Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
25-04-2024 04:11
Static task
static1
Behavioral task
behavioral1
Sample
dccaa3a4c1bf6870ac51f28461750069b39339149b95562d3093fc2573bec787.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
dccaa3a4c1bf6870ac51f28461750069b39339149b95562d3093fc2573bec787.exe
Resource
win10v2004-20240412-en
General
-
Target
dccaa3a4c1bf6870ac51f28461750069b39339149b95562d3093fc2573bec787.exe
-
Size
204KB
-
MD5
9dc85e494b87866a3132ffe13126a129
-
SHA1
75933e0355db4bbca4ef3ea291d4c239d8e8577a
-
SHA256
dccaa3a4c1bf6870ac51f28461750069b39339149b95562d3093fc2573bec787
-
SHA512
0ed69639530bbcc8dc4ccbba704c6fa843625eab149950a2f78a7a90b30a35bee0123d9c6bb057da2c71ed120114784b13e19c589f0efffa0e91a7d1932fad48
-
SSDEEP
3072:Amo8W8J0tQ9nLHbB9W0c1TqECzR/mkSYGrl9ymgYUWOL:bw+4QxL7B9W0c1RCzR/fSml7
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
dccaa3a4c1bf6870ac51f28461750069b39339149b95562d3093fc2573bec787.exeyaouki.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" dccaa3a4c1bf6870ac51f28461750069b39339149b95562d3093fc2573bec787.exe Set value (int) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" yaouki.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
dccaa3a4c1bf6870ac51f28461750069b39339149b95562d3093fc2573bec787.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\Control Panel\International\Geo\Nation dccaa3a4c1bf6870ac51f28461750069b39339149b95562d3093fc2573bec787.exe -
Executes dropped EXE 1 IoCs
Processes:
yaouki.exepid process 3228 yaouki.exe -
Adds Run key to start application 2 TTPs 27 IoCs
Processes:
yaouki.exedccaa3a4c1bf6870ac51f28461750069b39339149b95562d3093fc2573bec787.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaouki = "C:\\Users\\Admin\\yaouki.exe /i" yaouki.exe Set value (str) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaouki = "C:\\Users\\Admin\\yaouki.exe /s" yaouki.exe Set value (str) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaouki = "C:\\Users\\Admin\\yaouki.exe /d" yaouki.exe Set value (str) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaouki = "C:\\Users\\Admin\\yaouki.exe /u" yaouki.exe Set value (str) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaouki = "C:\\Users\\Admin\\yaouki.exe /z" yaouki.exe Set value (str) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaouki = "C:\\Users\\Admin\\yaouki.exe /k" yaouki.exe Set value (str) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaouki = "C:\\Users\\Admin\\yaouki.exe /t" yaouki.exe Set value (str) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaouki = "C:\\Users\\Admin\\yaouki.exe /e" yaouki.exe Set value (str) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaouki = "C:\\Users\\Admin\\yaouki.exe /b" yaouki.exe Set value (str) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaouki = "C:\\Users\\Admin\\yaouki.exe /j" yaouki.exe Set value (str) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaouki = "C:\\Users\\Admin\\yaouki.exe /n" yaouki.exe Set value (str) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaouki = "C:\\Users\\Admin\\yaouki.exe /c" yaouki.exe Set value (str) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaouki = "C:\\Users\\Admin\\yaouki.exe /f" yaouki.exe Set value (str) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaouki = "C:\\Users\\Admin\\yaouki.exe /a" yaouki.exe Set value (str) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaouki = "C:\\Users\\Admin\\yaouki.exe /x" yaouki.exe Set value (str) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaouki = "C:\\Users\\Admin\\yaouki.exe /m" yaouki.exe Set value (str) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaouki = "C:\\Users\\Admin\\yaouki.exe /q" yaouki.exe Set value (str) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaouki = "C:\\Users\\Admin\\yaouki.exe /g" yaouki.exe Set value (str) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaouki = "C:\\Users\\Admin\\yaouki.exe /l" yaouki.exe Set value (str) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaouki = "C:\\Users\\Admin\\yaouki.exe /w" yaouki.exe Set value (str) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaouki = "C:\\Users\\Admin\\yaouki.exe /y" yaouki.exe Set value (str) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaouki = "C:\\Users\\Admin\\yaouki.exe /h" yaouki.exe Set value (str) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaouki = "C:\\Users\\Admin\\yaouki.exe /l" dccaa3a4c1bf6870ac51f28461750069b39339149b95562d3093fc2573bec787.exe Set value (str) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaouki = "C:\\Users\\Admin\\yaouki.exe /v" yaouki.exe Set value (str) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaouki = "C:\\Users\\Admin\\yaouki.exe /o" yaouki.exe Set value (str) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaouki = "C:\\Users\\Admin\\yaouki.exe /r" yaouki.exe Set value (str) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaouki = "C:\\Users\\Admin\\yaouki.exe /p" yaouki.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
dccaa3a4c1bf6870ac51f28461750069b39339149b95562d3093fc2573bec787.exeyaouki.exepid process 3008 dccaa3a4c1bf6870ac51f28461750069b39339149b95562d3093fc2573bec787.exe 3008 dccaa3a4c1bf6870ac51f28461750069b39339149b95562d3093fc2573bec787.exe 3228 yaouki.exe 3228 yaouki.exe 3228 yaouki.exe 3228 yaouki.exe 3228 yaouki.exe 3228 yaouki.exe 3228 yaouki.exe 3228 yaouki.exe 3228 yaouki.exe 3228 yaouki.exe 3228 yaouki.exe 3228 yaouki.exe 3228 yaouki.exe 3228 yaouki.exe 3228 yaouki.exe 3228 yaouki.exe 3228 yaouki.exe 3228 yaouki.exe 3228 yaouki.exe 3228 yaouki.exe 3228 yaouki.exe 3228 yaouki.exe 3228 yaouki.exe 3228 yaouki.exe 3228 yaouki.exe 3228 yaouki.exe 3228 yaouki.exe 3228 yaouki.exe 3228 yaouki.exe 3228 yaouki.exe 3228 yaouki.exe 3228 yaouki.exe 3228 yaouki.exe 3228 yaouki.exe 3228 yaouki.exe 3228 yaouki.exe 3228 yaouki.exe 3228 yaouki.exe 3228 yaouki.exe 3228 yaouki.exe 3228 yaouki.exe 3228 yaouki.exe 3228 yaouki.exe 3228 yaouki.exe 3228 yaouki.exe 3228 yaouki.exe 3228 yaouki.exe 3228 yaouki.exe 3228 yaouki.exe 3228 yaouki.exe 3228 yaouki.exe 3228 yaouki.exe 3228 yaouki.exe 3228 yaouki.exe 3228 yaouki.exe 3228 yaouki.exe 3228 yaouki.exe 3228 yaouki.exe 3228 yaouki.exe 3228 yaouki.exe 3228 yaouki.exe 3228 yaouki.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
dccaa3a4c1bf6870ac51f28461750069b39339149b95562d3093fc2573bec787.exeyaouki.exepid process 3008 dccaa3a4c1bf6870ac51f28461750069b39339149b95562d3093fc2573bec787.exe 3228 yaouki.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
dccaa3a4c1bf6870ac51f28461750069b39339149b95562d3093fc2573bec787.exedescription pid process target process PID 3008 wrote to memory of 3228 3008 dccaa3a4c1bf6870ac51f28461750069b39339149b95562d3093fc2573bec787.exe yaouki.exe PID 3008 wrote to memory of 3228 3008 dccaa3a4c1bf6870ac51f28461750069b39339149b95562d3093fc2573bec787.exe yaouki.exe PID 3008 wrote to memory of 3228 3008 dccaa3a4c1bf6870ac51f28461750069b39339149b95562d3093fc2573bec787.exe yaouki.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dccaa3a4c1bf6870ac51f28461750069b39339149b95562d3093fc2573bec787.exe"C:\Users\Admin\AppData\Local\Temp\dccaa3a4c1bf6870ac51f28461750069b39339149b95562d3093fc2573bec787.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Users\Admin\yaouki.exe"C:\Users\Admin\yaouki.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3228
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD51018926b49f59c73a0b3fe41167ad4ef
SHA1cbfa098c8fabd140a9182aab1aab13aa5f54979e
SHA2560ddadaf3bd8d19fe33981c5b0297ff4962e56e38c7d6e28bd346800351684a81
SHA5121c49484b907668a73e086aa3262794d117d9141d16a65e8a9d7933f31773d15341da43cbd8dd1dd43d8269abcab11efe5dbcf386d760591cf883965ab87f8a45