File name:

SetupYabe_v1.3.1.exe

Full analysis: https://app.any.run/tasks/8dc07be5-0fea-463d-9f5c-f46abd65851d
Verdict: Malicious activity
Analysis date: October 18, 2023, 10:24:37
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

594C8516E75EB1AFDF0FCF50C6F0CA12

SHA1:

EEC82306958AE309C028AB24D09B0A82EE4D1843

SHA256:

EE18E81AB4AD6C05E86135FCA8F5DBA3CE78883A85A6DC4F3408673B0295FDE6

SSDEEP:

98304:FbUHt7LANowzTRB2kc64CCX0ngOj9U9NNDH3EJommwduYMkkff0ZLqXjOA7ftjo5:UWfgmN

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • SetupYabe_v1.3.1.exe (PID: 3828)
      • SetupYabe_v1.3.1.exe (PID: 396)
      • SetupYabe_v1.3.1.tmp (PID: 2288)
    • Application was dropped or rewritten from another process

      • Yabe.exe (PID: 2088)
    • Loads dropped or rewritten executable

      • Yabe.exe (PID: 2088)
  • SUSPICIOUS

    • Reads the Windows owner or organization settings

      • SetupYabe_v1.3.1.tmp (PID: 2288)
    • Reads the Internet Settings

      • Yabe.exe (PID: 2088)
  • INFO

    • Checks supported languages

      • SetupYabe_v1.3.1.exe (PID: 3828)
      • SetupYabe_v1.3.1.tmp (PID: 3900)
      • SetupYabe_v1.3.1.exe (PID: 396)
      • SetupYabe_v1.3.1.tmp (PID: 2288)
      • Yabe.exe (PID: 2088)
    • Reads the computer name

      • SetupYabe_v1.3.1.tmp (PID: 3900)
      • SetupYabe_v1.3.1.tmp (PID: 2288)
      • Yabe.exe (PID: 2088)
    • Create files in a temporary directory

      • SetupYabe_v1.3.1.exe (PID: 3828)
      • SetupYabe_v1.3.1.exe (PID: 396)
    • Application was dropped or rewritten from another process

      • SetupYabe_v1.3.1.tmp (PID: 2288)
      • SetupYabe_v1.3.1.tmp (PID: 3900)
    • Creates files in the program directory

      • SetupYabe_v1.3.1.tmp (PID: 2288)
    • Reads the machine GUID from the registry

      • Yabe.exe (PID: 2088)
    • Creates files or folders in the user directory

      • Yabe.exe (PID: 2088)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Inno Setup installer (51.8)
.exe | InstallShield setup (20.3)
.exe | Win32 EXE PECompact compressed (generic) (19.6)
.dll | Win32 Dynamic Link Library (generic) (3.1)
.exe | Win32 Executable (generic) (2.1)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2019:10:12 13:15:57+02:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi
PEType: PE32
LinkerVersion: 2.25
CodeSize: 682496
InitializedDataSize: 37888
UninitializedDataSize: -
EntryPoint: 0xa7ed0
OSVersion: 6
ImageVersion: 6
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 0.0.0.0
ProductVersionNumber: 0.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: This installation was built with Inno Setup.
CompanyName: Yabe Authors
FileDescription: Yabe Setup
FileVersion:
LegalCopyright:
OriginalFileName:
ProductName: Yabe
ProductVersion: 1.3.1
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
44
Monitored processes
5
Malicious processes
5
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start start drop and start setupyabe_v1.3.1.exe no specs setupyabe_v1.3.1.tmp no specs setupyabe_v1.3.1.exe setupyabe_v1.3.1.tmp no specs yabe.exe

Process information

PID
CMD
Path
Indicators
Parent process
396"C:\Users\admin\AppData\Local\Temp\SetupYabe_v1.3.1.exe" /SPAWNWND=$A01D0 /NOTIFYWND=$6035E C:\Users\admin\AppData\Local\Temp\SetupYabe_v1.3.1.exe
SetupYabe_v1.3.1.tmp
User:
admin
Company:
Yabe Authors
Integrity Level:
HIGH
Description:
Yabe Setup
Exit code:
0
Version:
Modules
Images
c:\windows\system32\ntdll.dll
c:\users\admin\appdata\local\temp\setupyabe_v1.3.1.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.24483_none_2b200f664577e14b\comctl32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2088"C:\Program Files\Yabe\Yabe.exe"C:\Program Files\Yabe\Yabe.exe
SetupYabe_v1.3.1.tmp
User:
admin
Integrity Level:
MEDIUM
Description:
Yabe
Exit code:
0
Version:
1.3.1
Modules
Images
c:\program files\yabe\yabe.exe
c:\windows\system32\mscoree.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
2288"C:\Users\admin\AppData\Local\Temp\is-10442.tmp\SetupYabe_v1.3.1.tmp" /SL5="$1301AA,1798376,721408,C:\Users\admin\AppData\Local\Temp\SetupYabe_v1.3.1.exe" /SPAWNWND=$A01D0 /NOTIFYWND=$6035E C:\Users\admin\AppData\Local\Temp\is-10442.tmp\SetupYabe_v1.3.1.tmpSetupYabe_v1.3.1.exe
User:
admin
Integrity Level:
HIGH
Description:
Setup/Uninstall
Exit code:
0
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-10442.tmp\setupyabe_v1.3.1.tmp
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\mpr.dll
c:\windows\system32\comdlg32.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
3828"C:\Users\admin\AppData\Local\Temp\SetupYabe_v1.3.1.exe" C:\Users\admin\AppData\Local\Temp\SetupYabe_v1.3.1.exeexplorer.exe
User:
admin
Company:
Yabe Authors
Integrity Level:
MEDIUM
Description:
Yabe Setup
Exit code:
0
Version:
Modules
Images
c:\users\admin\appdata\local\temp\setupyabe_v1.3.1.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.24483_none_2b200f664577e14b\comctl32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3900"C:\Users\admin\AppData\Local\Temp\is-CLK1F.tmp\SetupYabe_v1.3.1.tmp" /SL5="$6035E,1798376,721408,C:\Users\admin\AppData\Local\Temp\SetupYabe_v1.3.1.exe" C:\Users\admin\AppData\Local\Temp\is-CLK1F.tmp\SetupYabe_v1.3.1.tmpSetupYabe_v1.3.1.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Setup/Uninstall
Exit code:
0
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-clk1f.tmp\setupyabe_v1.3.1.tmp
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\mpr.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
Total events
1 311
Read events
1 297
Write events
8
Delete events
6

