Analysis

  • max time kernel
    72s
  • max time network
    20s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2024 13:04

General

  • Target

    yerex.exe

  • Size

    25.2MB

  • MD5

    0bbb4624436007933ff6dc22b1820f18

  • SHA1

    b7733a8d52b60a0909ecc45237a3679354220908

  • SHA256

    98cb3e01c7990a6222f387adda3a1e3c4316d7b68f3da250dc6754ee0086c6cc

  • SHA512

    6a7161030b49374c5c46f37ea12f82d2500ca76f10e9abeeb2a55421385d075e771c3ff4a74ed35f01b6d0c651f5e51dcf63fe0db9a40196225db335e3e07cd3

  • SSDEEP

    786432:xhnEKv3rAKZaCdT0kjZeVBy7DbWF1snuI/kaJ4dHA:vnNvrXTmFKn//kax

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Themida packer 8 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\yerex.exe
    "C:\Users\Admin\AppData\Local\Temp\yerex.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Loads dropped DLL
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of WriteProcessMemory
    PID:1740
    • C:\Users\Admin\AppData\Local\Temp\onefile_1740_133768407461742000\main.exe
      C:\Users\Admin\AppData\Local\Temp\yerex.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:2188

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\onefile_1740_133768407461742000\python312.dll

    Filesize

    6.6MB

    MD5

    d521654d889666a0bc753320f071ef60

    SHA1

    5fd9b90c5d0527e53c199f94bad540c1e0985db6

    SHA256

    21700f0bad5769a1b61ea408dc0a140ffd0a356a774c6eb0cc70e574b929d2e2

    SHA512

    7a726835423a36de80fb29ef65dfe7150bd1567cac6f3569e24d9fe091496c807556d0150456429a3d1a6fd2ed0b8ae3128ea3b8674c97f42ce7c897719d2cd3

  • \Users\Admin\AppData\Local\Temp\onefile_1740_133768407461742000\main.exe

    Filesize

    30.4MB

    MD5

    2173bde8e47c7babfafdccdccad66fa2

    SHA1

    46733948c63f36de3eb171abe82d3c472a63bdcd

    SHA256

    44d04386761298d8890a11562e1bc7e93e2d40ab9b5dc838f9b79d289ae8b58a

    SHA512

    38134e6bbe888bedb2874f13e21b9a7b1ca4bc3e7c10f9297deb7d24f9a758c7d59b9a6a51db0bf48f6f0f9843cc0e8cec750c753e4e0e1c0f52309f6dd4ce11

  • memory/1740-0-0x0000000140000000-0x0000000141F87000-memory.dmp

    Filesize

    31.5MB

  • memory/1740-1-0x0000000077C30000-0x0000000077C32000-memory.dmp

    Filesize

    8KB

  • memory/1740-2-0x0000000140000000-0x0000000141F87000-memory.dmp

    Filesize

    31.5MB

  • memory/1740-3-0x0000000140000000-0x0000000141F87000-memory.dmp

    Filesize

    31.5MB

  • memory/1740-4-0x0000000140000000-0x0000000141F87000-memory.dmp

    Filesize

    31.5MB

  • memory/1740-5-0x0000000140000000-0x0000000141F87000-memory.dmp

    Filesize

    31.5MB

  • memory/1740-24-0x0000000140000000-0x0000000141F87000-memory.dmp

    Filesize

    31.5MB

  • memory/1740-1004-0x0000000140000000-0x0000000141F87000-memory.dmp

    Filesize

    31.5MB

  • memory/1740-1996-0x0000000140000000-0x0000000141F87000-memory.dmp

    Filesize

    31.5MB