Analysis
-
max time kernel
148s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 06:35
Static task
static1
Behavioral task
behavioral1
Sample
0c03f1eb9aa87628b0a03ff14c094c00.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0c03f1eb9aa87628b0a03ff14c094c00.exe
Resource
win10v2004-20231222-en
General
-
Target
0c03f1eb9aa87628b0a03ff14c094c00.exe
-
Size
156KB
-
MD5
0c03f1eb9aa87628b0a03ff14c094c00
-
SHA1
a9ce55235bf5c872b63c850ddb5b2e321392a80b
-
SHA256
b87eea4264cff25b8b6109fcf07691d18875ba3877eef38a1c6041411b998971
-
SHA512
750dc87ed40b2e3e736f1315d60470fcf3c804664fa0e4bf4649e481dfc2625abe472c03954b69bf3129ed8cad035ec010b39164d53d1bc9d341d500b6ce1cc7
-
SSDEEP
3072:8noxLF6OpMS7yJuu4TrVlpT3rZy93E3ipMdIyH+Y8DuALIXTa4oQZiENa:/x0fJuu4l3rZy93UipMd9+Y8DuZaWu
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 0c03f1eb9aa87628b0a03ff14c094c00.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" yaoeza.exe -
Executes dropped EXE 1 IoCs
pid Process 1756 yaoeza.exe -
Loads dropped DLL 2 IoCs
pid Process 2232 0c03f1eb9aa87628b0a03ff14c094c00.exe 2232 0c03f1eb9aa87628b0a03ff14c094c00.exe -
Adds Run key to start application 2 TTPs 51 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaoeza = "C:\\Users\\Admin\\yaoeza.exe /L" yaoeza.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaoeza = "C:\\Users\\Admin\\yaoeza.exe /m" yaoeza.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaoeza = "C:\\Users\\Admin\\yaoeza.exe /t" yaoeza.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaoeza = "C:\\Users\\Admin\\yaoeza.exe /y" yaoeza.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaoeza = "C:\\Users\\Admin\\yaoeza.exe /J" yaoeza.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaoeza = "C:\\Users\\Admin\\yaoeza.exe /a" yaoeza.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaoeza = "C:\\Users\\Admin\\yaoeza.exe /E" yaoeza.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaoeza = "C:\\Users\\Admin\\yaoeza.exe /x" yaoeza.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaoeza = "C:\\Users\\Admin\\yaoeza.exe /q" yaoeza.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaoeza = "C:\\Users\\Admin\\yaoeza.exe /r" yaoeza.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaoeza = "C:\\Users\\Admin\\yaoeza.exe /e" yaoeza.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaoeza = "C:\\Users\\Admin\\yaoeza.exe /T" yaoeza.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaoeza = "C:\\Users\\Admin\\yaoeza.exe /M" yaoeza.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaoeza = "C:\\Users\\Admin\\yaoeza.exe /c" 0c03f1eb9aa87628b0a03ff14c094c00.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaoeza = "C:\\Users\\Admin\\yaoeza.exe /k" yaoeza.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaoeza = "C:\\Users\\Admin\\yaoeza.exe /z" yaoeza.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaoeza = "C:\\Users\\Admin\\yaoeza.exe /Z" yaoeza.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaoeza = "C:\\Users\\Admin\\yaoeza.exe /l" yaoeza.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaoeza = "C:\\Users\\Admin\\yaoeza.exe /X" yaoeza.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaoeza = "C:\\Users\\Admin\\yaoeza.exe /s" yaoeza.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaoeza = "C:\\Users\\Admin\\yaoeza.exe /D" yaoeza.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaoeza = "C:\\Users\\Admin\\yaoeza.exe /O" yaoeza.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaoeza = "C:\\Users\\Admin\\yaoeza.exe /v" yaoeza.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaoeza = "C:\\Users\\Admin\\yaoeza.exe /W" yaoeza.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaoeza = "C:\\Users\\Admin\\yaoeza.exe /U" yaoeza.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaoeza = "C:\\Users\\Admin\\yaoeza.exe /i" yaoeza.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaoeza = "C:\\Users\\Admin\\yaoeza.exe /G" yaoeza.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaoeza = "C:\\Users\\Admin\\yaoeza.exe /P" yaoeza.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaoeza = "C:\\Users\\Admin\\yaoeza.exe /p" yaoeza.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaoeza = "C:\\Users\\Admin\\yaoeza.exe /B" yaoeza.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaoeza = "C:\\Users\\Admin\\yaoeza.exe /R" yaoeza.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaoeza = "C:\\Users\\Admin\\yaoeza.exe /F" yaoeza.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaoeza = "C:\\Users\\Admin\\yaoeza.exe /b" yaoeza.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaoeza = "C:\\Users\\Admin\\yaoeza.exe /H" yaoeza.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaoeza = "C:\\Users\\Admin\\yaoeza.exe /j" yaoeza.