Threat Intelligence · Malware Analysis Division
Report · IR-2026-0324-002

Malware Analysis
ERMAKOB.exe & Twoofthem.exe

Behavioral analysis of a dropper-style executable that deploys mpv media player to display a distraction video while injecting into system processes and evading defenses via delayed execution.

Subject: ERMAKOB.exe / Twoofthem.exe (46.2 MB) — unsigned PE executables, functionally identical (differ only in embedded video payload).
Source: User request on YonSeSecurity for detailed security testing.
Method: Dynamic behavioral analysis in isolated sandbox (Windows 10 + Windows 11, dual-run).
Result: Suspicious — dropper with defense evasion and process injection.
Classification
CONFIDENTIAL
Date
2026-03-24
Severity
HIGH
Verdict
SUSPICIOUS
SHA256
44b40e1fd7b5a8e4f4612ce8f5cb7612b3ac015872d236a76c49de68a78bf4e4
Analysis
Recorded Future Sandbox
7.0/10

Threat Score: High

Dropper executable that drops and executes multiple binaries, injects into system processes, and uses timeout delays to evade sandbox analysis.

defense evasionprocess injectiondiscoverydropperunsigned PE
Quick Brief

TL;DR — Executive Brief

What is it

ERMAKOB.exe and Twoofthem.exe are identical dropper executables (only the embedded video file differs). They are unsigned 46.2 MB PE binaries that masquerade as harmless programs.

Upon execution, the binary drops a bundle of files into %TEMP%\Barebones\ — including a portable mpv media player, a configuration file, a video file (virus.mp4), and a secondary executable (noadmincrash.exe). It then launches the video as a distraction while performing suspicious system activities in the background.

What it does (plain language)

1. Drops and executes files. Extracts a batch script (bat.bat), mpv player, video file, configuration, fonts config, and a secondary EXE (noadmincrash.exe) into a temp directory. Uses cmd.exe /c to execute the batch script orchestrating the payload.

2. Plays a distraction video. Launches mpv.exe virus.mp4 — a video plays on screen, drawing the user's attention while background processes execute. This is a social engineering technique to mask suspicious activity.

3. Delays execution (defense evasion). Runs timeout /t 40 /nobreak — a 40-second delay that forces sandbox environments to wait, potentially exceeding analysis time windows. Tagged as defense_evasion by the sandbox.

4. Injects into system processes. Uses WriteProcessMemory to inject code: ERMAKOB.exe writes to cmd.exe, cmd.exe then writes to mpv.exe and timeout.exe. This cross-process injection chain is not behavior of legitimate software.

5. Uses suspicious API calls. Calls FindShellTrayWindow (system tray enumeration) and SetWindowsHookEx (potential input interception/keylogging) from the dropped mpv.exe — functions not expected from a simple media player in this context.

6. Checks geolocation. Queries the registry key Control Panel\International\Geo\Nation to determine the victim's country — a technique commonly used by malware to exclude certain regions from execution.

Why it's suspicious

Unsigned PE with large file size. A 46 MB executable with no digital signature that drops executables into temp directories is a strong indicator of a packed dropper or bundled malware.

Process injection chain. Legitimate applications do not use WriteProcessMemory to inject code into cmd.exe and child processes. This is a classic trojan behavior pattern.

Defense evasion via timeout. The 40-second timeout delay is specifically designed to outlast short-lived sandbox analysis windows.

Geo-checking. Querying the victim's country from the registry is a hallmark of targeted malware campaigns, particularly those of CIS-origin threat actors.

What to do

If you ran it: Run a full antivirus scan. Check %TEMP%\Barebones\ for dropped files and delete them. Monitor for unusual process activity. Consider changing passwords if keylogging is suspected.

If you didn't run it: Delete the file. Do not execute unsigned EXEs from untrusted sources.

YonSeSecurity Threat Score: 7.0 / 10 — HIGH. Dropper with process injection and defense evasion capabilities.

