Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
95s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2024, 11:37
Static task
static1
Behavioral task
behavioral1
Sample
YogaDNSSetup.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
YogaDNSSetup.exe
Resource
win10v2004-20241007-en
General
-
Target
YogaDNSSetup.exe
-
Size
8.0MB
-
MD5
a1780f92321a1857505752a53888cebb
-
SHA1
77bb3b55f2704a50d9b8b3c67e5b2e57ad9824ed
-
SHA256
483e99a23d9348f63deab43c8f0c09afb2af9ca313ce401e27b9e31aeba7eb63
-
SHA512
b5b61b3be90d3952bbd4bf43bf383bab56c7de88afe4057990c8e1d238bece54781b9701b615c7a27d6bcc1ad6ebd537eb3a7be2c9a9df094c290c3d84bb4f15
-
SSDEEP
196608:RbfgBIO7uGevAeadYrsrnql79gG8l/oEqns:Vw9headYozql7Glgps
Malware Config
Signatures
-
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\SETAFE7.tmp DrvInst.exe File created C:\Windows\System32\drivers\SETAFE7.tmp DrvInst.exe File opened for modification C:\Windows\System32\drivers\DnsFltEngineDrv.sys DrvInst.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\YogaDNS = "\"C:\\Program Files (x86)\\YogaDNS\\YogaDNS.exe\" /AutoRun" YogaDNSSetup.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\GrpConv = "grpconv -o" RUNDLL32.EXE -
Drops file in System32 directory 15 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\drvstore.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{2e3e5c2d-9dcf-a744-b194-21db345e3388}\SETAEBE.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{2e3e5c2d-9dcf-a744-b194-21db345e3388}\SETAEBF.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{2e3e5c2d-9dcf-a744-b194-21db345e3388}\SETAEC0.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\dnsfltenginedrv.inf_amd64_70fcb7f63230c89c\DnsFltEngineDrv.cat DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\dnsfltenginedrv.inf_amd64_70fcb7f63230c89c\DnsFltEngineDrv.inf DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{2e3e5c2d-9dcf-a744-b194-21db345e3388} DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{2e3e5c2d-9dcf-a744-b194-21db345e3388}\DnsFltEngineDrv.cat DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{2e3e5c2d-9dcf-a744-b194-21db345e3388}\SETAEBF.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{2e3e5c2d-9dcf-a744-b194-21db345e3388}\DnsFltEngineDrv.inf DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{2e3e5c2d-9dcf-a744-b194-21db345e3388}\SETAEC0.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{2e3e5c2d-9dcf-a744-b194-21db345e3388}\DnsFltEngineDrv.sys DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{2e3e5c2d-9dcf-a744-b194-21db345e3388}\SETAEBE.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\dnsfltenginedrv.inf_amd64_70fcb7f63230c89c\DnsFltEngineDrv.sys DrvInst.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt DrvInst.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 16 IoCs
