Analysis
-
max time kernel
72s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 13:04
Behavioral task
behavioral1
Sample
yerex.exe
Resource
win7-20241010-en
General
-
Target
yerex.exe
-
Size
25.2MB
-
MD5
0bbb4624436007933ff6dc22b1820f18
-
SHA1
b7733a8d52b60a0909ecc45237a3679354220908
-
SHA256
98cb3e01c7990a6222f387adda3a1e3c4316d7b68f3da250dc6754ee0086c6cc
-
SHA512
6a7161030b49374c5c46f37ea12f82d2500ca76f10e9abeeb2a55421385d075e771c3ff4a74ed35f01b6d0c651f5e51dcf63fe0db9a40196225db335e3e07cd3
-
SSDEEP
786432:xhnEKv3rAKZaCdT0kjZeVBy7DbWF1snuI/kaJ4dHA:vnNvrXTmFKn//kax
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
yerex.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ yerex.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
yerex.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion yerex.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion yerex.exe -
Executes dropped EXE 1 IoCs
Processes:
main.exepid process 2188 main.exe -
Loads dropped DLL 2 IoCs
Processes:
yerex.exemain.exepid process 1740 yerex.exe 2188 main.exe -
Processes:
resource yara_rule behavioral1/memory/1740-0-0x0000000140000000-0x0000000141F87000-memory.dmp themida behavioral1/memory/1740-2-0x0000000140000000-0x0000000141F87000-memory.dmp themida behavioral1/memory/1740-3-0x0000000140000000-0x0000000141F87000-memory.dmp themida behavioral1/memory/1740-4-0x0000000140000000-0x0000000141F87000-memory.dmp themida behavioral1/memory/1740-5-0x0000000140000000-0x0000000141F87000-memory.dmp themida behavioral1/memory/1740-24-0x0000000140000000-0x0000000141F87000-memory.dmp themida behavioral1/memory/1740-1004-0x0000000140000000-0x0000000141F87000-memory.dmp themida behavioral1/memory/1740-1996-0x0000000140000000-0x0000000141F87000-memory.dmp themida -
Processes:
yerex.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA yerex.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
yerex.exepid process 1740 yerex.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
yerex.exedescription pid process target process PID 1740 wrote to memory of 2188 1740 yerex.exe main.exe PID 1740 wrote to memory of 2188 1740 yerex.exe main.exe PID 1740 wrote to memory of 2188 1740 yerex.exe main.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\yerex.exe"C:\Users\Admin\AppData\Local\Temp\yerex.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\onefile_1740_133768407461742000\main.exeC:\Users\Admin\AppData\Local\Temp\yerex.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2188
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.6MB
MD5d521654d889666a0bc753320f071ef60
SHA15fd9b90c5d0527e53c199f94bad540c1e0985db6
SHA25621700f0bad5769a1b61ea408dc0a140ffd0a356a774c6eb0cc70e574b929d2e2
SHA5127a726835423a36de80fb29ef65dfe7150bd1567cac6f3569e24d9fe091496c807556d0150456429a3d1a6fd2ed0b8ae3128ea3b8674c97f42ce7c897719d2cd3
-
Filesize
30.4MB
MD52173bde8e47c7babfafdccdccad66fa2
SHA146733948c63f36de3eb171abe82d3c472a63bdcd
SHA25644d04386761298d8890a11562e1bc7e93e2d40ab9b5dc838f9b79d289ae8b58a
SHA51238134e6bbe888bedb2874f13e21b9a7b1ca4bc3e7c10f9297deb7d24f9a758c7d59b9a6a51db0bf48f6f0f9843cc0e8cec750c753e4e0e1c0f52309f6dd4ce11