Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-05-2024 03:29
Static task
static1
Behavioral task
behavioral1
Sample
d6a6a791bc32e2e75e73d0bed316f4e9fd7eea8451064defa44055e5740f3007.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d6a6a791bc32e2e75e73d0bed316f4e9fd7eea8451064defa44055e5740f3007.exe
Resource
win10v2004-20240508-en
General
-
Target
d6a6a791bc32e2e75e73d0bed316f4e9fd7eea8451064defa44055e5740f3007.exe
-
Size
53KB
-
MD5
ed95af82d70db8a1971422a315317709
-
SHA1
29e5aa660ce39fad470c0957deae3aba1dd7c1f5
-
SHA256
d6a6a791bc32e2e75e73d0bed316f4e9fd7eea8451064defa44055e5740f3007
-
SHA512
33646eea3f3db15b070629b0bb767288c3929462f49f9b39a5d0f38320667391b7d10c313fc60cc678f9969f35ea52c01e59b6076451bb6a3b2f46770d947e0d
-
SSDEEP
1536:vNIg8r8QorPo/D37Kp3StjEMjmLM3ztDJWZsXy4JzxPMk:TrPiJJjmLM3zRJWZsXy4Jt
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" yoakaa.exe -
Executes dropped EXE 1 IoCs
pid Process 2748 yoakaa.exe -
Loads dropped DLL 2 IoCs
pid Process 2120 d6a6a791bc32e2e75e73d0bed316f4e9fd7eea8451064defa44055e5740f3007.exe 2120 d6a6a791bc32e2e75e73d0bed316f4e9fd7eea8451064defa44055e5740f3007.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoakaa = "C:\\Users\\Admin\\yoakaa.exe" yoakaa.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2748 yoakaa.exe 2748 yoakaa.exe 2748 yoakaa.exe 2748 yoakaa.exe 2748 yoakaa.exe 2748 yoakaa.exe 2748 yoakaa.exe 2748 yoakaa.exe 2748 yoakaa.exe 2748 yoakaa.exe 2748 yoakaa.exe 2748 yoakaa.exe 2748 yoakaa.exe 2748 yoakaa.exe 2748 yoakaa.exe 2748 yoakaa.exe 2748 yoakaa.exe 2748 yoakaa.exe 2748 yoakaa.exe 2748 yoakaa.exe 2748 yoakaa.exe 2748 yoakaa.exe 2748 yoakaa.exe 2748 yoakaa.exe 2748 yoakaa.exe 2748 yoakaa.exe 2748 yoakaa.exe 2748 yoakaa.exe 2748 yoakaa.exe 2748 yoakaa.exe 2748 yoakaa.exe 2748 yoakaa.exe 2748 yoakaa.exe 2748 yoakaa.exe 2748 yoakaa.exe 2748 yoakaa.exe 2748 yoakaa.exe 2748 yoakaa.exe 2748 yoakaa.exe 2748 yoakaa.exe 2748 yoakaa.exe 2748 yoakaa.exe 2748 yoakaa.exe 2748 yoakaa.exe 2748 yoakaa.exe 2748 yoakaa.exe 2748 yoakaa.exe 2748 yoakaa.exe 2748 yoakaa.exe 2748 yoakaa.exe 2748 yoakaa.exe 2748 yoakaa.exe 2748 yoakaa.exe 2748 yoakaa.exe 2748 yoakaa.exe 2748 yoakaa.exe 2748 yoakaa.exe 2748 yoakaa.exe 2748 yoakaa.exe 2748 yoakaa.exe 2748 yoakaa.exe 2748 yoakaa.exe 2748 yoakaa.exe 2748 yoakaa.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2120 d6a6a791bc32e2e75e73d0bed316f4e9fd7eea8451064defa44055e5740f3007.exe 2748 yoakaa.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2120 wrote to memory of 2748 2120 d6a6a791bc32e2e75e73d0bed316f4e9fd7eea8451064defa44055e5740f3007.exe 28 PID 2120 wrote to memory of 2748 2120 d6a6a791bc32e2e75e73d0bed316f4e9fd7eea8451064defa44055e5740f3007.exe 28 PID 2120 wrote to memory of 2748 2120 d6a6a791bc32e2e75e73d0bed316f4e9fd7eea8451064defa44055e5740f3007.exe 28 PID 2120 wrote to memory of 2748 2120 d6a6a791bc32e2e75e73d0bed316f4e9fd7eea8451064defa44055e5740f3007.exe 28 PID 2748 wrote to memory of 2120 2748 yoakaa.exe 27 PID 2748 wrote to memory of 2120 2748 yoakaa.exe 27 PID 2748 wrote to memory of 2120 2748 yoakaa.exe 27 PID 2748 wrote to memory of 2120 2748 yoakaa.exe 27 PID 2748 wrote to memory of 2120 2748 yoakaa.exe 27 PID 2748 wrote to memory of 2120 2748 yoakaa.exe 27 PID 2748 wrote to memory of 2120 2748 yoakaa.exe 27 PID 2748 wrote to memory of 2120 2748 yoakaa.exe 27 