description ioc Process File created C:\Program Files (x86)\YogaDNS\Driver\is-7J8EJ.tmp YogaDNSSetup.tmp File created C:\Program Files (x86)\YogaDNS\Driver\is-CEEIE.tmp YogaDNSSetup.tmp File created C:\Program Files (x86)\YogaDNS\is-U5TR5.tmp YogaDNSSetup.tmp File created C:\Program Files (x86)\YogaDNS\is-MVIKT.tmp YogaDNSSetup.tmp File created C:\Program Files (x86)\YogaDNS\is-ISSJ1.tmp YogaDNSSetup.tmp File created C:\Program Files (x86)\YogaDNS\is-H5VRP.tmp YogaDNSSetup.tmp File created C:\Program Files (x86)\YogaDNS\is-DUG2S.tmp YogaDNSSetup.tmp File created C:\Program Files (x86)\YogaDNS\Driver\is-58IJU.tmp YogaDNSSetup.tmp File opened for modification C:\Program Files (x86)\YogaDNS\unins000.dat YogaDNSSetup.tmp File opened for modification C:\Program Files (x86)\YogaDNS\YogaDNS.exe YogaDNSSetup.tmp File created C:\Program Files (x86)\YogaDNS\is-EKBBL.tmp YogaDNSSetup.tmp File created C:\Program Files (x86)\YogaDNS\unins000.dat YogaDNSSetup.tmp File created C:\Program Files (x86)\YogaDNS\is-RSA2M.tmp YogaDNSSetup.tmp File created C:\Program Files (x86)\YogaDNS\unins000.msg YogaDNSSetup.tmp File opened for modification C:\Program Files (x86)\YogaDNS\dnscrypt.dll YogaDNSSetup.tmp File opened for modification C:\Program Files (x86)\YogaDNS\ServiceManager.exe YogaDNSSetup.tmp -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\INF\setupapi.dev.log RUNDLL32.EXE File opened for modification C:\Windows\INF\setupapi.dev.log svchost.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\inf\oem3.inf DrvInst.exe File created C:\Windows\inf\oem3.inf DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe -
Executes dropped EXE 4 IoCs
pid Process 1280 YogaDNSSetup.tmp 3844 YogaDNS.exe 3836 YogaDNS.exe 1636 YogaDNS.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language YogaDNS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language YogaDNSSetup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language YogaDNSSetup.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language YogaDNS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NET.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language YogaDNS.exe -
Checks SCSI registry key(s) 3 TTPs 26 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Phantom DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\CompatibleIDs DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 DrvInst.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz runonce.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 runonce.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\Main\MigrationModeData = "2106930111" YogaDNS.exe -
Modifies data under HKEY_USERS 41 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1280 YogaDNSSetup.tmp 1280 YogaDNSSetup.tmp -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 664 Process not Found -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeAuditPrivilege 3716 svchost.exe Token: SeSecurityPrivilege 3716 svchost.exe Token: SeRestorePrivilege 2452 DrvInst.exe Token: SeBackupPrivilege 2452 DrvInst.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 1280 YogaDNSSetup.tmp 3836 YogaDNS.exe 3836 YogaDNS.exe 1636 YogaDNS.exe 1636 YogaDNS.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 3836 YogaDNS.exe 3836 YogaDNS.exe 1636 YogaDNS.exe 1636 YogaDNS.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 3844 YogaDNS.exe 3836 YogaDNS.exe 3836 YogaDNS.exe 1636 YogaDNS.exe 1636 YogaDNS.