Overview
overview
6Static
static
1ReYANG-main.zip
windows7-x64
6ReYANG-main.zip
windows10-2004-x64
1ReYANG-mai...ignore
windows7-x64
3ReYANG-mai...ignore
windows10-2004-x64
3ReYANG-mai...erfile
windows7-x64
1ReYANG-mai...erfile
windows10-2004-x64
1ReYANG-main/LICENSE
windows7-x64
1ReYANG-main/LICENSE
windows10-2004-x64
1ReYANG-main/README.md
windows7-x64
3ReYANG-main/README.md
windows10-2004-x64
3ReYANG-main/app.js
windows7-x64
3ReYANG-main/app.js
windows10-2004-x64
3ReYANG-mai...ig.yml
windows7-x64
3ReYANG-mai...ig.yml
windows10-2004-x64
3ReYANG-mai...k.json
windows7-x64
3ReYANG-mai...k.json
windows10-2004-x64
3ReYANG-mai...e.json
windows7-x64
3ReYANG-mai...e.json
windows10-2004-x64
3ReYANG-mai...ons.js
windows7-x64
3ReYANG-mai...ons.js
windows10-2004-x64
3ReYANG-mai...ger.js
windows7-x64
3ReYANG-mai...ger.js
windows10-2004-x64
3ReYANG-mai...ker.js
windows7-x64
3ReYANG-mai...ker.js
windows10-2004-x64
3ReYANG-mai...per.js
windows7-x64
3ReYANG-mai...per.js
windows10-2004-x64
3Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02-05-2024 11:05
Static task
static1
Behavioral task
behavioral1
Sample
ReYANG-main.zip
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
ReYANG-main.zip
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
ReYANG-main/.gitignore
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
ReYANG-main/.gitignore
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
ReYANG-main/Dockerfile
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
ReYANG-main/Dockerfile
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
ReYANG-main/LICENSE
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
ReYANG-main/LICENSE
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
ReYANG-main/README.md
Resource
win7-20240419-en
Behavioral task
behavioral10
Sample
ReYANG-main/README.md
Resource
win10v2004-20240419-en
Behavioral task
behavioral11
Sample
ReYANG-main/app.js
Resource
win7-20240220-en
Behavioral task
behavioral12
Sample
ReYANG-main/app.js
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
ReYANG-main/config.yml
Resource
win7-20231129-en
Behavioral task
behavioral14
Sample
ReYANG-main/config.yml
Resource
win10v2004-20240419-en
Behavioral task
behavioral15
Sample
ReYANG-main/package-lock.json
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
ReYANG-main/package-lock.json
Resource
win10v2004-20240419-en
Behavioral task
behavioral17
Sample
ReYANG-main/package.json
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
ReYANG-main/package.json
Resource
win10v2004-20240419-en
Behavioral task
behavioral19
Sample
ReYANG-main/utils/functions.js
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
ReYANG-main/utils/functions.js
Resource
win10v2004-20240419-en
Behavioral task
behavioral21
Sample
ReYANG-main/utils/logger.js
Resource
win7-20231129-en
Behavioral task
behavioral22
Sample
ReYANG-main/utils/logger.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
ReYANG-main/utils/proxy-checker.js
Resource
win7-20240419-en
Behavioral task
behavioral24
Sample
ReYANG-main/utils/proxy-checker.js
Resource
win10v2004-20240426-en
Behavioral task
behavioral25
Sample
ReYANG-main/utils/proxy-scrapper.js
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
ReYANG-main/utils/proxy-scrapper.js
Resource
win10v2004-20240419-en
General
-
Target
ReYANG-main/package-lock.json
-
Size
41KB
-
MD5
55066e177f2dc78cc47e9297fc162970
-
SHA1
18330c8f1e9c45c359ba8d26d193b0cadb2ce7f2
-
SHA256
d03bea5ed9a10493e2d5f0fd66c36aa319f1f35b5a1e99b293310c4cdfc8bf63
-
SHA512
fac9128c40da95b1368d99020aabb510ac62d9d570d81efb80a1e5cfa098518ae08dca76ea8dc43141edc1ade5f0a1a8e2e18b67f65e4a459e74be5af04f5a8a
-
SSDEEP
384:zlqZ6g0wc+oddhfYElWZ6O6SjZ6MNZ6Dn3Q/nKKPLXZ6k2Z6DjvZ6D0FtYysx:z4Z6d+pZ6eZ6sZ67QbZ6RZ6nZ6wXYP
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\json_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\json_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\json_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\json_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\json_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\json_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.json rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.json\ = "json_auto_file" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2712 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2712 AcroRd32.exe 2712 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1336 wrote to memory of 2588 1336 cmd.exe 29 PID 1336 wrote to memory of 2588 1336 cmd.exe 29 PID 1336 wrote to memory of 2588 1336 cmd.exe 29 PID 2588 wrote to memory of 2712 2588 rundll32.exe 30 PID 2588 wrote to memory of 2712 2588 rundll32.exe 30 PID 2588 wrote to memory of 2712 2588 rundll32.exe 30 PID 2588 wrote to memory of 2712 2588 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\ReYANG-main\package-lock.json1⤵
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\ReYANG-main\package-lock.json2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\ReYANG-main\package-lock.json"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2712
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD534fd5cbd43cb7d11dfe60363d97595d3
SHA1baa402509b89eb6556d2bac946a4be0342015485
SHA256e2648260d408e4257e40271d1945ab9b99e654c5eca642aef655bd3689b961b6
SHA5129eefb906daf4f320adf5df0dacb13b8cde8de03eafa85bd761824561672bb87fdeeab5d963d057ab370cdbceecdfd18ab39f3d5fb243424e23ed8ad9f61c37f8