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaoeza = "C:\\Users\\Admin\\yaoeza.exe /Y" yaoeza.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaoeza = "C:\\Users\\Admin\\yaoeza.exe /Q" yaoeza.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaoeza = "C:\\Users\\Admin\\yaoeza.exe /h" yaoeza.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaoeza = "C:\\Users\\Admin\\yaoeza.exe /o" yaoeza.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaoeza = "C:\\Users\\Admin\\yaoeza.exe /C" yaoeza.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaoeza = "C:\\Users\\Admin\\yaoeza.exe /g" yaoeza.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaoeza = "C:\\Users\\Admin\\yaoeza.exe /I" yaoeza.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaoeza = "C:\\Users\\Admin\\yaoeza.exe /w" yaoeza.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaoeza = "C:\\Users\\Admin\\yaoeza.exe /A" yaoeza.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaoeza = "C:\\Users\\Admin\\yaoeza.exe /f" yaoeza.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaoeza = "C:\\Users\\Admin\\yaoeza.exe /N" yaoeza.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaoeza = "C:\\Users\\Admin\\yaoeza.exe /n" yaoeza.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaoeza = "C:\\Users\\Admin\\yaoeza.exe /K" yaoeza.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaoeza = "C:\\Users\\Admin\\yaoeza.exe /u" yaoeza.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaoeza = "C:\\Users\\Admin\\yaoeza.exe /S" yaoeza.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\yaoeza = "C:\\Users\\Admin\\yaoeza.exe /d" yaoeza.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2232 0c03f1eb9aa87628b0a03ff14c094c00.exe 1756 yaoeza.exe 1756 yaoeza.exe 1756 yaoeza.exe 1756 yaoeza.exe 1756 yaoeza.exe 1756 yaoeza.exe 1756 yaoeza.exe 1756 yaoeza.exe 1756 yaoeza.exe 1756 yaoeza.exe 1756 yaoeza.exe 1756 yaoeza.exe 1756 yaoeza.exe 1756 yaoeza.exe 1756 yaoeza.exe 1756 yaoeza.exe 1756 yaoeza.exe 1756 yaoeza.exe 1756 yaoeza.exe 1756 yaoeza.exe 1756 yaoeza.exe 1756 yaoeza.exe 1756 yaoeza.exe 1756 yaoeza.exe 1756 yaoeza.exe 1756 yaoeza.exe 1756 yaoeza.exe 1756 yaoeza.exe 1756 yaoeza.exe 1756 yaoeza.exe 1756 yaoeza.exe 1756 yaoeza.exe 1756 yaoeza.exe 1756 yaoeza.exe 1756 yaoeza.exe 1756 yaoeza.exe 1756 yaoeza.exe 1756 yaoeza.exe 1756 yaoeza.exe 1756 yaoeza.exe 1756 yaoeza.exe 1756 yaoeza.exe 1756 yaoeza.exe 1756 yaoeza.exe 1756 yaoeza.exe 1756 yaoeza.exe 1756 yaoeza.exe 1756 yaoeza.exe 1756 yaoeza.exe 1756 yaoeza.exe 1756 yaoeza.exe 1756 yaoeza.exe 1756 yaoeza.exe 1756 yaoeza.exe 1756 yaoeza.exe 1756 yaoeza.exe 1756 yaoeza.exe 1756 yaoeza.exe 1756 yaoeza.exe 1756 yaoeza.exe 1756 yaoeza.exe 1756 yaoeza.exe 1756 yaoeza.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2232 0c03f1eb9aa87628b0a03ff14c094c00.exe 1756 yaoeza.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2232 wrote to memory of 1756 2232 0c03f1eb9aa87628b0a03ff14c094c00.exe 28 PID 2232 wrote to memory of 1756 2232 0c03f1eb9aa87628b0a03ff14c094c00.exe 28 PID 2232 wrote to memory of 1756 2232 0c03f1eb9aa87628b0a03ff14c094c00.exe 28 PID 2232 wrote to memory of 1756 2232 0c03f1eb9aa87628b0a03ff14c094c00.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c03f1eb9aa87628b0a03ff14c094c00.exe"C:\Users\Admin\AppData\Local\Temp\0c03f1eb9aa87628b0a03ff14c094c00.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\yaoeza.exe"C:\Users\Admin\yaoeza.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD52a4b959dd6fd67bdafe8bc5d001fc162
SHA14dcf906bf2ba4ee20d4a1337cd59fa9293441196
SHA2561f681d5d18ce5b2e13e9ebc8c3035ba2efe39f0ebd66f6ec91bddbe88d200648
SHA512c0bfe844f20bfb51f621094bd7dc4a024444ab9d472d5c2cc530b3c66eca874c01ee1b283068555fa16497e7512c3b0afb25672e582f020ac37a7bc4591890a0
-
Filesize
92KB
MD5860901cc6faac548438ead76c0c581bf
SHA183a9ae661e7bc85e28ff949c9cfca5eda7e0cd76
SHA25641cead75acd87f020917985a47fd0b7db3de2cbe598f48389c79ea7290a2aa00
SHA51296867cd133fd81e46f003a3a8f8aa3b2df5f9167e0e7fb27daf24acb5d2a0359ca56a90ea04c331ea4aafc847326b9f1be021811b1c45189e42f1356033380fc
-
Filesize
156KB
MD53bd8b9480935cbfc44a99b8250aaae4f
SHA10b09d9b9387923a20917d99ea33af57d052e07eb
SHA256fe9f78ca1e8730350e4a73c88d5810428e94a4450be2cede7788a53fe48b7248
SHA51266d42a8a741384102f395e6cf4c00635579a51d29b5f38ea1d6fac089351276afa3727ca8ed47326d4c6056575450cd60def28100c7fa403bfb4d4af06797cc0
-
Filesize
99KB
MD531e52d8513b8125c354e610fdfdbb44d
SHA1674ecd53ec2ea1605742e6239938f34b088831b4
SHA256b91317de326654ad73aec7cfd94fabc11778ecf9b6c9f8be0236daad802f833b
SHA5123ffdc9207f7400d2fe47ab7ac9d9fd0413190ea1196e62aa0ac92072c8a5972096769cdbdb8e767b3df4bc320d634d783afc8ebe87ae34569b68c17db965ce75