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 1848 wrote to memory of 1280 1848 YogaDNSSetup.exe 84 PID 1848 wrote to memory of 1280 1848 YogaDNSSetup.exe 84 PID 1848 wrote to memory of 1280 1848 YogaDNSSetup.exe 84 PID 1280 wrote to memory of 3844 1280 YogaDNSSetup.tmp 89 PID 1280 wrote to memory of 3844 1280 YogaDNSSetup.tmp 89 PID 1280 wrote to memory of 3844 1280 YogaDNSSetup.tmp 89 PID 1280 wrote to memory of 4956 1280 YogaDNSSetup.tmp 90 PID 1280 wrote to memory of 4956 1280 YogaDNSSetup.tmp 90 PID 1280 wrote to memory of 4956 1280 YogaDNSSetup.tmp 90 PID 4956 wrote to memory of 1524 4956 NET.EXE 92 PID 4956 wrote to memory of 1524 4956 NET.EXE 92 PID 4956 wrote to memory of 1524 4956 NET.EXE 92 PID 1280 wrote to memory of 4532 1280 YogaDNSSetup.tmp 93 PID 1280 wrote to memory of 4532 1280 YogaDNSSetup.tmp 93 PID 3716 wrote to memory of 856 3716 svchost.exe 95 PID 3716 wrote to memory of 856 3716 svchost.exe 95 PID 3716 wrote to memory of 2452 3716 svchost.exe 97 PID 3716 wrote to memory of 2452 3716 svchost.exe 97 PID 4532 wrote to memory of 1652 4532 RUNDLL32.EXE 98 PID 4532 wrote to memory of 1652 4532 RUNDLL32.EXE 98 PID 1652 wrote to memory of 3892 1652 runonce.exe 99 PID 1652 wrote to memory of 3892 1652 runonce.exe 99 PID 1280 wrote to memory of 3836 1280 YogaDNSSetup.tmp 100 PID 1280 wrote to memory of 3836 1280 YogaDNSSetup.tmp 100 PID 1280 wrote to memory of 3836 1280 YogaDNSSetup.tmp 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\YogaDNSSetup.exe"C:\Users\Admin\AppData\Local\Temp\YogaDNSSetup.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Users\Admin\AppData\Local\Temp\is-SP7TM.tmp\YogaDNSSetup.tmp"C:\Users\Admin\AppData\Local\Temp\is-SP7TM.tmp\YogaDNSSetup.tmp" /SL5="$801E6,7486188,831488,C:\Users\Admin\AppData\Local\Temp\YogaDNSSetup.exe"2⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Program Files (x86)\YogaDNS\YogaDNS.exe"C:\Program Files (x86)\YogaDNS\YogaDNS.exe" /ForceExit3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3844
-
-
C:\Windows\SysWOW64\NET.EXE"NET.EXE" stop DnsFltEngineDrv3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop DnsFltEngineDrv4⤵
- System Location Discovery: System Language Discovery
PID:1524
-
-
-
C:\Windows\system32\RUNDLL32.EXE"RUNDLL32.EXE" SETUPAPI.DLL,InstallHinfSection DefaultInstall 132 C:\Program Files (x86)\YogaDNS\Driver\DnsFltEngineDrv.inf3⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Windows\system32\runonce.exe"C:\Windows\system32\runonce.exe" -r4⤵
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\System32\grpconv.exe"C:\Windows\System32\grpconv.exe" -o5⤵PID:3892
-
-
-
-
C:\Program Files (x86)\YogaDNS\YogaDNS.exe"C:\Program Files (x86)\YogaDNS\YogaDNS.exe" /ShowWnd3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3836
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall1⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{d75cdc82-b13e-3440-baa8-0fa7a36dedeb}\DnsFltEngineDrv.inf" "9" "48ceef827" "0000000000000138" "WinSta0\Default" "0000000000000158" "208" "C:\Program Files (x86)\YogaDNS\Driver"2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
PID:856
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "8" "4" "C:\Windows\System32\DriverStore\FileRepository\dnsfltenginedrv.inf_amd64_70fcb7f63230c89c\dnsfltenginedrv.inf" "0" "48ceef827" "0000000000000158" "WinSta0\Default"2⤵
- Drops file in Drivers directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2452
-
-