Modification events

(PID) Process:(2288) SetupYabe_v1.3.1.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:delete valueName:RegFilesHash
Value:
9DE312A77230FDA06020670E5ECD38EF079CF6AA3BB81175378284B7AD521F3E
(PID) Process:(2288) SetupYabe_v1.3.1.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:delete valueName:RegFiles0000
Value:
C:\Program Files\Yabe\Yabe.exe
(PID) Process:(2288) SetupYabe_v1.3.1.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:delete valueName:Sequence
Value:
1
(PID) Process:(2288) SetupYabe_v1.3.1.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:delete valueName:SessionHash
Value:
BAE78E95761BFC24BFAA255B53EB8D001B272E88C49F6364C5428994C7FFE4F1
(PID) Process:(2288) SetupYabe_v1.3.1.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:delete valueName:Owner
Value:
F0080000867A6253AD01DA01
(PID) Process:(2288) SetupYabe_v1.3.1.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:delete keyName:(default)
Value:
(PID) Process:(2088) Yabe.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(2088) Yabe.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(2088) Yabe.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(2088) Yabe.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
Executable files
22
Suspicious files
16
Text files
30
Unknown types
0

Dropped files

PID
Process
Filename
Type
2288SetupYabe_v1.3.1.tmpC:\Program Files\Yabe\is-4A5TV.tmpexecutable
MD5:1518B6920374597F25DB89C77FB4B966
SHA256:29D8D55F3DBEA7EF53C37871B7611E0BB7410933AE4E0AF8C69CD56217AA29A6
2288SetupYabe_v1.3.1.tmpC:\Program Files\Yabe\unins000.exeexecutable
MD5:1518B6920374597F25DB89C77FB4B966
SHA256:29D8D55F3DBEA7EF53C37871B7611E0BB7410933AE4E0AF8C69CD56217AA29A6
2288SetupYabe_v1.3.1.tmpC:\Program Files\Yabe\is-V7U95.tmpexecutable
MD5:AFBE731F45838D9DD7E3B5CD99E7AC01
SHA256:8022B149D07F9C7D34387619C76967D496C0BD54C488223D6B127CEF57F625C8
2288SetupYabe_v1.3.1.tmpC:\Program Files\Yabe\CheckStatusFlags.dllexecutable
MD5:E27119029BD903EBC029D9022F09C92F
SHA256:60414AE77C965B8358AEB5E298272C24B38535316AEFC7C1309B027F187785EA
2288SetupYabe_v1.3.1.tmpC:\Program Files\Yabe\is-98R4Q.tmptext
MD5:E516052D8FDB16D60269D25097A11D9B
SHA256:5CAC3AE32E3349A29A3999974367EBA310E7C3BAEDDB3B4B52E7DDB851754077
2288SetupYabe_v1.3.1.tmpC:\Program Files\Yabe\Yabe.exeexecutable
MD5:520C85A80E40F37AD1FFF402360BDE45
SHA256:6682F787DB12C75B78D9478450A4E744965D001BDD374EE39C2C53BC8B50B41F
2288SetupYabe_v1.3.1.tmpC:\Program Files\Yabe\CheckReliability.dllexecutable
MD5:AFBE731F45838D9DD7E3B5CD99E7AC01
SHA256:8022B149D07F9C7D34387619C76967D496C0BD54C488223D6B127CEF57F625C8
2288SetupYabe_v1.3.1.tmpC:\Program Files\Yabe\is-3MN15.tmpexecutable
MD5:E27119029BD903EBC029D9022F09C92F
SHA256:60414AE77C965B8358AEB5E298272C24B38535316AEFC7C1309B027F187785EA
2288SetupYabe_v1.3.1.tmpC:\Program Files\Yabe\is-4BJ6A.tmpexecutable
MD5:7DD63BA0ECEA2F8627800C9D435A2D7F
SHA256:BF008BF05DC6CE731C950DBD544C08AAE65BEFD6917F8C82A1FA28E1B821FAB7
2288SetupYabe_v1.3.1.tmpC:\Program Files\Yabe\is-405FF.tmpexecutable
MD5:66CDCDD23CAEA81BEDB146FF8CF93FEE
SHA256:3E7CDF1382CBC8CC54F430EDF8CCCC2B1638E12AB7DC635B751BFBFE8C510A3E
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
2
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted

DNS requests

No data

Threats

No threats detected
Process
Message
Yabe.exe
Loaded plugin "CheckReliability".
Yabe.exe
Loaded plugin " CheckStatusFlags".
Yabe.exe
Loaded plugin " ListOutOfService".
Yabe.exe
Loaded plugin " GlobalCommander".