PID 2748 wrote to memory of 2120 2748 yoakaa.exe 27 PID 2748 wrote to memory of 2120 2748 yoakaa.exe 27 PID 2748 wrote to memory of 2120 2748 yoakaa.exe 27 PID 2748 wrote to memory of 2120 2748 yoakaa.exe 27 PID 2748 wrote to memory of 2120 2748 yoakaa.exe 27 PID 2748 wrote to memory of 2120 2748 yoakaa.exe 27 PID 2748 wrote to memory of 2120 2748 yoakaa.exe 27 PID 2748 wrote to memory of 2120 2748 yoakaa.exe 27 PID 2748 wrote to memory of 2120 2748 yoakaa.exe 27 PID 2748 wrote to memory of 2120 2748 yoakaa.exe 27 PID 2748 wrote to memory of 2120 2748 yoakaa.exe 27 PID 2748 wrote to memory of 2120 2748 yoakaa.exe 27 PID 2748 wrote to memory of 2120 2748 yoakaa.exe 27 PID 2748 wrote to memory of 2120 2748 yoakaa.exe 27 PID 2748 wrote to memory of 2120 2748 yoakaa.exe 27 PID 2748 wrote to memory of 2120 2748 yoakaa.exe 27 PID 2748 wrote to memory of 2120 2748 yoakaa.exe 27 PID 2748 wrote to memory of 2120 2748 yoakaa.exe 27 PID 2748 wrote to memory of 2120 2748 yoakaa.exe 27 PID 2748 wrote to memory of 2120 2748 yoakaa.exe 27 PID 2748 wrote to memory of 2120 2748 yoakaa.exe 27 PID 2748 wrote to memory of 2120 2748 yoakaa.exe 27 PID 2748 wrote to memory of 2120 2748 yoakaa.exe 27 PID 2748 wrote to memory of 2120 2748 yoakaa.exe 27 PID 2748 wrote to memory of 2120 2748 yoakaa.exe 27 PID 2748 wrote to memory of 2120 2748 yoakaa.exe 27 PID 2748 wrote to memory of 2120 2748 yoakaa.exe 27 PID 2748 wrote to memory of 2120 2748 yoakaa.exe 27 PID 2748 wrote to memory of 2120 2748 yoakaa.exe 27 PID 2748 wrote to memory of 2120 2748 yoakaa.exe 27 PID 2748 wrote to memory of 2120 2748 yoakaa.exe 27 PID 2748 wrote to memory of 2120 2748 yoakaa.exe 27 PID 2748 wrote to memory of 2120 2748 yoakaa.exe 27 PID 2748 wrote to memory of 2120 2748 yoakaa.exe 27 PID 2748 wrote to memory of 2120 2748 yoakaa.exe 27 PID 2748 wrote to memory of 2120 2748 yoakaa.exe 27 PID 2748 wrote to memory of 2120 2748 yoakaa.exe 27 PID 2748 wrote to memory of 2120 2748 yoakaa.exe 27 PID 2748 wrote to memory of 2120 2748 yoakaa.exe 27 PID 2748 wrote to memory of 2120 2748 yoakaa.exe 27 PID 2748 wrote to memory of 2120 2748 yoakaa.exe 27 PID 2748 wrote to memory of 2120 2748 yoakaa.exe 27 PID 2748 wrote to memory of 2120 2748 yoakaa.exe 27 PID 2748 wrote to memory of 2120 2748 yoakaa.exe 27 PID 2748 wrote to memory of 2120 2748 yoakaa.exe 27 PID 2748 wrote to memory of 2120 2748 yoakaa.exe 27 PID 2748 wrote to memory of 2120 2748 yoakaa.exe 27 PID 2748 wrote to memory of 2120 2748 yoakaa.exe 27 PID 2748 wrote to memory of 2120 2748 yoakaa.exe 27 PID 2748 wrote to memory of 2120 2748 yoakaa.exe 27 PID 2748 wrote to memory of 2120 2748 yoakaa.exe 27 PID 2748 wrote to memory of 2120 2748 yoakaa.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\d6a6a791bc32e2e75e73d0bed316f4e9fd7eea8451064defa44055e5740f3007.exe"C:\Users\Admin\AppData\Local\Temp\d6a6a791bc32e2e75e73d0bed316f4e9fd7eea8451064defa44055e5740f3007.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\yoakaa.exe"C:\Users\Admin\yoakaa.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD50db1a9683b00e5afa10eefef5be22f12
SHA1083edf0d252752b96820792f326f6a9f626608db
SHA25618e5a5f576527eb31690b120257c6f371dacfc7909c7d2f7c91e449c6196c8fc
SHA512ebc95c5af31b0b22fc4c276c7e1c222c47ca9c988cbf0fb81681b6b9968ee7140f9dab2ecc86835ef674a3946c66dfe38c9397836d88b2cb97235ca879176d9b