Analysis
-
max time kernel
57s -
max time network
54s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03-10-2022 02:30
Static task
static1
Behavioral task
behavioral1
Sample
759499f68441d675d7ad070da9621d5699f961c2f16d904d6de37493ef62435f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
759499f68441d675d7ad070da9621d5699f961c2f16d904d6de37493ef62435f.exe
Resource
win10v2004-20220901-en
General
-
Target
759499f68441d675d7ad070da9621d5699f961c2f16d904d6de37493ef62435f.exe
-
Size
241KB
-
MD5
5875354f7101978bb76a4933e8ca3237
-
SHA1
2743f4f1e11dd761bf0b17ab67c5b0c3e19983c0
-
SHA256
759499f68441d675d7ad070da9621d5699f961c2f16d904d6de37493ef62435f
-
SHA512
4b62dc54774450244fdab6f8171b53941d3f02dd27bd4e6f57413de43b195c359bb8b5ac8e2ba2d618935f48392f8f2c98ea5470819e2b3fc335f0f7cd7b68a7
-
SSDEEP
6144:zZXBsWqsE/Ao+mv8Qv0LVmwq4FU0nN876NKxVjStXrr6ke:lXmwRo+mv8QD4+0N46NKxVjU36ke
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 3 2040 WScript.exe 4 2040 WScript.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 5 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\YaHun\Poaaa\Uninstall.exe 759499f68441d675d7ad070da9621d5699f961c2f16d904d6de37493ef62435f.exe File created C:\Program Files (x86)\YaHun\Poaaa\Uninstall.ini 759499f68441d675d7ad070da9621d5699f961c2f16d904d6de37493ef62435f.exe File opened for modification C:\Program Files (x86)\YaHun\Poaaa\alkoid.vbs 759499f68441d675d7ad070da9621d5699f961c2f16d904d6de37493ef62435f.exe File opened for modification C:\Program Files (x86)\YaHun\Poaaa\mirniatom.bat 759499f68441d675d7ad070da9621d5699f961c2f16d904d6de37493ef62435f.exe File opened for modification C:\Program Files (x86)\YaHun\Poaaa\iosdbfvadj.jka 759499f68441d675d7ad070da9621d5699f961c2f16d904d6de37493ef62435f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2004 wrote to memory of 1724 2004 759499f68441d675d7ad070da9621d5699f961c2f16d904d6de37493ef62435f.exe 28 PID 2004 wrote to memory of 1724 2004 759499f68441d675d7ad070da9621d5699f961c2f16d904d6de37493ef62435f.exe 28 PID 2004 wrote to memory of 1724 2004 759499f68441d675d7ad070da9621d5699f961c2f16d904d6de37493ef62435f.exe 28 PID 2004 wrote to memory of 1724 2004 759499f68441d675d7ad070da9621d5699f961c2f16d904d6de37493ef62435f.exe 28 PID 1724 wrote to memory of 2040 1724 cmd.exe 30 PID 1724 wrote to memory of 2040 1724 cmd.exe 30 PID 1724 wrote to memory of 2040 1724 cmd.exe 30 PID 1724 wrote to memory of 2040 1724 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\759499f68441d675d7ad070da9621d5699f961c2f16d904d6de37493ef62435f.exe"C:\Users\Admin\AppData\Local\Temp\759499f68441d675d7ad070da9621d5699f961c2f16d904d6de37493ef62435f.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files (x86)\YaHun\Poaaa\mirniatom.bat" "2⤵
- Drops file in Drivers directory
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\YaHun\Poaaa\alkoid.vbs"3⤵
- Blocklisted process makes network request
PID:2040
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
143B
MD5eff0e115cacfe4f16cdcf49003633164
SHA1d964b65f6bced0f33872e3eb13b5f1e083bd62f9
SHA2562c979821f0f813c61af53c5039bd6e5d5de8e124b99cca54f457a575b3fe1797
SHA512d637c81634b259f164398b361fb949e6ad6070b88b40b03fbf513dd8dd255fae4e0de62cc39f79d9346f4801efcc50e39159bc5c15e23d1fae68e3cd439dfbd5
-
Filesize
27B
MD5213c0742081a9007c9093a01760f9f8c
SHA1df53bb518c732df777b5ce19fc7c02dcb2f9d81b
SHA2569681429a2b00c27fe6cb0453f255024813944a7cd460d18797e3c35e81c53d69
SHA51255182c2e353a0027f585535a537b9c309c3bf57f47da54a16e0c415ed6633b725bf40e40a664b1071575feeb7e589d775983516728ec3e51e87a0a29010c4eb9
-
Filesize
1KB
MD5740f72b3040a7e72aa4dde1f2ff33c8f
SHA1453b6bfde3395ff0b1200243e23858bc9801f6e8
SHA256541933727202d5a8421d9067320beec015a3e0329c299019131574492e77564c
SHA512a96b46be24a7831fa2ca16292e8f6b3880e6f89dad3d0d60ba9ab42e49de5bbbc0a4bb1d14e534e306e16955e9d6d24130e4261553f40488f298d3c85910bf3f