Analysis

  • max time kernel
    150s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/10/2022, 22:36

General

  • Target

    c65306796d1e62a4a64e5d7de798b676220ee298aea8f873b9b8a2d8ff454773.exe

  • Size

    208KB

  • MD5

    648e60e43530b4ac802c98a6a0688a40

  • SHA1

    a2a8d6e2fe38cae0f2fc4f69c0233c14892182a0

  • SHA256

    c65306796d1e62a4a64e5d7de798b676220ee298aea8f873b9b8a2d8ff454773

  • SHA512

    374303f095df4e54f6ab594d5d4cf9f14cb5bd2b2b576839aaeb8a792d65a96dea47b772824a0d1e7f6f03ba6f62818505b0b025615ba6c631feb50a5650a48d

  • SSDEEP

    6144:tRiy9Inu5W98TFK/fObT/bGiA14DFsqmVrWpMY9FAN:tosn5W98TFK/fObT/bGidIrW39FAN

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 55 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c65306796d1e62a4a64e5d7de798b676220ee298aea8f873b9b8a2d8ff454773.exe
    "C:\Users\Admin\AppData\Local\Temp\c65306796d1e62a4a64e5d7de798b676220ee298aea8f873b9b8a2d8ff454773.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3608
    • C:\Users\Admin\ylwik.exe
      "C:\Users\Admin\ylwik.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3716

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\ylwik.exe

          Filesize

          208KB

          MD5

          ffc754de24d7a24e63c62e455e77b410

          SHA1

          fe52185c2a166d452762946a14252049ee4343c4

          SHA256

          3df079ad075325db2946af3372f88cc4f37d1723c5287357d36679964b5ff60a

          SHA512

          5e8de52db50efb2f1ec0d60bb7576cc19e556da73c61775c63e5cb2ab1c7431ac398ff2b77823741bcb07403c3a778ef7a6eae1f33efbea3a9413f463cccd7f0

        • C:\Users\Admin\ylwik.exe

          Filesize

          208KB

          MD5

          ffc754de24d7a24e63c62e455e77b410

          SHA1

          fe52185c2a166d452762946a14252049ee4343c4

          SHA256

          3df079ad075325db2946af3372f88cc4f37d1723c5287357d36679964b5ff60a

          SHA512

          5e8de52db50efb2f1ec0d60bb7576cc19e556da73c61775c63e5cb2ab1c7431ac398ff2b77823741bcb07403c3a778ef7a6eae1f33efbea3a9413f463cccd7f0