Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    135s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2024, 11:37

General

  • Target

    YogaDNSSetup.exe

  • Size

    8.0MB

  • MD5

    a1780f92321a1857505752a53888cebb

  • SHA1

    77bb3b55f2704a50d9b8b3c67e5b2e57ad9824ed

  • SHA256

    483e99a23d9348f63deab43c8f0c09afb2af9ca313ce401e27b9e31aeba7eb63

  • SHA512

    b5b61b3be90d3952bbd4bf43bf383bab56c7de88afe4057990c8e1d238bece54781b9701b615c7a27d6bcc1ad6ebd537eb3a7be2c9a9df094c290c3d84bb4f15

  • SSDEEP

    196608:RbfgBIO7uGevAeadYrsrnql79gG8l/oEqns:Vw9headYozql7Glgps

Malware Config

Signatures

  • Drops file in Drivers directory 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 16 IoCs
  • Drops file in Windows directory 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 37 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 41 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\YogaDNSSetup.exe
    "C:\Users\Admin\AppData\Local\Temp\YogaDNSSetup.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2404
    • C:\Users\Admin\AppData\Local\Temp\is-RQDDE.tmp\YogaDNSSetup.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-RQDDE.tmp\YogaDNSSetup.tmp" /SL5="$400E0,7486188,831488,C:\Users\Admin\AppData\Local\Temp\YogaDNSSetup.exe"
      2⤵
      • Adds Run key to start application
      • Drops file in Program Files directory
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:3020
      • C:\Program Files (x86)\YogaDNS\YogaDNS.exe
        "C:\Program Files (x86)\YogaDNS\YogaDNS.exe" /ForceExit
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2452
      • C:\Windows\SysWOW64\NET.EXE
        "NET.EXE" stop DnsFltEngineDrv
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2800
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop DnsFltEngineDrv
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1432
      • C:\Windows\system32\RUNDLL32.EXE
        "RUNDLL32.EXE" SETUPAPI.DLL,InstallHinfSection DefaultInstall 132 C:\Program Files (x86)\YogaDNS\Driver\DnsFltEngineDrv.inf
        3⤵
        • Drops file in Drivers directory
        • Adds Run key to start application
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:492
        • C:\Windows\system32\runonce.exe
          "C:\Windows\system32\runonce.exe" -r
          4⤵
          • Checks processor information in registry
          • Suspicious use of WriteProcessMemory
          PID:1972
          • C:\Windows\System32\grpconv.exe
            "C:\Windows\System32\grpconv.exe" -o
            5⤵
              PID:1400
        • C:\Program Files (x86)\YogaDNS\YogaDNS.exe
          "C:\Program Files (x86)\YogaDNS\YogaDNS.exe" /ShowWnd
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Modifies system certificate store
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2464
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe" https://www.yogadns.com/
            4⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2116
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2116 CREDAT:275457 /prefetch:2
              5⤵
              • System Location Discovery: System Language Discovery
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:888

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\PROGRA~2\YogaDNS\Driver\DnsFltEngineDrv.sys

      Filesize

      60KB

      MD5

      e280e289aed282e8b611e91732b0c620

      SHA1

      8edc5772328b744c51e67cc8bf797a914b0bcf12

      SHA256

      8a06b07e861304616ec3b8a49cdf82bb7f2817e4ba32eec6ce784023b0d86f9e

      SHA512

      1a953172bd8a939ac5d7268f76b039611feaa34d6620bc9f5f8d4ed4c49dd1b1abc39ad0d5db365a780f322b3784e2361f9a53063eb8d0eb751f9b0d694a28ef

    • C:\Program Files (x86)\YogaDNS\Driver\DnsFltEngineDrv.inf

      Filesize

      2KB

      MD5

      71f188b094aea862b928579ea3b5b8d3

      SHA1

      21d4b6912bcdc0afd74265b42745b5ed34b35000

      SHA256

      cb0e4c116e30890da4a9bc143826e65bf6c4f200237c8a0cbb12934c63a8954f

      SHA512

      aaead4947a3b8def2793cc85c5b8ef206df83d187009075b346fea48e5b82f9155c9b1b00effce6627dbe6cd7a55b3fa4ea8ec41c3825a9ade9022b3a9281af0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

