Analysis

  • max time kernel
    162s
  • max time network
    131s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/10/2022, 22:14

General

  • Target

    d4a05a89d1f3879c67c46f70a0ee70b2bc3a3c37cf4c3d2fbcc9fca3ea61aeeb.exe

  • Size

    212KB

  • MD5

    5b3a2a62f453c4f8ff39a7621524f864

  • SHA1

    637fe1107a5749cf005b5ec28319def5e9586f8d

  • SHA256

    d4a05a89d1f3879c67c46f70a0ee70b2bc3a3c37cf4c3d2fbcc9fca3ea61aeeb

  • SHA512

    a3460499d0db35793fbda9ecdb89056c4543d4167d938d70fcf22f027fa5887f4a4cafd0919aceb4843e6322dd57ac42ce14a7b50e6d1076d3c2f19776abe780

  • SSDEEP

    6144:UOFwzWQuO8J0+6ChTw3b1affiRnH78MDxGaoBKnvmb7/D26dhHmpfXJNa2V:1FwP8J0tATw3bkffI78MDxGaoBKnvmbW

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 55 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d4a05a89d1f3879c67c46f70a0ee70b2bc3a3c37cf4c3d2fbcc9fca3ea61aeeb.exe
    "C:\Users\Admin\AppData\Local\Temp\d4a05a89d1f3879c67c46f70a0ee70b2bc3a3c37cf4c3d2fbcc9fca3ea61aeeb.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4956
    • C:\Users\Admin\ywmut.exe
      "C:\Users\Admin\ywmut.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2436

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\ywmut.exe

    Filesize

    212KB

    MD5

    682cec866d92418b4d450a7eb37d22dc

    SHA1

    058fe891bf469b79e66325e9fb61be4ec4d8182d

    SHA256

    ec3225db960c35bbd9ee1e5ff320ab185c43bfd11c57c7c1167f1cccd473a7da

    SHA512

    2a41928966f5b675852e36df20f888208d8d8815ba431e4c1f62d08c37847d8685ab9308669a93378302fcb0f4387874eec7c0138dca688170df884135032d64

  • C:\Users\Admin\ywmut.exe

    Filesize

    212KB

    MD5

    682cec866d92418b4d450a7eb37d22dc

    SHA1

    058fe891bf469b79e66325e9fb61be4ec4d8182d

    SHA256

    ec3225db960c35bbd9ee1e5ff320ab185c43bfd11c57c7c1167f1cccd473a7da

    SHA512

    2a41928966f5b675852e36df20f888208d8d8815ba431e4c1f62d08c37847d8685ab9308669a93378302fcb0f4387874eec7c0138dca688170df884135032d64