
-
SHA1
8863a0bde8db7e563ecbcfb32207eab5f94253d2
-
SHA256
d85a9526b3eb9c38f7f5dc77ec40c9778e19939bfda294d25a365a743c4a5434
-
SHA512
0f4821fd842a232274e000e2c8409341f3db2b5c063a114d5d692ce77b13f4b97b22f7230099b6d6ed93e2ca39ab0d69393b7ac0c04955389e7d61dcadb8353b
-
SSDEEP
12288:ei1adC/4FqQ6VhmyRjcFDmE0cAfoQjcSMIBWcNYGUbrNZI4jk4eUq+IM:3ad6dNBR3c/9Rk/
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation yandere.exe -
Executes dropped EXE 1 IoCs
pid Process 5084 PASMU7J.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PASMU7J.exe Key opened \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PASMU7J.exe Key opened \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PASMU7J.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 34 checkip.dyndns.org -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5084 PASMU7J.exe 5084 PASMU7J.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5084 PASMU7J.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5084 PASMU7J.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1476 wrote to memory of 5084 1476 yandere.exe 88 PID 1476 wrote to memory of 5084 1476 yandere.exe 88 PID 1476 wrote to memory of 5084 1476 yandere.exe 88 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PASMU7J.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PASMU7J.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\yandere.exe"C:\Users\Admin\AppData\Local\Temp\yandere.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\PASMU7J.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\PASMU7J.exe"2⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:5084
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\PASMU7J.exe
Filesize183KB
MD5d3b2d4c4fedc2f8305309e8e77cfd6da
SHA11b67d5c174ca90e4996980c1a10892408f6f82be
SHA2569688528dbaf75125004db4392eef3a26774f3b41eebfd88092075f1c7357ea36
SHA5128a7b7e5defb182d700abfe941798d4b675c998ee8f77946a9a24281414f1e0847ae0f9b22b5454a03f9d7dfa714dfc0af94bf459464497c13f1f85ad60c9bfd0
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\PASMU7J.exe
Filesize183KB
MD5d3b2d4c4fedc2f8305309e8e77cfd6da
SHA11b67d5c174ca90e4996980c1a10892408f6f82be
SHA2569688528dbaf75125004db4392eef3a26774f3b41eebfd88092075f1c7357ea36
SHA5128a7b7e5defb182d700abfe941798d4b675c998ee8f77946a9a24281414f1e0847ae0f9b22b5454a03f9d7dfa714dfc0af94bf459464497c13f1f85ad60c9bfd0
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\PASMU7J.exe
Filesize183KB
MD5d3b2d4c4fedc2f8305309e8e77cfd6da
SHA11b67d5c174ca90e4996980c1a10892408f6f82be
SHA2569688528dbaf75125004db4392eef3a26774f3b41eebfd88092075f1c7357ea36
SHA5128a7b7e5defb182d700abfe941798d4b675c998ee8f77946a9a24281414f1e0847ae0f9b22b5454a03f9d7dfa714dfc0af94bf459464497c13f1f85ad60c9bfd0