Analysis

  • max time kernel
    150s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    12-10-2022 14:04

General

  • Target

    50cce3616f588cb8eec4b98754ea33523ee1e8242ab607b188cbd45f0383dcff.exe

  • Size

    196KB

  • MD5

    7bb51680e2c69548ecdef6e325871010

  • SHA1

    aecd5d553177010b6a31411eebef0e9f3a4b04d3

  • SHA256

    50cce3616f588cb8eec4b98754ea33523ee1e8242ab607b188cbd45f0383dcff

  • SHA512

    86dd52623d4ef424cd58de40a34c41b14ac895f0731822759be615a2fde91b76be1f0c6f183bb731027f883cbcd6b043af73828940552f3392f3cb3b7aca4837

  • SSDEEP

    6144:VuvuUPH3bX2a23NYcJQ8TfxZ85WJ007G9tSBN70ZfA:8vuUPH3bX2a23NYcJQ8TfxZ9J0rtSzQO

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 54 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\50cce3616f588cb8eec4b98754ea33523ee1e8242ab607b188cbd45f0383dcff.exe
    "C:\Users\Admin\AppData\Local\Temp\50cce3616f588cb8eec4b98754ea33523ee1e8242ab607b188cbd45f0383dcff.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1492
    • C:\Users\Admin\yaiihi.exe
      "C:\Users\Admin\yaiihi.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:276

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\yaiihi.exe

    Filesize

    196KB

    MD5

    5cb60a28c0bd6a330e8f93100af8870c

    SHA1

    335ece976937768a1756baaacb6f4e76805b6da7

    SHA256

    10e26bc773c4de3b08f33dc7641b3a8bdf98a9a8cc163a9498856a868e61580b

    SHA512

    9edff5f8b0313a21fb0dccc969081d485f8ce90ea3b1c6dbf905d0e944b345cb2a291fe095be424e434f52be5984cf82b5095f421d556191b7137f83367037c5

  • C:\Users\Admin\yaiihi.exe

    Filesize

    196KB

    MD5

    5cb60a28c0bd6a330e8f93100af8870c

    SHA1

    335ece976937768a1756baaacb6f4e76805b6da7

    SHA256

    10e26bc773c4de3b08f33dc7641b3a8bdf98a9a8cc163a9498856a868e61580b

    SHA512

    9edff5f8b0313a21fb0dccc969081d485f8ce90ea3b1c6dbf905d0e944b345cb2a291fe095be424e434f52be5984cf82b5095f421d556191b7137f83367037c5

  • \Users\Admin\yaiihi.exe

    Filesize

    196KB

    MD5

    5cb60a28c0bd6a330e8f93100af8870c

    SHA1

    335ece976937768a1756baaacb6f4e76805b6da7

    SHA256

    10e26bc773c4de3b08f33dc7641b3a8bdf98a9a8cc163a9498856a868e61580b

    SHA512

    9edff5f8b0313a21fb0dccc969081d485f8ce90ea3b1c6dbf905d0e944b345cb2a291fe095be424e434f52be5984cf82b5095f421d556191b7137f83367037c5

  • \Users\Admin\yaiihi.exe

    Filesize

    196KB

    MD5

    5cb60a28c0bd6a330e8f93100af8870c

    SHA1

    335ece976937768a1756baaacb6f4e76805b6da7

    SHA256

    10e26bc773c4de3b08f33dc7641b3a8bdf98a9a8cc163a9498856a868e61580b

    SHA512

    9edff5f8b0313a21fb0dccc969081d485f8ce90ea3b1c6dbf905d0e944b345cb2a291fe095be424e434f52be5984cf82b5095f421d556191b7137f83367037c5

  • memory/1492-56-0x0000000076BA1000-0x0000000076BA3000-memory.dmp

    Filesize

    8KB