Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01/01/2024, 00:51
Static task
static1
Behavioral task
behavioral1
Sample
3b7fdeb5413f5df6998ae77d89739eda.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3b7fdeb5413f5df6998ae77d89739eda.exe
Resource
win10v2004-20231215-en
General
-
Target
3b7fdeb5413f5df6998ae77d89739eda.exe
-
Size
312KB
-
MD5
3b7fdeb5413f5df6998ae77d89739eda
-
SHA1
1a40300c4bafd77adbe65bc7ec55caf8f49267f8
-
SHA256
03e9c808fe4ebba04980328fd47e8e4d8111387b03a3820284d4cbbec01d2179
-
SHA512
6744565f20b56a913757aee86a151fb4cf33872cfe670113215b66c992848342ccad7ebb34ffa876cdefd617319a2cde47bba484fa995104e72deb3affffc4de
-
SSDEEP
6144:xUbc0f7XP+g3AGJpWVzuORHeEgRK/fObT/bGiJKv6R7MkZ4lUr8W9HuOGKqvsMMJ:ew27/XvLWpuMeEgRK/fObT/bGiJlMkZp
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 3b7fdeb5413f5df6998ae77d89739eda.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" yeaakew.exe -
Executes dropped EXE 1 IoCs
pid Process 3060 yeaakew.exe -
Loads dropped DLL 2 IoCs
pid Process 2088 3b7fdeb5413f5df6998ae77d89739eda.exe 2088 3b7fdeb5413f5df6998ae77d89739eda.exe -
Adds Run key to start application 2 TTPs 50 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeaakew = "C:\\Users\\Admin\\yeaakew.exe /e" yeaakew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeaakew = "C:\\Users\\Admin\\yeaakew.exe /M" yeaakew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeaakew = "C:\\Users\\Admin\\yeaakew.exe /z" yeaakew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeaakew = "C:\\Users\\Admin\\yeaakew.exe /L" yeaakew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeaakew = "C:\\Users\\Admin\\yeaakew.exe /T" yeaakew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeaakew = "C:\\Users\\Admin\\yeaakew.exe /n" yeaakew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeaakew = "C:\\Users\\Admin\\yeaakew.exe /h" yeaakew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeaakew = "C:\\Users\\Admin\\yeaakew.exe /I" yeaakew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeaakew = "C:\\Users\\Admin\\yeaakew.exe /R" yeaakew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeaakew = "C:\\Users\\Admin\\yeaakew.exe /d" yeaakew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeaakew = "C:\\Users\\Admin\\yeaakew.exe /v" yeaakew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeaakew = "C:\\Users\\Admin\\yeaakew.exe /K" yeaakew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeaakew = "C:\\Users\\Admin\\yeaakew.exe /U" yeaakew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeaakew = "C:\\Users\\Admin\\yeaakew.exe /f" yeaakew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeaakew = "C:\\Users\\Admin\\yeaakew.exe /y" yeaakew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeaakew = "C:\\Users\\Admin\\yeaakew.exe /c" yeaakew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeaakew = "C:\\Users\\Admin\\yeaakew.exe /q" yeaakew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeaakew = "C:\\Users\\Admin\\yeaakew.exe /G" yeaakew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeaakew = "C:\\Users\\Admin\\yeaakew.exe /O" yeaakew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeaakew = "C:\\Users\\Admin\\yeaakew.exe /w" yeaakew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeaakew = "C:\\Users\\Admin\\yeaakew.exe /l" yeaakew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeaakew = "C:\\Users\\Admin\\yeaakew.exe /B" yeaakew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeaakew = "C:\\Users\\Admin\\yeaakew.exe /u" yeaakew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeaakew = "C:\\Users\\Admin\\yeaakew.exe /N" yeaakew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeaakew = "C:\\Users\\Admin\\yeaakew.exe /Z" yeaakew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeaakew = "C:\\Users\\Admin\\yeaakew.exe /a" yeaakew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeaakew = "C:\\Users\\Admin\\yeaakew.exe /W" yeaakew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeaakew = "C:\\Users\\Admin\\yeaakew.exe /s" yeaakew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeaakew = "C:\\Users\\Admin\\yeaakew.exe /E" yeaakew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeaakew = "C:\\Users\\Admin\\yeaakew.exe /A" yeaakew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeaakew = "C:\\Users\\Admin\\yeaakew.exe /P" yeaakew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeaakew = "C:\\Users\\Admin\\yeaakew.exe /Q" yeaakew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeaakew = "C:\\Users\\Admin\\yeaakew.exe /g" yeaakew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeaakew = "C:\\Users\\Admin\\yeaakew.exe /S" yeaakew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeaakew = "C:\\Users\\Admin\\yeaakew.exe /x" yeaakew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeaakew = "C:\\Users\\Admin\\yeaakew.exe /t" yeaakew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeaakew = "C:\\Users\\Admin\\yeaakew.exe /Y" yeaakew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeaakew = "C:\\Users\\Admin\\yeaakew.exe /D" yeaakew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeaakew = "C:\\Users\\Admin\\yeaakew.exe /H" yeaakew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeaakew = "C:\\Users\\Admin\\yeaakew.exe /X" yeaakew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeaakew = "C:\\Users\\Admin\\yeaakew.exe /p" yeaakew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeaakew = "C:\\Users\\Admin\\yeaakew.exe /j" yeaakew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeaakew = "C:\\Users\\Admin\\yeaakew.exe /o" yeaakew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeaakew = "C:\\Users\\Admin\\yeaakew.exe /C" yeaakew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeaakew = "C:\\Users\\Admin\\yeaakew.exe /X" 3b7fdeb5413f5df6998ae77d89739eda.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeaakew = "C:\\Users\\Admin\\yeaakew.exe /i" yeaakew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeaakew = "C:\\Users\\Admin\\yeaakew.exe /m" yeaakew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeaakew = "C:\\Users\\Admin\\yeaakew.exe /b" yeaakew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeaakew = "C:\\Users\\Admin\\yeaakew.exe /F" yeaakew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeaakew = "C:\\Users\\Admin\\yeaakew.exe /V" yeaakew.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2088 3b7fdeb5413f5df6998ae77d89739eda.exe 3060 yeaakew.exe 3060 yeaakew.exe 3060 yeaakew.exe 3060 yeaakew.exe 3060 yeaakew.exe 3060 yeaakew.exe 3060 yeaakew.exe 3060 yeaakew.exe 3060 yeaakew.exe 3060 yeaakew.exe 3060 yeaakew.exe 3060 yeaakew.exe 3060 yeaakew.exe 3060 yeaakew.exe 3060 yeaakew.exe 3060 yeaakew.exe 3060 yeaakew.exe 3060 yeaakew.exe 3060 yeaakew.exe 3060 yeaakew.exe 3060 yeaakew.exe 3060 yeaakew.exe 3060 yeaakew.exe 3060 yeaakew.exe 3060 yeaakew.exe 3060 yeaakew.exe 3060 yeaakew.exe 3060 yeaakew.exe 3060 yeaakew.exe 3060 yeaakew.exe 3060 yeaakew.exe 3060 yeaakew.exe 3060 yeaakew.exe 3060 yeaakew.exe 3060 yeaakew.exe 3060 yeaakew.exe 3060 yeaakew.exe 3060 yeaakew.exe 3060 yeaakew.exe 3060 yeaakew.exe 3060 yeaakew.exe 3060 yeaakew.exe 3060 yeaakew.exe 3060 yeaakew.exe 3060 yeaakew.exe 3060 yeaakew.exe 3060 yeaakew.exe 3060 yeaakew.exe 3060 yeaakew.exe 3060 yeaakew.exe 3060 yeaakew.exe 3060 yeaakew.exe 3060 yeaakew.exe 3060 yeaakew.exe 3060 yeaakew.exe 3060 yeaakew.exe 3060 yeaakew.exe 3060 yeaakew.exe 3060 yeaakew.exe 3060 yeaakew.exe 3060 yeaakew.exe 3060 yeaakew.exe 3060 yeaakew.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2088 3b7fdeb5413f5df6998ae77d89739eda.exe 3060 yeaakew.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2088 wrote to memory of 3060 2088 3b7fdeb5413f5df6998ae77d89739eda.exe 28 PID 2088 wrote to memory of 3060 2088 3b7fdeb5413f5df6998ae77d89739eda.exe 28 PID 2088 wrote to memory of 3060 2088 3b7fdeb5413f5df6998ae77d89739eda.exe 28 PID 2088 wrote to memory of 3060 2088 3b7fdeb5413f5df6998ae77d89739eda.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b7fdeb5413f5df6998ae77d89739eda.exe"C:\Users\Admin\AppData\Local\Temp\3b7fdeb5413f5df6998ae77d89739eda.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Users\Admin\yeaakew.exe"C:\Users\Admin\yeaakew.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
312KB
MD5929741358980be26d2b278fcf5f722df
SHA1d051392da5d23dde16daede499fb447f79c5b8e1
SHA2568ef0f65b27d8e235ce7de5070b7d9f11d0bdc3974abba06f80829068d12f4450
SHA5127b2d86df81d009517624b3c496561b6d62c4cb2a59050040676e2bd0674084c9fa2d8a32ebc66305bd211739c69736d7c1e1868338eb1e5711d1399fd0c70011