Overview
overview
7Static
static
7YENI_HILE_...SK.rar
windows7-x64
3YENI_HILE_...SK.rar
windows10-2004-x64
3YENİ HİL...v3.exe
windows7-x64
6YENİ HİL...v3.exe
windows10-2004-x64
6YENİ HİL...V3.dll
windows7-x64
3YENİ HİL...V3.dll
windows10-2004-x64
3YENİ HİL...hl.exe
windows7-x64
7YENİ HİL...hl.exe
windows10-2004-x64
7out.exe
windows7-x64
3out.exe
windows10-2004-x64
3YENİ HİL...v3.dll
windows7-x64
3YENİ HİL...v3.dll
windows10-2004-x64
3YENİ HİL...v3.ini
windows7-x64
1YENİ HİL...v3.ini
windows10-2004-x64
1YENİ HİL...hd.ini
windows7-x64
1YENİ HİL...hd.ini
windows10-2004-x64
1Analysis
-
max time kernel
26s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
13-09-2024 15:39
Behavioral task
behavioral1
Sample
YENI_HILE_THE_MASK.rar
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
YENI_HILE_THE_MASK.rar
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
YENİ HİLE/Extreme Injector v3.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
YENİ HİLE/Extreme Injector v3.exe
Resource
win10v2004-20240910-en
Behavioral task
behavioral5
Sample
YENİ HİLE/ZeroV3.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
YENİ HİLE/ZeroV3.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
YENİ HİLE/ZeroV3.hl.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
YENİ HİLE/ZeroV3.hl.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
out.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
out.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
YENİ HİLE/Zerov3.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
YENİ HİLE/Zerov3.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
YENİ HİLE/Zerov3.ini
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
YENİ HİLE/Zerov3.ini
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
YENİ HİLE/injmthd.ini
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
YENİ HİLE/injmthd.ini
Resource
win10v2004-20240802-en
General
-
Target
YENI_HILE_THE_MASK.rar
-
Size
1.4MB
-
MD5
5c9e087c4df7c3fcb07fdc8426657531
-
SHA1
ad7f41ac663386f9b97eeef81ed08113efe89408
-
SHA256
7ff8d9f30b71199072b69ca2fd3c29b1ab3a8298aeb75407a425626c61abfd89
-
SHA512
99d8021555c0b5a99aa351a3301a9a833a593159b571ecad7935b832063b7bfe94c6f0bf158c6241832bd47699806fcc47d800ddde8d56556ab93e80bb00258d
-
SSDEEP
24576:al2OaH9WHPChPccfi/T2WjsZHbfzGO623bf2Ts87LxvctM3PNe/NeABVwhonrv:al2jH90OPccqLUZHek3b+48ft3ENzBVH
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 984 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 984 vlc.exe -
Suspicious use of FindShellTrayWindow 23 IoCs
pid Process 984 vlc.exe 984 vlc.exe 984 vlc.exe 984 vlc.exe 984 vlc.exe 984 vlc.exe 984 vlc.exe 984 vlc.exe 984 vlc.exe 984 vlc.exe 984 vlc.exe 984 vlc.exe 984 vlc.exe 984 vlc.exe 984 vlc.exe 984 vlc.exe 984 vlc.exe 984 vlc.exe 984 vlc.exe 984 vlc.exe 984 vlc.exe 984 vlc.exe 984 vlc.exe -
Suspicious use of SendNotifyMessage 22 IoCs
pid Process 984 vlc.exe 984 vlc.exe 984 vlc.exe 984 vlc.exe 984 vlc.exe 984 vlc.exe 984 vlc.exe 984 vlc.exe 984 vlc.exe 984 vlc.exe 984 vlc.exe 984 vlc.exe 984 vlc.exe 984 vlc.exe 984 vlc.exe 984 vlc.exe 984 vlc.exe 984 vlc.exe 984 vlc.exe 984 vlc.exe 984 vlc.exe 984 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 984 vlc.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2880 wrote to memory of 2620 2880 cmd.exe 31 PID 2880 wrote to memory of 2620 2880 cmd.exe 31 PID 2880 wrote to memory of 2620 2880 cmd.exe 31 PID 2620 wrote to memory of 2612 2620 rundll32.exe 32 PID 2620 wrote to memory of 2612 2620 rundll32.exe 32 PID 2620 wrote to memory of 2612 2620 rundll32.exe 32 PID 2612 wrote to memory of 984 2612 rundll32.exe 34 PID 2612 wrote to memory of 984 2612 rundll32.exe 34 PID 2612 wrote to memory of 984 2612 rundll32.exe 34
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\YENI_HILE_THE_MASK.rar1⤵
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\YENI_HILE_THE_MASK.rar2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\YENI_HILE_THE_MASK.rar3⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\YENI_HILE_THE_MASK.rar"4⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:984
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
94B
MD58504a7a9fa8a446b5bd840f1596d6193
SHA1bdd785dd6029ee174a20aad5e21ffd1ab70f4b14
SHA2567f38e38e2cfecbbf4bac2cce5af0a8ea27bdeb625529c3e7bd1fc5bc2f20edfd
SHA512be2bf2c1a53d6f0baf85f16f4a29480f1f0b9677ffcfa099e4391b3235d8618c966da8e68f78f239c6e4ea5ce64bc923dcc522bc1100246cc48f06bdc2cc9510