Analysis
-
max time kernel
137s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29-08-2024 14:06
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
yoyf.exe
Resource
win7-20240708-en
windows7-x64
2 signatures
150 seconds
General
-
Target
yoyf.exe
-
Size
906KB
-
MD5
e3dcc770ca9c865a719c2b1f1c5b174e
-
SHA1
3690617064fbcccba9eacc76be2e00cd34bac830
-
SHA256
7a41fa61102269baa65f7f762cf868c3c6a506fb58b590b6ae1352b864f2831e
-
SHA512
c569ebd0b2286307ba5fd18deee905b550a4a84c19a54d0c4eb1a0f006acf7814cda0f44d8fb79c72e059e997fc49c2114cdfb698734b7570b967a5c8004b1b6
-
SSDEEP
12288:bvsKwGRdLBBNNBqiLckdXZj8YNQDcodji13ywe4GOMvS5JfAu8G:bvs78RRNBqin7oYNCcoe3h9MeJ78G
Malware Config
Signatures
-
Detects ZharkBot payload 2 IoCs
ZharkBot is a botnet written C++.
resource yara_rule behavioral2/memory/4296-58-0x0000000000400000-0x0000000000450000-memory.dmp zharkcore behavioral2/memory/4296-60-0x0000000000400000-0x0000000000450000-memory.dmp zharkcore -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4440 set thread context of 2204 4440 yoyf.exe 93 PID 4440 set thread context of 4296 4440 yoyf.exe 101 PID 2204 set thread context of 2220 2204 AddInProcess32.exe 102 -
Program crash 1 IoCs
pid pid_target Process procid_target 744 4296 WerFault.exe 101 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yoyf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 4440 yoyf.exe 4440 yoyf.exe 2204 AddInProcess32.exe 2204 AddInProcess32.exe 2220 InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 4440 yoyf.exe Token: SeDebugPrivilege 2204 AddInProcess32.exe Token: SeDebugPrivilege 2220 InstallUtil.exe Token: SeBackupPrivilege 2220 InstallUtil.exe Token: SeSecurityPrivilege 2220 InstallUtil.exe Token: SeSecurityPrivilege 2220 InstallUtil.exe Token: SeSecurityPrivilege 2220 InstallUtil.exe Token: SeSecurityPrivilege 2220 InstallUtil.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 4440 wrote to memory of 2204 4440 yoyf.exe 93 PID 4440 wrote to memory of 2204 4440 yoyf.exe 93 PID 4440 wrote to memory of 2204 4440 yoyf.exe 93 PID 4440 wrote to memory of 2204 4440 yoyf.exe 93 PID 4440 wrote to memory of 2204 4440 yoyf.exe 93 PID 4440 wrote to memory of 2204 4440 yoyf.exe 93 PID 4440 wrote to memory of 2204 4440 yoyf.exe 93 PID 4440 wrote to memory of 2204 4440 yoyf.exe 93 PID 4440 wrote to memory of 4296 4440 yoyf.exe 101 PID 4440 wrote to memory of 4296 4440 yoyf.exe 101 PID 4440 wrote to memory of 4296 4440 yoyf.exe 101 PID 4440 wrote to memory of 4296 4440 yoyf.exe 101 PID 4440 wrote to memory of 4296 4440 yoyf.exe 101 PID 4440 wrote to memory of 4296 4440 yoyf.exe 101 PID 4440 wrote to memory of 4296 4440 yoyf.exe 101 PID 4440 wrote to memory of 4296 4440 yoyf.exe 101 PID 4440 wrote to memory of 4296 4440 yoyf.exe 101 PID 2204 wrote to memory of 2220 2204 AddInProcess32.exe 102 PID 2204 wrote to memory of 2220 2204 AddInProcess32.exe 102 PID 2204 wrote to memory of 2220 2204 AddInProcess32.exe 102 PID 2204 wrote to memory of 2220 2204 AddInProcess32.exe 102 PID 2204 wrote to memory of 2220 2204 AddInProcess32.exe 102 PID 2204 wrote to memory of 2220 2204 AddInProcess32.exe 102 PID 2204 wrote to memory of 2220 2204 AddInProcess32.exe 102 PID 2204 wrote to memory of 2220 2204 AddInProcess32.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\yoyf.exe"C:\Users\Admin\AppData\Local\Temp\yoyf.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2220
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵PID:4296
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4296 -s 4083⤵
- Program crash
PID:744
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4296 -ip 42961⤵PID:1600