Resubmissions

19/11/2024, 15:13

241119-slznesybpk 3

19/11/2024, 15:10

241119-ska9faxelg 3

19/11/2024, 15:07

241119-shdxjsxeke 3

Analysis

  • max time kernel
    147s
  • max time network
    154s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    19/11/2024, 15:13

General

  • Target

    Yeis 1.5/Yeis.exe

  • Size

    2.2MB

  • MD5

    33cbdfc88d99e1d20de14933660f2449

  • SHA1

    35827624d55eccdd0f9f09b8fe503518090362f9

  • SHA256

    7c1530177dbeafbef2434fcd6360215b4bef416c197ca951f220d5d0f713647f

  • SHA512

    348f1f9d23d5a1d2a82b6fa40780e927a3c98541f2d39cfb2cf39d3c63dbf82cdb3ac9b33a290f06daed9a9d1a298bd8fa66ee85c13c643cb185a4590894725b

  • SSDEEP

    49152:7iU1k14aizzUhMkqMWvlLls5sH3+FDnEHFmkwbvf9b4:OUqVfiK5sHug6fS

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Yeis 1.5\Yeis.exe
    "C:\Users\Admin\AppData\Local\Temp\Yeis 1.5\Yeis.exe"
    1⤵
    • Enumerates system info in registry
    • Suspicious use of AdjustPrivilegeToken
    PID:2176
  • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe
    "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:2436

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat

    Filesize

    10KB

    MD5

    b7443e89f0cb29d51ee6a257750e54d2

    SHA1

    84127eebf275e781d5276af6fc4d09c5a6bfb7b9

    SHA256

    8226877d6ab2e4834aea6bc71bd9865b28d0bd1ec2e8b4c23b8acf0301c56f26

    SHA512

    446cfe25d82f3bbf7badd324cae691ad62e13bd7469e415f47b9141bddf30679219c672937f4f6768796c2936c3b9c557fabbda1fb51c5edbb7c1964bffa17be

  • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat

    Filesize

    10KB

    MD5

    2dfa537d7e7d11c7781652cf2ed49a6f

    SHA1

    f6b77ccf66633ed19c707364e90b7b9be2e517c3

    SHA256

    09efc6acacca137ee3d416e4f8f25820fde2508012a5d1be643044f05e1d294b

    SHA512

    ddeb30d036d0e096393b90b9db04901525a68c08e0de7faebb921461f4b60c56f34fe5e1677f5328f64456a0e1de8b84b2c180ddea97daa29992140099d8672d

  • memory/2176-8-0x0000017B474A0000-0x0000017B47552000-memory.dmp

    Filesize

    712KB

  • memory/2176-9-0x0000017B47420000-0x0000017B47442000-memory.dmp

    Filesize

    136KB

  • memory/2176-4-0x00007FFDD1B50000-0x00007FFDD2612000-memory.dmp

    Filesize

    10.8MB

  • memory/2176-5-0x0000017B42BB0000-0x0000017B42DC4000-memory.dmp

    Filesize

    2.1MB

  • memory/2176-6-0x00007FFDD1B50000-0x00007FFDD2612000-memory.dmp

    Filesize

    10.8MB

  • memory/2176-7-0x00007FFDD1B50000-0x00007FFDD2612000-memory.dmp

    Filesize

    10.8MB

  • memory/2176-0-0x00007FFDD1B53000-0x00007FFDD1B55000-memory.dmp

    Filesize

    8KB

  • memory/2176-3-0x0000017B283E0000-0x0000017B283F2000-memory.dmp

    Filesize

    72KB

  • memory/2176-11-0x0000017B47450000-0x0000017B4748C000-memory.dmp

    Filesize

    240KB

  • memory/2176-13-0x00007FFDD1B50000-0x00007FFDD2612000-memory.dmp

    Filesize

    10.8MB

  • memory/2176-14-0x00007FFDD1B53000-0x00007FFDD1B55000-memory.dmp

    Filesize

    8KB

  • memory/2176-15-0x00007FFDD1B50000-0x00007FFDD2612000-memory.dmp

    Filesize

    10.8MB

  • memory/2176-2-0x0000017B42580000-0x0000017B42790000-memory.dmp

    Filesize

    2.1MB

  • memory/2176-1-0x0000017B27D40000-0x0000017B27F78000-memory.dmp

    Filesize

    2.2MB