Analysis
-
max time kernel
150s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 03:29
Static task
static1
Behavioral task
behavioral1
Sample
d6a6a791bc32e2e75e73d0bed316f4e9fd7eea8451064defa44055e5740f3007.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d6a6a791bc32e2e75e73d0bed316f4e9fd7eea8451064defa44055e5740f3007.exe
Resource
win10v2004-20240508-en
General
-
Target
d6a6a791bc32e2e75e73d0bed316f4e9fd7eea8451064defa44055e5740f3007.exe
-
Size
53KB
-
MD5
ed95af82d70db8a1971422a315317709
-
SHA1
29e5aa660ce39fad470c0957deae3aba1dd7c1f5
-
SHA256
d6a6a791bc32e2e75e73d0bed316f4e9fd7eea8451064defa44055e5740f3007
-
SHA512
33646eea3f3db15b070629b0bb767288c3929462f49f9b39a5d0f38320667391b7d10c313fc60cc678f9969f35ea52c01e59b6076451bb6a3b2f46770d947e0d
-
SSDEEP
1536:vNIg8r8QorPo/D37Kp3StjEMjmLM3ztDJWZsXy4JzxPMk:TrPiJJjmLM3zRJWZsXy4Jt
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" yemik.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation d6a6a791bc32e2e75e73d0bed316f4e9fd7eea8451064defa44055e5740f3007.exe -
Executes dropped EXE 1 IoCs
pid Process 2660 yemik.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yemik = "C:\\Users\\Admin\\yemik.exe" yemik.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2660 yemik.exe 2660 yemik.exe 2660 yemik.exe 2660 yemik.exe 2660 yemik.exe 2660 yemik.exe 2660 yemik.exe 2660 yemik.exe 2660 yemik.exe 2660 yemik.exe 2660 yemik.exe 2660 yemik.exe 2660 yemik.exe 2660 yemik.exe 2660 yemik.exe 2660 yemik.exe 2660 yemik.exe 2660 yemik.exe 2660 yemik.exe 2660 yemik.exe 2660 yemik.exe 2660 yemik.exe 2660 yemik.exe 2660 yemik.exe 2660 yemik.exe 2660 yemik.exe 2660 yemik.exe 2660 yemik.exe 2660 yemik.exe 2660 yemik.exe 2660 yemik.exe 2660 yemik.exe 2660 yemik.exe 2660 yemik.exe 2660 yemik.exe 2660 yemik.exe 2660 yemik.exe 2660 yemik.exe 2660 yemik.exe 2660 yemik.exe 2660 yemik.exe 2660 yemik.exe 2660 yemik.exe 2660 yemik.exe 2660 yemik.exe 2660 yemik.exe 2660 yemik.exe 2660 yemik.exe 2660 yemik.exe 2660 yemik.exe 2660 yemik.exe 2660 yemik.exe 2660 yemik.exe 2660 yemik.exe 2660 yemik.exe 2660 yemik.exe 2660 yemik.exe 2660 yemik.exe 2660 yemik.exe 2660 yemik.exe 2660 yemik.exe 2660 yemik.exe 2660 yemik.exe 2660 yemik.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2552 d6a6a791bc32e2e75e73d0bed316f4e9fd7eea8451064defa44055e5740f3007.exe 2660 yemik.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2552 wrote to memory of 2660 2552 d6a6a791bc32e2e75e73d0bed316f4e9fd7eea8451064defa44055e5740f3007.exe 87 PID 2552 wrote to memory of 2660 2552 d6a6a791bc32e2e75e73d0bed316f4e9fd7eea8451064defa44055e5740f3007.exe 87 PID 2552 wrote to memory of 2660 2552 d6a6a791bc32e2e75e73d0bed316f4e9fd7eea8451064defa44055e5740f3007.exe 87 PID 2660 wrote to memory of 2552 2660 yemik.exe 80 PID 2660 wrote to memory of 2552 2660 yemik.exe 80 PID 2660 wrote to memory of 2552 2660 yemik.exe 80 PID 2660 wrote to memory of 2552 2660 yemik.exe 80 PID 2660 wrote to memory of 2552 2660 yemik.exe 80 PID 2660 wrote to memory of 2552 2660 yemik.exe 80 PID 2660 wrote to memory of 2552 2660 yemik.exe 80 PID 2660 wrote to memory of 2552 2660 yemik.exe 80 PID 2660 wrote to memory of 2552 2660 yemik.exe 80 PID 2660 wrote to memory of 2552 2660 yemik.exe 80 PID 2660 wrote to memory of 2552 2660 yemik.exe 80 PID 2660 wrote to memory of 2552 2660 yemik.exe 80 PID 2660 wrote to memory of 2552 2660 yemik.exe 80 PID 2660 wrote to memory of 2552 2660 yemik.exe 80 PID 2660 wrote to memory of 2552 2660 yemik.exe 80 PID 2660 wrote to memory of 2552 2660 yemik.exe 80 PID 2660 wrote to memory of 2552 2660 yemik.exe 80 PID 2660 wrote to memory of 2552 2660 yemik.exe 80 PID 2660 wrote to memory of 2552 2660 yemik.exe 80 PID 2660 wrote to memory of 2552 2660 yemik.exe 80 PID 2660 wrote to memory of 2552 2660 yemik.exe 80 PID 2660 wrote to memory of 2552 2660 yemik.exe 80 PID 2660 wrote to memory of 2552 2660 yemik.exe 80 PID 2660 wrote to memory of 2552 2660 yemik.exe 80 PID 2660 wrote to memory of 2552 2660 yemik.exe 80 PID 2660 wrote to memory of 2552 2660 yemik.exe 80 PID 2660 wrote to memory of 2552 2660 yemik.exe 80 PID 2660 wrote to memory of 2552 2660 yemik.exe 80 PID 2660 wrote to memory of 2552 2660 yemik.exe 80 PID 2660 wrote to memory of 2552 2660 yemik.exe 80 PID 2660 wrote to memory of 2552 2660 yemik.exe 80 PID 2660 wrote to memory of 2552 2660 yemik.exe 80 PID 2660 wrote to memory of 2552 2660 yemik.exe 80 PID 2660 wrote to memory of 2552 2660 yemik.exe 80 PID 2660 wrote to memory of 2552 2660 yemik.exe 80 PID 2660 wrote to memory of 2552 2660 yemik.exe 80 PID 2660 wrote to memory of 2552 2660 yemik.exe 80 PID 2660 wrote to memory of 2552 2660 yemik.exe 80 PID 2660 wrote to memory of 2552 2660 yemik.exe 80 PID 2660 wrote to memory of 2552 2660 yemik.exe 80 PID 2660 wrote to memory of 2552 2660 yemik.exe 80 PID 2660 wrote to memory of 2552 2660 yemik.exe 80 PID 2660 wrote to memory of 2552 2660 yemik.exe 80 PID 2660 wrote to memory of 2552 2660 yemik.exe 80 PID 2660 wrote to memory of 2552 2660 yemik.exe 80 PID 2660 wrote to memory of 2552 2660 yemik.exe 80 PID 2660 wrote to memory of 2552 2660 yemik.exe 80 PID 2660 wrote to memory of 2552 2660 yemik.exe 80 PID 2660 wrote to memory of 2552 2660 yemik.exe 80 PID 2660 wrote to memory of 2552 2660 yemik.exe 80 PID 2660 wrote to memory of 2552 2660 yemik.exe 80 PID 2660 wrote to memory of 2552 2660 yemik.exe 80 PID 2660 wrote to memory of 2552 2660 yemik.exe 80 PID 2660 wrote to memory of 2552 2660 yemik.exe 80 PID 2660 wrote to memory of 2552 2660 yemik.exe 80 PID 2660 wrote to memory of 2552 2660 yemik.exe 80 PID 2660 wrote to memory of 2552 2660 yemik.exe 80 PID 2660 wrote to memory of 2552 2660 yemik.exe 80 PID 2660 wrote to memory of 2552 2660 yemik.exe 80 PID 2660 wrote to memory of 2552 2660 yemik.exe 80 PID 2660 wrote to memory of 2552 2660 yemik.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\d6a6a791bc32e2e75e73d0bed316f4e9fd7eea8451064defa44055e5740f3007.exe"C:\Users\Admin\AppData\Local\Temp\d6a6a791bc32e2e75e73d0bed316f4e9fd7eea8451064defa44055e5740f3007.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Users\Admin\yemik.exe"C:\Users\Admin\yemik.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2660
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD5ea70edba78e8292eafb48962415799f5
SHA17da4d0c0513715822361ef532c80542e2d8b3830
SHA256997d11bca8bdf774472629b27d349c6c9884f3c7160b0132236b9b8d6500929c
SHA512bc999a39a1f1551dc3a5707fa137e524aadd24f4e7af91efbc11547ee96fb2aeca1aaa1529ef757868416f28475c572e2a3636a570171ab3fb38064fc6ef4e64