C:\Program Files (x86)\YogaDNS\YogaDNS.exe"C:\Program Files (x86)\YogaDNS\YogaDNS.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1636
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1108
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5e280e289aed282e8b611e91732b0c620
SHA18edc5772328b744c51e67cc8bf797a914b0bcf12
SHA2568a06b07e861304616ec3b8a49cdf82bb7f2817e4ba32eec6ce784023b0d86f9e
SHA5121a953172bd8a939ac5d7268f76b039611feaa34d6620bc9f5f8d4ed4c49dd1b1abc39ad0d5db365a780f322b3784e2361f9a53063eb8d0eb751f9b0d694a28ef
-
Filesize
2KB
MD571f188b094aea862b928579ea3b5b8d3
SHA121d4b6912bcdc0afd74265b42745b5ed34b35000
SHA256cb0e4c116e30890da4a9bc143826e65bf6c4f200237c8a0cbb12934c63a8954f
SHA512aaead4947a3b8def2793cc85c5b8ef206df83d187009075b346fea48e5b82f9155c9b1b00effce6627dbe6cd7a55b3fa4ea8ec41c3825a9ade9022b3a9281af0
-
Filesize
6.0MB
MD5c0c0b96046f27f7b549c42cd6b48b2d8
SHA139bc3bbe61be2128e5f8d839dd08722b83fc45d9
SHA25676409047ea4fc5785e9499ca5215e457de446e08474fdf7c81eb83d3af2b1afe
SHA512b3aabfc3ef919850bca9043c251d73d51af8d1feaf47c87fed0e3bf45f61a4f1bc8558191877028b1418c2c7a994e35d65a555efd05e9952eb961bd3004f6d33
-
Filesize
717B
MD5822467b728b7a66b081c91795373789a
SHA1d8f2f02e1eef62485a9feffd59ce837511749865
SHA256af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9
SHA512bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6
-
Filesize
345B
MD592d9a8cbccb22f1bbf85b87ee4546c56
SHA1f058b25d06a5a273014e6e347347947caa15f06d
SHA2564b82eda085f20c943a6133b04b66d46f184ce8e197baa9d6859afe59b6f3ac93
SHA51274281e1eb92b8fb9b35fc58c4f3dca46828e797960e5aedf32b1b4eb991d38d4d303cefaf95a1a201e3d5635e5fd664783594ab25269db7004d280e7f54cd39b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
Filesize192B
MD5a4a8553372eb5462e4b8b5b88ef910cb
SHA11eddbaf43d53adea3a5a89b203b657b5f5bb2c79
SHA25618ed1b4cc16c317f4b485aeb94c56e0276cbc97ee498522cb80ba213d3485f69
SHA512b8c8017691a62d3e093c31b4cc8baf7cc50dee404ce35f35f24293a3c9a40ed7d19af707b3c9c1171a504115245df886e54091ae69b9071d40e7cf3f4fb702fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\ECC871EB3D0C768B5D5F174AD880C518
Filesize540B
MD5243139059b42af148bde13a2c3ec91e4
SHA19193b16f9f01f67e2abd447922c25bebcd083c6b
SHA256a1706990c57175828ad2576f2077a6c7d33d1a0da340d3719c94ef1650efcd29
SHA512a91086f62efd534243284b1152a4718cb3d928b1c8b20a5f154461ab56cd46fff6f4defd351d236d14c92065e8ac0716e0dec948381bdef56540e5dace358a67
-
Filesize
3.1MB
MD59a918ea79f21edea6046bb11ec0f94b9
SHA163aa5d0d209e3a1a45cd933c3c712c640bd667f3
SHA25678acc8f6748ed579e0cbe4de2ec748561363f49bb614587afddabdd4351fe843
SHA512ada1b7a07e1500ecf61dc09760ac2cb2c000a9a3ff6af17cd2a0096ae01f340b21b4c823205af4bab373c9052cc9b4fafe575b12e77856b280597b5c7e3cc47a
-
Filesize
11KB
MD5b243199ab0c6836a0896037a45af42d3
SHA1ed9957261161d52dae8eb200b1c6afd9a08eccda
SHA2563ca2becf9d4177a539f5ea0913c882232c92e4caf193d2d0782e0bac7a421d00
SHA5129860a56d79cc6dba7bc5b2d502f3ae69cc87d6908172d022ee39a2feb650cd144be4d3ee82364e65b8247f3bb6e0514f172d129ccfd983dc99f445c14ec242fa
-
Filesize
809B
MD5ae1d26ab2dce3e14c041ed748377f5d1
SHA17eef6a18a5df6516be0e684ce66db1218c82b4bc
SHA256bec2a3c3bc8e0e68c25d229636f58548f5e82806470b35711ccb4b09be099b06
SHA5125ac57724e3b80f6aaff2f1c5c126bdadcef6a2932bac592ae5f596218b16673f6a7e9b635b0a5b986a9b4109e295585ad8eb387a9bc6c4d39a9abd1cd111ee32