Section 01

Executive Summary

An unsigned 46.2 MB PE executable named ERMAKOB.exe (also distributed as Twoofthem.exe — functionally identical, differing only in the embedded video payload) was submitted for dynamic behavioral analysis at the request of a YonSeSecurity user.

The sample was detonated in two sandbox environments (Windows 10 v2004 and Windows 11) with consistent results across both runs. The executable operates as a dropper: it extracts a bundle of files into %AppData%\Local\Temp\Barebones\, launches a distraction video via an embedded mpv media player, and performs process injection via WriteProcessMemory across a cmd.exe execution chain.

The malware employs a 40-second timeout delay as a defense evasion technique and performs geolocation checks via registry queries. The secondary dropped binary noadmincrash.exe suggests the payload may have additional capabilities that were not fully observed during the analysis window.

Classification: Trojan.Dropper with Defense Evasion and Process Injection

Section 02

Sample Identification

FieldValue
FilenameERMAKOB.exe / Twoofthem.exe
Size46.2 MB
SHA25644b40e1fd7b5a8e4f4612ce8f5cb7612b3ac015872d236a76c49de68a78bf4e4
Analysis ID260324-xl893se18j
Platform (run 1)Windows 10 v2004 (build 20260130-en)
Platform (run 2)Windows 11 (build 20260130-en)
Runtime (kernel)13s (Win10) / 15s (Win11)
Runtime (network)57s (Win10) / N/A (Win11)
Submitted2026-03-24 18:57
SignatureUnsigned PE
Tagsdefense_evasion
Section 03

Kill Chain

Phase 1 — Delivery

User receives ERMAKOB.exe (or Twoofthem.exe) — a 46.2 MB unsigned executable. The large file size helps avoid suspicion and may bypass some file-size-based scanning limits.

Phase 2 — Dropping

Upon execution, the binary extracts files into C:\Users\Admin\AppData\Local\Temp\Barebones\: bat.bat (orchestration script), mpv.exe (media player), mpv.conf (configuration), fonts.conf, virus.mp4 (distraction video), and noadmincrash.exe (secondary payload).

Phase 3 — Execution

Launches cmd.exe /c bat.bat which orchestrates: (1) mpv.exe virus.mp4 — plays distraction video, (2) timeout /t 40 /nobreak — 40-second delay for evasion, (3) noadmincrash.exe — secondary payload execution.

Phase 4 — Process Injection

ERMAKOB.exe injects code into cmd.exe via WriteProcessMemory. The injected cmd.exe in turn writes to mpv.exe and timeout.exe memory. This multi-stage injection chain hides malicious behavior inside legitimate system processes.

Phase 5 — Reconnaissance

Checks victim's geolocation via registry (Geo\Nation), enumerates physical storage devices, and uses FindShellTrayWindow to enumerate the system tray — standard victim fingerprinting behavior.

Section 04

Process Tree

Color legend: malicious, suspicious, legitimate, system.

C:\Users\Admin\AppData\Local\Temp\ERMAKOB.exe ├── C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Barebones\bat.bat" │ ├── C:\Users\Admin\AppData\Local\Temp\Barebones\mpv.exe virus.mp4 │ ├── C:\Windows\system32\timeout.exe /t 40 /nobreak │ └── C:\Users\Admin\AppData\Local\Temp\Barebones\noadmincrash.exe │ └── C:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc (Win11 only)
Section 05

Defense Evasion

5.1 Execution Delay via timeout.exe High

Sandbox Evasion Technique

The batch script runs timeout /t 40 /nobreak before launching the secondary payload noadmincrash.exe. This 40-second delay is a well-known technique to outlast sandbox analysis windows that typically run for 30-60 seconds.

The /nobreak flag prevents user interruption of the delay — indicating deliberate intent to enforce the full wait period.

5.2 Unsigned PE Binary Medium

The executable has no digital signature. While this alone is not malicious, it is a strong indicator when combined with dropper behavior, process injection, and defense evasion. Unsigned PEs bypass Authenticode trust verification entirely.

