Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
13-11-2024 08:46
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
yef.exe
Resource
win7-20240729-en
windows7-x64
5 signatures
150 seconds
General
-
Target
yef.exe
-
Size
1.2MB
-
MD5
58991bbcf8a974e128ba64f3bcb31e6e
-
SHA1
645a5096283c1f0b63ff07f3927534e44804114d
-
SHA256
d05f328df78420b8d97cb7205cccee30617ebeff333ac8d5ed32f6da69563baa
-
SHA512
76c35a2b6b787ded9c049b189b8844019720f47c0f2e07ced1c9b9b7622382d50062770f222ad1a0a626e66498be3d3e6cc22ca9c7fbf72d3b29b7f59e881eb6
-
SSDEEP
24576:rwVTXJvatkjAE+k/7aygMpbUdtoQVj020iDqxJooLUcdJYRk:KTQujL+hMyhVj8y8J7UcG
Malware Config
Signatures
-
pid Process 1892 powershell.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yef.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 304 yef.exe 304 yef.exe 304 yef.exe 304 yef.exe 304 yef.exe 304 yef.exe 304 yef.exe 304 yef.exe 304 yef.exe 304 yef.exe 1892 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 304 yef.exe Token: SeDebugPrivilege 1892 powershell.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 304 wrote to memory of 1892 304 yef.exe 31 PID 304 wrote to memory of 1892 304 yef.exe 31 PID 304 wrote to memory of 1892 304 yef.exe 31 PID 304 wrote to memory of 1892 304 yef.exe 31 PID 304 wrote to memory of 1884 304 yef.exe 33 PID 304 wrote to memory of 1884 304 yef.exe 33 PID 304 wrote to memory of 1884 304 yef.exe 33 PID 304 wrote to memory of 1884 304 yef.exe 33 PID 304 wrote to memory of 2100 304 yef.exe 34 PID 304 wrote to memory of 2100 304 yef.exe 34 PID 304 wrote to memory of 2100 304 yef.exe 34 PID 304 wrote to memory of 2100 304 yef.exe 34 PID 304 wrote to memory of 1888 304 yef.exe 35 PID 304 wrote to memory of 1888 304 yef.exe 35 PID 304 wrote to memory of 1888 304 yef.exe 35 PID 304 wrote to memory of 1888 304 yef.exe 35 PID 304 wrote to memory of 2892 304 yef.exe 36 PID 304 wrote to memory of 2892 304 yef.exe 36 PID 304 wrote to memory of 2892 304 yef.exe 36 PID 304 wrote to memory of 2892 304 yef.exe 36 PID 304 wrote to memory of 2896 304 yef.exe 37 PID 304 wrote to memory of 2896 304 yef.exe 37 PID 304 wrote to memory of 2896 304 yef.exe 37 PID 304 wrote to memory of 2896 304 yef.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\yef.exe"C:\Users\Admin\AppData\Local\Temp\yef.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:304 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove -ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name '';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name '' -Value '"C:\Users\Admin\AppData\Roaming\.exe"' -PropertyType 'String'2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1892
-
-
C:\Users\Admin\AppData\Local\Temp\yef.exe#cmd2⤵PID:1884
-
-
C:\Users\Admin\AppData\Local\Temp\yef.exe#cmd2⤵PID:2100
-
-
C:\Users\Admin\AppData\Local\Temp\yef.exe#cmd2⤵PID:1888
-
-
C:\Users\Admin\AppData\Local\Temp\yef.exe#cmd2⤵PID:2892
-
-
C:\Users\Admin\AppData\Local\Temp\yef.exe#cmd2⤵PID:2896
-