Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
14/06/2024, 16:32
Behavioral task
behavioral1
Sample
yea.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
yea.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
yea.pyc
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
yea.pyc
Resource
win10v2004-20240508-en
General
-
Target
yea.pyc
-
Size
12KB
-
MD5
4e48d5d5eb1b064418a73bbae21f75ad
-
SHA1
e69c1f71930159e5c89cbed6e9f9d716720f37eb
-
SHA256
6d7d1720e0529edcac2588a1469599df12cf6016b15702e3890139e357c2c304
-
SHA512
a5483f9f877c4b367e7fa177c1b3c33d2c40fd9df1302344328d1f38304af79607429ad76b2997e81efc11207729c55465c7db07b953af83964ef2a16d9b8529
-
SSDEEP
192:x/9xv5G8EYe5s5lXM0LUbkDIs/J4OS0KYyjhUV:dv5GGeCrvUbTsKbThg
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\pyc_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\.pyc rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\pyc_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\pyc_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\pyc_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\.pyc\ = "pyc_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\pyc_auto_file\shell rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2388 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2388 AcroRd32.exe 2388 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2276 wrote to memory of 2812 2276 cmd.exe 29 PID 2276 wrote to memory of 2812 2276 cmd.exe 29 PID 2276 wrote to memory of 2812 2276 cmd.exe 29 PID 2812 wrote to memory of 2388 2812 rundll32.exe 30 PID 2812 wrote to memory of 2388 2812 rundll32.exe 30 PID 2812 wrote to memory of 2388 2812 rundll32.exe 30 PID 2812 wrote to memory of 2388 2812 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\yea.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\yea.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\yea.pyc"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2388
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD56166a17851d00374d4d298c1b79ad96c
SHA1a9dcd579080412b3e7733faefd639d2692d3c25f
SHA25645a9c3c5a80ba2673954f4751dce3cc58c3aeece8a31805d142da55a0b1862d6
SHA51260e6fd891964bd43e4073844f82fa1c4644a6c89c5bafd4adb4963a0413e0c422e50958487d711209d13e6b6cfc24beab31d186921bd32db7afd572e7c87a15c