5.3 Video Distraction Medium

Launching a video via mpv player serves as a social engineering distraction — the user sees a video playing and assumes the executable did nothing harmful. Meanwhile, background processes perform the actual malicious activity.

Section 06

Process Injection

WriteProcessMemory calls across process boundaries. Consistent across both behavioral runs.

Behavioral Run 1 (Windows 10)

Source (PID)Target (PID)Source ProcessTarget Process
16684312ERMAKOB.execmd.exe
43124480cmd.exeBarebones\mpv.exe
43122872cmd.exetimeout.exe

Behavioral Run 2 (Windows 11)

Source (PID)Target (PID)Source ProcessTarget Process
44403248ERMAKOB.execmd.exe
32482948cmd.exeBarebones\mpv.exe
3248856cmd.exetimeout.exe
SetWindowsHookEx — Potential Input Capture

SetWindowsHookEx called by mpv.exe from the Barebones directory. While mpv can legitimately use window hooks for input handling, in the context of a dropped executable with process injection, this raises concern about potential keylogging or input interception.

FindShellTrayWindow — System Tray Enumeration

Both ERMAKOB.exe and mpv.exe call FindShellTrayWindow — used to locate the Windows taskbar/system tray. Malware uses this to enumerate running applications, detect security tools, or inject into Explorer.exe.

Section 07

Discovery & Reconnaissance

TechniqueDetailSignificance
Geo\Nation (T1614)REGISTRY\USER\S-1-5-21-...\Control Panel\International\Geo\NationCountry-based targeting
Storage Enum (T1120)Enumerates physical storage devicesMap drives & volumes
Registry Query (T1012)Queries registry for system infoVictim fingerprinting
System Info (T1082)System Information DiscoveryEnvironment profiling
Shell Tray (T1010)FindShellTrayWindow APIRunning app enumeration
Section 08

Dropped File Artifacts

All files dropped into C:\Users\Admin\AppData\Local\Temp\Barebones\

FileTypePurpose
bat.batBatch scriptOrchestration — launches mpv, timeout, noadmincrash
mpv.exePE executableMedia player (used for distraction video)
mpv\mpv.confConfigmpv player configuration
mpv\fonts.confConfigFont rendering configuration
virus.mp4VideoDistraction video payload
noadmincrash.exePE executableSecondary payload (executed after timeout)

File Hashes

bat.bat
SHA256: 96036851a01706be80cf1b4f565f8b9953a8f25b330cff2d00ac0c7e9c627462
MD5: d9e40220e62c019c6360d82013c81990
mpv\mpv.conf
SHA256: 337bd86ddc95a1a30c419f70ea1690c18dedbbcb890f168a051de2689d274213
MD5: 13e7d0c538d2278ec77129692538feb4
virus.mp4
SHA256: f5aafe1b8787d24dcda4f24b7faf0874fba1ff800ee33d64ddef6e646ce1351a
MD5: 67a5d6a9385342862fa08907f443dec5
mpv\fonts.conf
SHA256: f141c1b89b172d22f213531646c21e288f0ebf3ec4684698896e1b33c626756
MD5: 90dd3420e988052bdd3fa5ad0c6b3dbf
noadmincrash.exe
SHA256: b634e7b5c1578ac403f644a8d216d32a414e15b0320b95db9f3ba358ef01b9d6
MD5: 827d088ccbfbb934e79b7bd0a14d40b5
ERMAKOB.exe (primary sample)
SHA256: 44b40e1fd7b5a8e4f4612ce8f5cb7612b3ac015872d236a76c49de68a78bf4e4
Section 09