      Filesize

      717B

      MD5

      822467b728b7a66b081c91795373789a

      SHA1

      d8f2f02e1eef62485a9feffd59ce837511749865

      SHA256

      af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9

      SHA512

      bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\ECC871EB3D0C768B5D5F174AD880C518

      Filesize

      345B

      MD5

      92d9a8cbccb22f1bbf85b87ee4546c56

      SHA1

      f058b25d06a5a273014e6e347347947caa15f06d

      SHA256

      4b82eda085f20c943a6133b04b66d46f184ce8e197baa9d6859afe59b6f3ac93

      SHA512

      74281e1eb92b8fb9b35fc58c4f3dca46828e797960e5aedf32b1b4eb991d38d4d303cefaf95a1a201e3d5635e5fd664783594ab25269db7004d280e7f54cd39b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

      Filesize

      192B

      MD5

      0845af6fd130523063e839fe89e95003

      SHA1

      af681321495db67df898e342f7ca0d8d7d090078

      SHA256

      b131ea8f65d2bd45997d97bdbcf0a56717877f62c0d7731b6f2b2baa254040a7

      SHA512

      d97264f96f3defb77b964a6496a9fe8ad3f9152068892d97be22f20b8ec67056f8d74da4df3e397050af2791cab999bb1e1d7c38cf59674fe69f1a5c5085307c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      64e8fb08eef1eae9368d1d25f88f5768

      SHA1

      50c965fae39356b8ebd012eebc5000b0cdde5a87

      SHA256

      2cf0434f67ecbdf127e3f15f0f4c021efb63e156a0ee83b3db499c8f51c8fa5b

      SHA512

      62114128d1f830b485c37731dae8fea6a4126cd31ce5aa5ca40b930c6e804a42193d2a3ceb0df2fdabceed0e94cfb418fea551a1c44f9b86495e5cce3cd850c1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      952fcc5ec04cc137d20b190aa51ac389

      SHA1

      28e12d5124d075d97a65a14d14d07e765540ab1b

      SHA256

      6208d082132ce995faab9ffcec982eefe1469cd559d54feebdd9392c4b78862b

      SHA512

      1af4b9e747c4ded0fb5fc61678e1c887d450b5892ed237de94a9b84a859ef91961e229623b935f5cbc1f20f787015025384aee618fcdf79065238b296b3994bf

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      04f4d758c15520696838f80ca801994c

      SHA1

      0eb0e2317223522ac260719c2b36246338580d0e

      SHA256

      18134377157aa979977b649c5344f27e39cc3b7a914d8ffc5f8f40c9b8bbfe2b

      SHA512

      fc233a42e7448cfcb67063da79946dc395f059b95771d6cf6ea7ed6f62f42a582e4b66535825498b1969d49982a331c2439d08fa9b00034dd2143b2088e0d3ee

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      509a8c5360d5724361287f578ca2f972

      SHA1

      d10b6c4bda02e1207a5caa5783e755d1a3af4871

      SHA256

      e0d166b59dbfbe6effc00920484cb511477ab1de9d1f8c1b65bc75a8829612be

      SHA512

      4e1b6929b32f612075ec565a484214b653381145fa3902690a48bb7f3ad8ae286c45f96f890a944a22cca2ee78928e81c4065524754df7544e7ae4fd18ac0fe1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      f986b15f3320194851526891a3ad30c2

      SHA1

      12b5c103c2f605bc469a3e26327cf9b344bb021f

      SHA256

      31ac0adeb7007abb9ca7e101ae1590b9b82bb05cfb24614bcaa38bf8a4824b50

      SHA512

      a4c48c3db35bb2014a79222c0960335b371f23c78d55496da0c2cd5dd7e413c8a0b31f70fd54e10650a798562143c4ce6525290ac58aac0b678a8d1e72bf09de

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      55b7afa3e817b684c7543dc14f78fdfc

