Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12-10-2024 19:54
Behavioral task
behavioral1
Sample
Yippe.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Yippe.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
m�1D��.pyc
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
m�1D��.pyc
Resource
win10v2004-20241007-en
General
-
Target
Yippe.exe
-
Size
6.0MB
-
MD5
bda19e34929fb14315a854571abbfa9b
-
SHA1
9e60ef9d0884bbecab74fe00453d228373bd5b84
-
SHA256
d8f2bebb1a9fd29ee44c06b24cc09b1875bdc642ab9e704e0e7ce8c4729fe40f
-
SHA512
bb1ea726b94628b5f19ee83ad4a10ad52a25a5c99dff640dadae26a3d8dd538cd75f1ceaf82577a014ae26b60598108b7cfbd6aceb36bb98d181a53ed8b79751
-
SSDEEP
98304:EBgCEtdFBg/WamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4RoBMZ63HsluTG:EBgJF4feN/FJMIDJf0gsAGK4RouZ9kTG
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2708 Yippe.exe -
resource yara_rule behavioral1/files/0x000500000001a05a-21.dat upx behavioral1/memory/2708-23-0x000007FEF6560000-0x000007FEF69CE000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2708 2080 Yippe.exe 30 PID 2080 wrote to memory of 2708 2080 Yippe.exe 30 PID 2080 wrote to memory of 2708 2080 Yippe.exe 30
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5178a0f45fde7db40c238f1340a0c0ec0
SHA1dcd2d3d14e06da3e8d7dc91a69b5fd785768b5fe
SHA2569fcb5ad15bd33dd72122a171a5d950e8e47ceda09372f25df828010cde24b8ed
SHA5124b790046787e57b9414a796838a026b1530f497a75c8e62d62b56f8c16a0cbedbefad3d4be957bc18379f64374d8d3bf62d3c64b53476c7c5005a7355acd2cee