Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
10/03/2024, 20:58
Static task
static1
Behavioral task
behavioral1
Sample
48bc784a13d9c6dfd371e9e12e8886126826750185543d94bdb2e585ad92112d.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
48bc784a13d9c6dfd371e9e12e8886126826750185543d94bdb2e585ad92112d.exe
Resource
win10v2004-20240226-en
General
-
Target
48bc784a13d9c6dfd371e9e12e8886126826750185543d94bdb2e585ad92112d.exe
-
Size
257KB
-
MD5
1da3c41b8f0a1a49b39b45b0e4f361cd
-
SHA1
c89d0f754e7a552f4924e3295e569255a5206db2
-
SHA256
48bc784a13d9c6dfd371e9e12e8886126826750185543d94bdb2e585ad92112d
-
SHA512
38a444ccfaf7699a7367571795bf6a0d32a72a0b617751ba6af914e62d9088d766a6a05b6c7fb074d4e31ef354c715779e14cc2584d3b714e01896db6cdb7717
-
SSDEEP
6144:F0tFwzWQx2+OMcppIRW30d+h8wZ2Uf/T11cradKtvr1K/fObT/bGipKgJJeZ4cAn:4FwtOMcppIRW3M+hwUf/Z1craduvr1Ka
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 48bc784a13d9c6dfd371e9e12e8886126826750185543d94bdb2e585ad92112d.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" yiajieb.exe -
Executes dropped EXE 1 IoCs
pid Process 2192 yiajieb.exe -
Loads dropped DLL 2 IoCs
pid Process 1688 48bc784a13d9c6dfd371e9e12e8886126826750185543d94bdb2e585ad92112d.exe 1688 48bc784a13d9c6dfd371e9e12e8886126826750185543d94bdb2e585ad92112d.exe -
Adds Run key to start application 2 TTPs 53 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\yiajieb = "C:\\Users\\Admin\\yiajieb.exe /K" yiajieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\yiajieb = "C:\\Users\\Admin\\yiajieb.exe /r" yiajieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\yiajieb = "C:\\Users\\Admin\\yiajieb.exe /t" yiajieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\yiajieb = "C:\\Users\\Admin\\yiajieb.exe /D" yiajieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\yiajieb = "C:\\Users\\Admin\\yiajieb.exe /c" yiajieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\yiajieb = "C:\\Users\\Admin\\yiajieb.exe /x" 48bc784a13d9c6dfd371e9e12e8886126826750185543d94bdb2e585ad92112d.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\yiajieb = "C:\\Users\\Admin\\yiajieb.exe /f" yiajieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\yiajieb = "C:\\Users\\Admin\\yiajieb.exe /q" yiajieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\yiajieb = "C:\\Users\\Admin\\yiajieb.exe /F" yiajieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\yiajieb = "C:\\Users\\Admin\\yiajieb.exe /O" yiajieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\yiajieb = "C:\\Users\\Admin\\yiajieb.exe /W" yiajieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\yiajieb = "C:\\Users\\Admin\\yiajieb.exe /N" yiajieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\yiajieb = "C:\\Users\\Admin\\yiajieb.exe /E" yiajieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\yiajieb = "C:\\Users\\Admin\\yiajieb.exe /b" yiajieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\yiajieb = "C:\\Users\\Admin\\yiajieb.exe /A" yiajieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\yiajieb = "C:\\Users\\Admin\\yiajieb.exe /z" yiajieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\yiajieb = "C:\\Users\\Admin\\yiajieb.exe /I" yiajieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\yiajieb = "C:\\Users\\Admin\\yiajieb.exe /i" yiajieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\yiajieb = "C:\\Users\\Admin\\yiajieb.exe /B" yiajieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\yiajieb = "C:\\Users\\Admin\\yiajieb.exe /H" yiajieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\yiajieb = "C:\\Users\\Admin\\yiajieb.exe /U" yiajieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\yiajieb = "C:\\Users\\Admin\\yiajieb.exe /k" yiajieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\yiajieb = "C:\\Users\\Admin\\yiajieb.exe /v" yiajieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\yiajieb = "C:\\Users\\Admin\\yiajieb.exe /p" yiajieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\yiajieb = "C:\\Users\\Admin\\yiajieb.exe /J" yiajieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\yiajieb = "C:\\Users\\Admin\\yiajieb.exe /Y" yiajieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\yiajieb = "C:\\Users\\Admin\\yiajieb.exe /l" yiajieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\yiajieb = "C:\\Users\\Admin\\yiajieb.exe /j" yiajieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\yiajieb = "C:\\Users\\Admin\\yiajieb.exe /R" yiajieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\yiajieb = "C:\\Users\\Admin\\yiajieb.exe /G" yiajieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\yiajieb = "C:\\Users\\Admin\\yiajieb.exe /n" yiajieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\yiajieb = "C:\\Users\\Admin\\yiajieb.exe /h" yiajieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\yiajieb = "C:\\Users\\Admin\\yiajieb.exe /a" yiajieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\yiajieb = "C:\\Users\\Admin\\yiajieb.exe /d" yiajieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\yiajieb = "C:\\Users\\Admin\\yiajieb.exe /C" yiajieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\yiajieb = "C:\\Users\\Admin\\yiajieb.exe /T" yiajieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\yiajieb = "C:\\Users\\Admin\\yiajieb.exe /m" yiajieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\yiajieb = "C:\\Users\\Admin\\yiajieb.exe /X" yiajieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\yiajieb = "C:\\Users\\Admin\\yiajieb.exe /u" yiajieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\yiajieb = "C:\\Users\\Admin\\yiajieb.exe /S" yiajieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\yiajieb = "C:\\Users\\Admin\\yiajieb.exe /x" yiajieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\yiajieb = "C:\\Users\\Admin\\yiajieb.exe /M" yiajieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\yiajieb = "C:\\Users\\Admin\\yiajieb.exe /g" yiajieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\yiajieb = "C:\\Users\\Admin\\yiajieb.exe /P" yiajieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\yiajieb = "C:\\Users\\Admin\\yiajieb.exe /L" yiajieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\yiajieb = "C:\\Users\\Admin\\yiajieb.exe /Z" yiajieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\yiajieb = "C:\\Users\\Admin\\yiajieb.exe /o" yiajieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\yiajieb = "C:\\Users\\Admin\\yiajieb.exe /w" yiajieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\yiajieb = "C:\\Users\\Admin\\yiajieb.exe /y" yiajieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\yiajieb = "C:\\Users\\Admin\\yiajieb.exe /V" yiajieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\yiajieb = "C:\\Users\\Admin\\yiajieb.exe /s" yiajieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\yiajieb = "C:\\Users\\Admin\\yiajieb.exe /Q" yiajieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\yiajieb = "C:\\Users\\Admin\\yiajieb.exe /e" yiajieb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1688 48bc784a13d9c6dfd371e9e12e8886126826750185543d94bdb2e585ad92112d.exe 2192 yiajieb.exe 2192 yiajieb.exe 2192 yiajieb.exe 2192 yiajieb.exe 2192 yiajieb.exe 2192 yiajieb.exe 2192 yiajieb.exe 2192 yiajieb.exe 2192 yiajieb.exe 2192 yiajieb.exe 2192 yiajieb.exe 2192 yiajieb.exe 2192 yiajieb.exe 2192 yiajieb.exe 2192 yiajieb.exe 2192 yiajieb.exe 2192 yiajieb.exe 2192 yiajieb.exe 2192 yiajieb.exe 2192 yiajieb.exe 2192 yiajieb.exe 2192 yiajieb.exe 2192 yiajieb.exe 2192 yiajieb.exe 2192 yiajieb.exe 2192 yiajieb.exe 2192 yiajieb.exe 2192 yiajieb.exe 2192 yiajieb.exe 2192 yiajieb.exe 2192 yiajieb.exe 2192 yiajieb.exe 2192 yiajieb.exe 2192 yiajieb.exe 2192 yiajieb.exe 2192 yiajieb.exe 2192 yiajieb.exe 2192 yiajieb.exe 2192 yiajieb.exe 2192 yiajieb.exe 2192 yiajieb.exe 2192 yiajieb.exe 2192 yiajieb.exe 2192 yiajieb.exe 2192 yiajieb.exe 2192 yiajieb.exe 2192 yiajieb.exe 2192 yiajieb.exe 2192 yiajieb.exe 2192 yiajieb.exe 2192 yiajieb.exe 2192 yiajieb.exe 2192 yiajieb.exe 2192 yiajieb.exe 2192 yiajieb.exe 2192 yiajieb.exe 2192 yiajieb.exe 2192 yiajieb.exe 2192 yiajieb.exe 2192 yiajieb.exe 2192 yiajieb.exe 2192 yiajieb.exe 2192 yiajieb.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1688 48bc784a13d9c6dfd371e9e12e8886126826750185543d94bdb2e585ad92112d.exe 2192 yiajieb.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1688 wrote to memory of 2192 1688 48bc784a13d9c6dfd371e9e12e8886126826750185543d94bdb2e585ad92112d.exe 28 PID 1688 wrote to memory of 2192 1688 48bc784a13d9c6dfd371e9e12e8886126826750185543d94bdb2e585ad92112d.exe 28 PID 1688 wrote to memory of 2192 1688 48bc784a13d9c6dfd371e9e12e8886126826750185543d94bdb2e585ad92112d.exe 28 PID 1688 wrote to memory of 2192 1688 48bc784a13d9c6dfd371e9e12e8886126826750185543d94bdb2e585ad92112d.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\48bc784a13d9c6dfd371e9e12e8886126826750185543d94bdb2e585ad92112d.exe"C:\Users\Admin\AppData\Local\Temp\48bc784a13d9c6dfd371e9e12e8886126826750185543d94bdb2e585ad92112d.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\yiajieb.exe"C:\Users\Admin\yiajieb.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2192
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
257KB
MD5e60b4e0fec3560bfa509bc4d0354d90b
SHA1a7177744c514d347b6a8f4d4fe0b9e6d2a399bbf
SHA25696d56e5596859da3039c6d66dd57380f83e850cb7b42ca75546d080c763c54cb
SHA512f1e411913e5bc7b0abad2e6137861876e7dad01fdfffa33feaf5ac790db8010be9b3db817737ab5906ac16d6a36de06596c39cf3932e527c08941247fbf2572c