Analysis
-
max time kernel
132s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
22/05/2024, 11:58
Static task
static1
Behavioral task
behavioral1
Sample
YingyanShell64.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
YingyanShell64.html
Resource
win10v2004-20240426-en
General
-
Target
YingyanShell64.html
-
Size
930B
-
MD5
ac5046172d5707047a7bf128f1462b73
-
SHA1
e7fb38587102378c2db1fce4d854096ef85cc507
-
SHA256
1b181c73a9376f66ce70c2cbb599ced834d4ccaa11e06856cdf2ef3300a4b8e1
-
SHA512
8734eb5f5d361d7a6e3d98505995bad34cd6791d6884917112ac10c4c9e3a2045eaa3613822389f5ab65bf3d5ea9dd7044de5f12a9d62ebcf7b720db76aefeda
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422541446" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d1000000000200000000001066000000010000200000005f9f5c5d0cba26fe067d48dddef5886365ea4e81f22f285885e35900cf5327bd000000000e8000000002000020000000ba8d638c5d211b3a21912904c1c0e4fe54882b0d1476fdcf619f97f90f825d7f20000000c810708b2764c1d4afcb7e8f48d59eece521ec120566827bb1f7f114c9d5fb2f40000000b96e25d4ebc931ff75b4a8ea99031a8165cba3e6166cf3d439ea43a6b204b2dc017354cc66015ba5bf7d54f601dc28e9dfbe790b6ac386efe185e9f8c8db70c8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 103d5d8740acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B2C20851-1833-11EF-88AC-F2AB90EC9A26} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2248 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2248 iexplore.exe 2248 iexplore.exe 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2248 wrote to memory of 3000 2248 iexplore.exe 28 PID 2248 wrote to memory of 3000 2248 iexplore.exe 28 PID 2248 wrote to memory of 3000 2248 iexplore.exe 28 PID 2248 wrote to memory of 3000 2248 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\YingyanShell64.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2248 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD583f07ab718eeb9c1f780600bbe1a7822
SHA1f09c1204653f9c8db4cb9b3e76f40d602a8a763c
SHA2565e49947a6e0c365b0881956f8e0e5c46fd0819d1608da48603aa6d28eef6901a
SHA512ab59b03d22c9c54c2217a054dac2e0136f058e081c5ed59caf1289c16df5a07a359bc14000eb3f531d1f12681e47464f6d699b978b7405541c2601f13823e7a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598f06018399e963b9197f02372a3f23b
SHA19408d86d8de15fdfa8741098596fbaa121b7b16d
SHA25618d2560b5f27ed262caa8dbcecfeaca1a3f9b45d993a41058a4bdf0be723e7bf
SHA512ef3414500e3dfd91e125edaab5306b3ef7c6a31695abaa977f1ea2553cfce54936d015de75b15a44ce0b5a3514654f640b8e851a91b7c5c04c82128dc61ab87f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a8904ad7128e985cb65b66913c96c4d5
SHA1ed64605a17fb316e99aaec5b6637bc73df3dd399
SHA256c71aeec1f6f249c6422aad44abfc339e853b9d073d130af17d7969dd7f72a4d7
SHA51257f185a083c82939067746d4f3aec2abc72ec2598c5501124ce384d38a08d9c3fe2f06c580386ede91e114180f4cc8e1ea762018e65939a894e06875fa5cb71b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5218ee990cdc48918dcadbc826e1bea12
SHA18c4c91afcfc1d9befea5f46bf9fdbbdfce7b2147
SHA2563f9ca782cd49c23c9d3249d3136af555762269f90228312f94dad826febe3a44
SHA5121cac664d3a01d48fbbb8578e659365de9b02f258f73b57e712954b788eae49cd8129d741a5375ee69bfb8b36b43310de387ce957ad096458e2eaebafb57a1d7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed13eb2dedc4b3ad7ddb6fd9391000ee
SHA1c845ad42356589250a7d37062ce5913f662c8a95
SHA25690b9ff180f2e0ee3211ebeb353ede676fe3747c3eceb378a05e6deb53b807300
SHA512bd126fb8a0caa4cb2584aac92e5347cd0ac619014b5b45003f16d289cc0347f9aa153bd41af3a4b669ae314cd7c96ba1a8423a1203177bfb1719fceb29ad0903
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c35f89ca78e79294130a051dd423b3d2
SHA110b0a41efa44608a19252c0e6ebc3e86512d1366
SHA256cd050975a2275194589c4ef053a5276f8f60d092a3c1bfa88c38a874bb711f6d
