Resubmissions

19/11/2024, 15:13

241119-slznesybpk 3

19/11/2024, 15:10

241119-ska9faxelg 3

19/11/2024, 15:07

241119-shdxjsxeke 3

Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    19/11/2024, 15:07

General

  • Target

    Yeis 1.5/Memory.deps.json

  • Size

    1KB

  • MD5

    78ed6fad6ec05bc9b1b1ecfa85f110fd

  • SHA1

    56d199070c924981a1b5701a0287379da2571cd2

  • SHA256

    a6ad49f47e057b95024db3bb96ed8b50c94d66a3e6df343dbe46cdc3e5c61d9c

  • SHA512

    081caecc524e4aa4f8e0c4441d9fe5864c7e7d12587d12bf8a06e6fd80cea816427f19b7902169997af3037ef433bad0d047072f82a10318d1f11595b589e04c

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Yeis 1.5\Memory.deps.json"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:620
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Yeis 1.5\Memory.deps.json
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2276
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Yeis 1.5\Memory.deps.json"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2940

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    f9d8b969900421c1b590592cb70a2b42

    SHA1

    83e6c29c2447d9bd33e2e0e7d71ddd5f400f395b

    SHA256

    ea55045cd28bf41821f8991a1ce6a8a3505d2671a099517b5da32cfb5bd6b9e2

    SHA512

    d9b13c43039f20ac560b57ebe89163330b5e5ae1b0ae35ec3886e2628223f78c4bfa63937e9355bc7e3b38b158c66d36947980c0bee6400d0617549d5680138b