Analysis
-
max time kernel
69s -
max time network
77s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
14/11/2024, 19:59
Behavioral task
behavioral1
Sample
yasser.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
yasser.exe
Resource
win10v2004-20241007-en
General
-
Target
yasser.exe
-
Size
114KB
-
MD5
5bf506720c41a2b752daa11398c6dc6b
-
SHA1
8c37bdd4eda3b71ea2ee17556763ab90c7067dba
-
SHA256
3d18fbbcd58e4f162059ff00d08510fcb43d90cf676ad8ecc929d5c36395f19f
-
SHA512
a6ca960e64547ef9f88a8479ce2663b1d2402864d077b68c3992bd00f7c447da0bf93bc474bf2c2bc9161d3ce34df01b16b4cfbc6f880d4f1b603a49f9c0428c
-
SSDEEP
3072:3gZApdYrD28fbJB2yLtyTIbjjxK3QdjrxivW+DXnH4vymb81w:3/pe1J0IbXtrxivW+D34vu
Malware Config
Signatures
-
VanillaRat
VanillaRat is an advanced remote administration tool coded in C#.
-
Vanillarat family
-
Vanilla Rat payload 3 IoCs
resource yara_rule behavioral1/memory/1700-1-0x0000000001020000-0x0000000001042000-memory.dmp vanillarat behavioral1/files/0x0008000000015d59-5.dat vanillarat behavioral1/memory/2312-11-0x00000000002E0000-0x0000000000302000-memory.dmp vanillarat -
Executes dropped EXE 1 IoCs
pid Process 2312 yasser.exe -
Loads dropped DLL 1 IoCs
pid Process 1700 yasser.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\yasser = "C:\\Users\\Admin\\AppData\\Roaming\\yasser.exe" yasser.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yasser.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yasser.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1700 yasser.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1700 wrote to memory of 2312 1700 yasser.exe 30 PID 1700 wrote to memory of 2312 1700 yasser.exe 30 PID 1700 wrote to memory of 2312 1700 yasser.exe 30 PID 1700 wrote to memory of 2312 1700 yasser.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\yasser.exe"C:\Users\Admin\AppData\Local\Temp\yasser.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Roaming\yasser.exe"C:\Users\Admin\AppData\Roaming\yasser.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2312
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
114KB
MD55bf506720c41a2b752daa11398c6dc6b
SHA18c37bdd4eda3b71ea2ee17556763ab90c7067dba
SHA2563d18fbbcd58e4f162059ff00d08510fcb43d90cf676ad8ecc929d5c36395f19f
SHA512a6ca960e64547ef9f88a8479ce2663b1d2402864d077b68c3992bd00f7c447da0bf93bc474bf2c2bc9161d3ce34df01b16b4cfbc6f880d4f1b603a49f9c0428c