SHA51288c1cefefdccf85cf110f66b8fcc26d86a6eb9f4edbe79a825f69aaacce89c4cb6323c0b2cf89108f1093a970586aecf7e03036ee29fef9e816cfb71f0aef2b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bdc4e9f6ae4cea06d2b5e52951c8ee4a
SHA1f3203afbd66e5f1bfa902e1acdb434e94c40279a
SHA25616808b492e02746edb00464c6f3a110e5a5fc5dc722c9afb5486b269f1a6b437
SHA512203ae0551f5b2f3f73aa5262e3de236555a6c468480e10c298ad92528216e353f169b90f0d3e31502538293949ec226eb568ea0961168258fe71e10e0d6b7ffc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f102b5b8d5a9b33336060afa6a67f58
SHA1fb3baa24073fa2c0dba55171e1771a9e6c9432da
SHA2566b613d128b0ef2618ad8ca2a34e1356a1f090277b9ae0dfbda32176fa755664e
SHA5124d195f5d4505b63b873b81d11289e564ed4cbe7bbc843ab108716ec09172915212b4330e2f74fdcc776827aa390555f406b0f806b2ba28e90246901c53027505
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e6d9598bed562480e7c5cd8376567d1
SHA10a497d4b8bea9c9ddd2572239ccbab283803d09e
SHA256a66e4386f107cc5b05cd25a79dd331164b2125b0cdf6b1ccac904b1b62279e3e
SHA512ca7ce4616d8c6c5c72559d15af0b9b97285e6cc9acc7e208acafb8558db1e245ac237ef34f6cc2a48fe304d0c2af8f5b118153f7a8b737d73d4d632b1e2c52db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be0937d4f16e06063a01eb2293d8c715
SHA127e46e67a7c68535b2200a9bd8d040f1fe2e4f5f
SHA2566530ba5b6fb4ed6cad441755c68d86bc0f8763ab30a72a242d8511bb0fb03f86
SHA5128ae103cd42c9795f08624eb551fb92449899b9b4631fc4348062b642ed9f41be88ee8780baf19c5503445dbc9770f4459ec5f643408fe189eb12a6e2fb1d95f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519f32529eb5d0137849fe07c419ad38d
SHA14f6cd790bd123319e49b5067704270f41119e92d
SHA25679205764b9e30374354d42d9fe6a50831b2f5545071dcec7d1dc0b6ad0b79e9c
SHA5127f73a19af248c746457374821e7b4f11c334438934f0fbc30bb1af0cac3ccc00694f08108781c73a61e183f2b838464bcd772e339c19a2c4133174457216dd7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1d23102e14a63d18448c291fce2366b
SHA16683f7b55f955c06c96460afb7f41e55142e3029
SHA256cd137db915154e11c9dfec1f2e74e8b70b5c3e51b4369f1bec75f860d3801b1b
SHA5128c6ef4338d4fc63df6e740af2af28b1f327613ff80e97038e16545d3e4fec194fcf3c3c45243ba0ee70b5cfd1cc4a6aceade5ab514fa363e48c0cde7297505fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53684f37f2aabf7b9b012874357cc07fd
SHA10677f6068b23c36897601d386c345cd2170433db
SHA256e3fc2cf829dab9a0e92fa989857c0cc8c69eb555bca3a6523880e9991f5085d5
SHA512ebe044e7c2ee32f7606aa5456a3679f11922e889e2c6c3649c9c1d0ceb8e97905665787cc77776776bdb7278b47dd94352cd3288b57ee33aeb7fb8a4c71c99dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e4bf5cb8a4af50014cc6958db165adf
SHA10e10f9baa607a19195df7a2f872f20049b79ec72
SHA2562924cd83dcd11935063634606e2c79d555287efc66171fcb9ad6100959db7be2
SHA512ab70159eb334aad99295d382c781883d575b1fe8b5333b4031fe713e9c36261d0a0051c980dd31a13fe585b9f102d34166e3054dc2fcfbbe31641288bdbe037b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5393d8cd34d68a6add07ec4fcb6f5a29d
SHA1ea9d0d21294a9f2311a5e8c42635b0745cfa7a5e
SHA2563c58fde887bb74ceb76b5620255f564c3c8466b27a852b1f70d97f14f54050a6
SHA5126dced25a3fbe9213935c5ad29880c1d6ca96ddcdc24762eb01b8ff37f4a7eac9e94695a55abace9febe1c24adf8c9511f3ace227a8b90bcec139a9570cf2ae9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5077b06b6e583f85adb42264d74ea1ec5
SHA1a9835ac1f6e55320d038fea630272d2ed2fdcdd8
SHA2563016cafb3e970e90975b525bb988d20d8cfb54a0d07aff39f3a5fc41ba55683b
SHA51265e86a39dda43c63dfe564d9f727003b0c250a4be3ff969caa2534b5fd1a8130db90d6feb960301b9bc06477cdf7bdc1436aeeae0ee3debe7bc10e7e27de5597
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565449d52f65c12ca8eeb0220d6b8af0e
SHA1995971073cdfc902e851d1786b51a9222ba6cba7
SHA2563887666ef712e4289974a70bcecad94e2f032bee9db0533a5f75bc6fd8dfaf98
SHA512265c95b5c5d2ac91cd5aeb02cf290eb21413d1af7b114da6bb4bd06ffd03ae9766bed2fe8259591dd19d456bd203c97abc640ade99cb89ff4eb82964a9cee68b
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a