MITRE ATT&CK v16

Execution
Windows Command Shell
T1059.003
Execution
User Execution: Malicious File
T1204.002
Defense Evasion
Process Injection
T1055
Defense Evasion
Virtualization/Sandbox Evasion: Time Based
T1497.003
Defense Evasion
Masquerading
T1036
Discovery
Query Registry
T1012
Discovery
System Information Discovery
T1082
Discovery
System Location Discovery
T1614
Discovery
Peripheral Device Discovery
T1120
Discovery
Application Window Discovery
T1010
Collection
Input Capture (potential)
T1056.001
Command and Control
Ingress Tool Transfer
T1105
Section 10

Risk Assessment

Process Injection8/10
Defense Evasion7/10
Dropper Capability7/10
Discovery / Recon6/10
Keylogging Risk5/10
Persistence3/10
Network C22/10

COMPOSITE THREAT SCORE: 7.0 / 10 — HIGH SEVERITY

Section 11

Indicators of Compromise

File Hashes

ERMAKOB.exe / Twoofthem.exe
SHA256: 44b40e1fd7b5a8e4f4612ce8f5cb7612b3ac015872d236a76c49de68a78bf4e4
noadmincrash.exe (secondary payload)
SHA256: b634e7b5c1578ac403f644a8d216d32a414e15b0320b95db9f3ba358ef01b9d6
bat.bat (orchestration script)
SHA256: 96036851a01706be80cf1b4f565f8b9953a8f25b330cff2d00ac0c7e9c627462
virus.mp4 (distraction)
SHA256: f5aafe1b8787d24dcda4f24b7faf0874fba1ff800ee33d64ddef6e646ce1351a

File Paths

Primary executable
C:\Users\Admin\AppData\Local\Temp\ERMAKOB.exe
Dropped directory
C:\Users\Admin\AppData\Local\Temp\Barebones\
Batch script
C:\Users\Admin\AppData\Local\Temp\Barebones\bat.bat
Secondary payload
C:\Users\Admin\AppData\Local\Temp\Barebones\noadmincrash.exe

Registry Keys

Geolocation check
HKCU\Control Panel\International\Geo\Nation
Full SID path queried
REGISTRY\USER\S-1-5-21-2023547815-1162023398-1465618254-1000\Control Panel\International\Geo\Nation
Section 12

Recommendations

Immediate

Delete the executable and all contents of %TEMP%\Barebones\
Full AV scan with up-to-date signatures
Check for any persistence entries created by noadmincrash.exe
Monitor process activity for lingering injected processes

Short-term

Block SHA256 at endpoint protection and gateway level
Change passwords if SetWindowsHookEx keylogging is suspected
Review event logs for WriteProcessMemory and dropped executables

Detection Signatures

Alert on unsigned PE creating Barebones\ directory in %TEMP%
Alert on timeout /t 40 /nobreak execution from temp directories
Alert on WriteProcessMemory from unsigned executables to cmd.exe
Monitor SHA256: 44b40e1fd7b5a8e4...a78bf4e4
Section 13

Conclusion

Finding 1 — Confirmed Dropper

ERMAKOB.exe / Twoofthem.exe is a trojan dropper that extracts and executes multiple payloads from a temp directory. The use of a batch orchestration script, video distraction, and multi-stage execution is consistent with malware behavior.

Finding 2 — Process Injection Confirmed

WriteProcessMemory calls between ERMAKOB.exe → cmd.exe → mpv.exe/timeout.exe were observed consistently across both sandbox runs (Windows 10 and 11). No legitimate application uses this injection pattern.

Finding 3 — Defense Evasion

The 40-second timeout delay and video distraction are deliberate evasion techniques. The timeout may cause short-lived sandbox runs to miss the full execution of noadmincrash.exe which launches after the delay.

Finding 4 — Secondary Payload Unclear

The full capabilities of noadmincrash.exe were not fully observed within the analysis window. It is launched after a 40-second delay and may contain additional malicious functionality (persistence, data exfiltration, or C2 communication) that was not triggered during analysis.

Finding 5 — No Network C2 Observed

No outbound network connections or C2 traffic was detected. This may indicate the sample is a first-stage dropper that prepares the environment for a network-dependent second stage, or the C2 component was not triggered within the analysis timeframe.