      SHA1

      673c4a2c69ef886827b38635c89f7978f3c668e5

      SHA256

      19baeb8fee48a049fee11d56af2eecde831e4d13b8070b7debd16365ed85f96c

      SHA512

      638fcd8c9ca498901eb251df36eee2dd3780317cdfe9d778d55db7d9ec9c52e81fca258f592671fefda51d3ed326c1c3aa63e315f112a3ce93c801752bfa9aff

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      a1452752421cf48421a96c97fae02a6f

      SHA1

      f1d8c21a341671fb7c57d99d02aa94b1479e26e0

      SHA256

      d256ba10156784e8c3a927b74d9223d391fecc408abe46f25be345b6974224ed

      SHA512

      19b6d1e9f069b9b279a40689fc981d498e47d74882408274052d245a68c59934aaf08ff3f8f6b2ecc8a62b80352684de2fa01f39d08eaf33b824a46eba1dc834

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      5d1ef6ada9b8909ec2e31eda9f3d052d

      SHA1

      121b8a08424a059d5ef2a89ddeae66dff23f8aff

      SHA256

      c9f559bf68957b9565a222fcc2f88cd7cb3af47ef290fb9cff9d0379bff88211

      SHA512

      42bb7dfe53528759c0ef97c2cbd4fb8b42a3975b9be23a3c7f15c91373317e7397d7b3a9c459ef87bd04ac23cd507cbb0617756063c4a9a9fe177446c1ebec70

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      0ae9b32b0e09ee142e9cc6dad491b8a7

      SHA1

      072fa30662e836edfd4dcde3d2d0522fe4886139

      SHA256

      9d8c59fdf7b69df2a0aa7639aa88b38dffaa6c5c922d184e64ef5ddb4c1526cd

      SHA512

      7c3d9fa9ad834378df9df521ff28f34dc9a39b818169b5f02cf5b75afcce4be71401658e1501976bb6949b33641caeb639f4dc5eaa0af01dc15d6194cd674b97

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      f8ca3e779826c7ba87af7ca2e6a72ecc

      SHA1

      d66eeda643cf192ca8e4d764a007da1de72e0180

      SHA256

      756da3afe78f324dce1602fb0decfef4dd2500c7095aa315b6b55cc05d23eb42

      SHA512

      404eeb504b6c00eb6503fbed877af39aaa0dd000e82474ca09c348c8aad7660b6308f1f296a4a12c5e2ee6f2d9c168a9ede17005aff5ff0aaf2cb6782cf3c6ec

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\ECC871EB3D0C768B5D5F174AD880C518

      Filesize

      540B

      MD5

      043b0e79c276eb78a1ee81a5fbd185c1

      SHA1

      bbcf08d16cfadc72dc97822a2575346a0afd6e09

      SHA256

      504be98fa1fd2e14a54a14fd3362ceba996c4dd5347301637c79b6a6d7b57954

      SHA512

      f77f3d07533a7b5c57fc81a3f3c640df24bed1af67f6721721fe3c3af3fd14a40dd456cb496f053a6d5d5b62b28558fb0e98740f3f746a38f33eb3189db6c2ae

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\guoemn1\imagestore.dat

      Filesize

      6KB

      MD5

      b7787710441abffc67cf182938a8bea8

      SHA1

      306bb519c6014934d122811ef81e9af647c74bb9

      SHA256

      f008fce0c626f76ddd4f151a4ec81432da9532e7342a0a73eba678afb2387ecf

      SHA512

      beb50aa959be2461e3c3cb11cfccc1421b92c3778a9e21de0cfa1a9577f2baee133973e53ba1f041363f184475fd94be2c682162c6cf6382165ff795ae9f8baa

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EB0KZ1Y4\favicon[1].png

      Filesize

      6KB

      MD5

      11a1da8cbf3341190bce1eacce9f7720

      SHA1

      5a07f8639a27e17798457a2b2a11732ce683808d

      SHA256

      1ac9de48aab2e9d92c66ebce7cd9c5f45457172c356f5a232608cfef6e0fb933

      SHA512

      d3c72f4170e5c7e05a96acfe7af6b36e36e16a084d9bdc11d00d99418d6bd2cad9e0ef7bea454e57f55232e57b74f8a76ee33b9edb175d04158993c1797a777e

