Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    22/11/2022, 00:36

General

  • Target

    f8a8df688da71632c557437047ab4ea5aa58ef274ade68b871216d9969aa8c6e.exe

  • Size

    34KB

  • MD5

    35cef4d8899d029b91292671489c1d70

  • SHA1

    4fd6705c5797c80cf38316719c10ff0f36eeb149

  • SHA256

    f8a8df688da71632c557437047ab4ea5aa58ef274ade68b871216d9969aa8c6e

  • SHA512

    6a3e0289b00ed2177345f558db05f38feb6d7d361f02f9ec5323975337ae9b1616a3dff033ebfb6e6dfd9e405b433b43203c1e3b2d5481244906fbaa11dd81cf

  • SSDEEP

    768:AcQhyn/CSQ7JJLQCFNCMhKFZRtEltyF2JbRD+TGseKIfirwp:vQhyn/m7JJLZiMw3TEltyF25t+2ti

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 3 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f8a8df688da71632c557437047ab4ea5aa58ef274ade68b871216d9969aa8c6e.exe
    "C:\Users\Admin\AppData\Local\Temp\f8a8df688da71632c557437047ab4ea5aa58ef274ade68b871216d9969aa8c6e.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1980
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\F8A8DF~1.EXE > nul
      2⤵
      • Deletes itself
      PID:1916
  • C:\Windows\SysWOW64\ywkkso.exe
    C:\Windows\SysWOW64\ywkkso.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Checks processor information in registry
    • