General
-
Target
YeniiExternal.exe
-
Size
76.8MB
-
Sample
240810-1agx8stajg
-
MD5
aae3c8d816def81b7b6a2aeecf3f34b5
-
SHA1
c18edaffb2e41df0b520aa56b32e03b3feee0a2e
-
SHA256
93debcdc82bee38fc2882fd654db2284347e120e270cc97382dae63330c8e888
-
SHA512
037876c5a68d3f9bcb63fc0bfa1fff75306cc81e37fed7f1386d68d52ee159801d13df2ccae8f18b6edd907ff5a39639e79b5c92b2b2c5055dd0d0b8e7d95f35
-
SSDEEP
1572864:XvHcRlaWah7vXSk8IpG7V+VPhqYdfME7tlHegiYweyJulZUdg+hkrafEGV37U:XvHcRQJhTSkB05awcfLdMpuyhkrAto
Behavioral task
behavioral1
Sample
YeniiExternal.exe
Resource
win11-20240802-en
Malware Config
Targets
-
-
Target
YeniiExternal.exe
-
Size
76.8MB
-
MD5
aae3c8d816def81b7b6a2aeecf3f34b5
-
SHA1
c18edaffb2e41df0b520aa56b32e03b3feee0a2e
-
SHA256
93debcdc82bee38fc2882fd654db2284347e120e270cc97382dae63330c8e888
-
SHA512
037876c5a68d3f9bcb63fc0bfa1fff75306cc81e37fed7f1386d68d52ee159801d13df2ccae8f18b6edd907ff5a39639e79b5c92b2b2c5055dd0d0b8e7d95f35
-
SSDEEP
1572864:XvHcRlaWah7vXSk8IpG7V+VPhqYdfME7tlHegiYweyJulZUdg+hkrafEGV37U:XvHcRQJhTSkB05awcfLdMpuyhkrAto
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Virtualization/Sandbox Evasion
1