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZOGPI1N2\app[1].js

      Filesize

      118KB

      MD5

      1b667ff04121825f5164cae2fdd14942

      SHA1

      060cd75bad01483d48b49b064f35ac7172078006

      SHA256

      75b2158f405583651b09090b560b750a5ffd37bcb4d30d255c9aea8981161f21

      SHA512

      97cc1ffa56550d71a78561239df40df436403af59a16c12ae2a83e6b12cac68ee9036986c04c3507155a66b32c07723406566adb491793cdbec645e673437dcf

    • C:\Users\Admin\AppData\Local\Temp\Cab18DE.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\Tar3017.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Program Files (x86)\YogaDNS\ServiceManager.exe

      Filesize

      726KB

      MD5

      e2d209e03b611e54639678a1c72f210e

      SHA1

      cbb8924fa05b015dc212fee3fd6861217131806a

      SHA256

      768ed606dedcf8911bab477fc823c47b38cf28c128ed8e374c679ec1e0e38799

      SHA512

      7505292b7b490df3c7284b8a61c6c440ae3814685650bec7a78f6303f333baac17121f104f44c0bbfcc51cbf060b9b3cf5a874f08fd430e162a7af2a9b1e19b0

    • \Program Files (x86)\YogaDNS\YogaDNS.exe

      Filesize

      6.0MB

      MD5

      c0c0b96046f27f7b549c42cd6b48b2d8

      SHA1

      39bc3bbe61be2128e5f8d839dd08722b83fc45d9

      SHA256

      76409047ea4fc5785e9499ca5215e457de446e08474fdf7c81eb83d3af2b1afe

      SHA512

      b3aabfc3ef919850bca9043c251d73d51af8d1feaf47c87fed0e3bf45f61a4f1bc8558191877028b1418c2c7a994e35d65a555efd05e9952eb961bd3004f6d33

    • \Users\Admin\AppData\Local\Temp\is-RQDDE.tmp\YogaDNSSetup.tmp

      Filesize

      3.1MB

      MD5

      9a918ea79f21edea6046bb11ec0f94b9

      SHA1

      63aa5d0d209e3a1a45cd933c3c712c640bd667f3

      SHA256

      78acc8f6748ed579e0cbe4de2ec748561363f49bb614587afddabdd4351fe843

      SHA512

      ada1b7a07e1500ecf61dc09760ac2cb2c000a9a3ff6af17cd2a0096ae01f340b21b4c823205af4bab373c9052cc9b4fafe575b12e77856b280597b5c7e3cc47a

    • memory/2404-81-0x0000000000400000-0x00000000004D8000-memory.dmp

      Filesize

      864KB

    • memory/2404-0-0x0000000000400000-0x00000000004D8000-memory.dmp

      Filesize

      864KB

    • memory/2404-2-0x0000000000401000-0x00000000004B7000-memory.dmp

      Filesize

      728KB

    • memory/2404-10-0x0000000000400000-0x00000000004D8000-memory.dmp

      Filesize

      864KB

    • memory/3020-18-0x0000000000400000-0x000000000071A000-memory.dmp

      Filesize

      3.1MB

    • memory/3020-22-0x0000000000400000-0x000000000071A000-memory.dmp

      Filesize

      3.1MB

    • memory/3020-20-0x0000000000400000-0x000000000071A000-memory.dmp

      Filesize

      3.1MB

    • memory/3020-24-0x0000000000400000-0x000000000071A000-memory.dmp

      Filesize

      3.1MB

    • memory/3020-16-0x0000000000400000-0x000000000071A000-memory.dmp

      Filesize

      3.1MB

    • memory/3020-14-0x0000000000400000-0x000000000071A000-memory.dmp

      Filesize

      3.1MB

    • memory/3020-12-0x0000000000400000-0x000000000071A000-memory.dmp

      Filesize

      3.1MB

    • memory/3020-75-0x0000000000400000-0x000000000071A000-memory.dmp

      Filesize

      3.1MB

    • memory/3020-9-0x0000000000400000-0x000000000071A000-memory.dmp

      Filesize

      3.1MB

    • memory/3020-80-0x0000000000400000-0x000000000071A000-memory.dmp

      Filesize

      3.1MB