Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 13:55

General

  • Target

    237174cd4363f3d3355102e1da29126a.exe

  • Size

    108KB

  • MD5

    237174cd4363f3d3355102e1da29126a

  • SHA1

    2162f6a590721c3838a472fce27d09bbaab4a7a8

  • SHA256

    38fdebcb05a196d604ffd3646a3336585ab90d7e0d8b20bab5c12f318ab694a3

  • SHA512

    5a5c3c54b0823eb508ce6f55ee9ca4adf58be504da3aeedc17fcf432a265e0d87f2b1c1c61600ba9d145315604aec8fb599018b57823574c5885094ee9002a1d

  • SSDEEP

    1536:MBPKiB6oQ7Lh5+sXmNt0ttJPXLq0zTrkC:0PmoIeZt0XTzToC

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\237174cd4363f3d3355102e1da29126a.exe
    "C:\Users\Admin\AppData\Local\Temp\237174cd4363f3d3355102e1da29126a.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2128
    • C:\Users\Admin\yaokea.exe
      "C:\Users\Admin\yaokea.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3068

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\yaokea.exe

    Filesize

    108KB

    MD5

    f23e750e17a43ec149ce1789888875ff

    SHA1

    96c21d435e23c165939bda8aa4236012ddff5886

    SHA256

    b55122b1b6b12012020e592f01d0cf9643079e73e372f7532b08797b9e9a296f

    SHA512

    3d0eebc068cfcf0974ddd5a34f880fe818aad0727ecfbf82ae0095ca0cf273b91e996d5bbe45d6aa237b0169a2b122bfa96ef756bcc53a5b8e28ee45a8773c65