Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/09/2024, 12:19
Static task
static1
Behavioral task
behavioral1
Sample
TheYalioptimization.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
TheYalioptimization.exe
Resource
win10v2004-20240802-en
General
-
Target
TheYalioptimization.exe
-
Size
1.1MB
-
MD5
e95c73bed223742b3168d86504f4ad16
-
SHA1
ddf882953bd8f510596b2697d021057a45afa2d4
-
SHA256
a4d66825bbb4bd8332dafc57dc7bdfe38888d72e1616b75924cd115a55da3d75
-
SHA512
3fdaf9dbf230b93ddae435247f3d46d0e312bf95b06be3da5b8fe16138e60510007e456b707fed47b980432a91f2f6eebfa6da7561af3865769cb0c00a8a3b5b
-
SSDEEP
12288:qOxPkPjQeqQ1Y53KRYTd25O07Y1iuJ0F+Z0ky3ETd25O07Y1iuJ0F+Z0ky3TEaGY:8EeqQq3KSTd50E1pkETd50E1pkToY
Malware Config
Signatures
-
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\FortniteClient-Win64-Shipping.exe\PerfOptions regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\FortniteClient-Win64-Shipping.exe regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\FortniteClient-Win64-Shipping.exe\PerfOptions\CpuPriorityClass = "3" regedit.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation TheYalioptimization.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files\The Yali Optimization Files TheYalioptimization.exe File created C:\Program Files\The Yali Optimization Files\__tmp_rar_sfx_access_check_240626703 TheYalioptimization.exe File created C:\Program Files\The Yali Optimization Files\The Yali optimization reg.reg TheYalioptimization.exe File opened for modification C:\Program Files\The Yali Optimization Files\The Yali optimization reg.reg TheYalioptimization.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings TheYalioptimization.exe -
Runs .reg file with regedit 1 IoCs
pid Process 4092 regedit.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 512 wrote to memory of 4092 512 TheYalioptimization.exe 83 PID 512 wrote to memory of 4092 512 TheYalioptimization.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\TheYalioptimization.exe"C:\Users\Admin\AppData\Local\Temp\TheYalioptimization.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:512 -
C:\Windows\regedit.exe"regedit.exe" "C:\Program Files\The Yali Optimization Files\The Yali optimization reg.reg"2⤵
- Event Triggered Execution: Image File Execution Options Injection
- Runs .reg file with regedit
PID:4092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD549e06389d4bc01a5365784f921616a6e
SHA1d171cae837b49a082221452ffe615b640b122b98
SHA256cb3c820004dfcfa191df668feda572470e43252678f236f32bb7df9186c0fca9
SHA512739b2699b2043ae075c0de670186ee40d5c02b8e2226aa00632f2d536103a6931f2ee1a56e83a822e34d56ef37d01e7f40f772223cf96267c3d3dbe51444ddd8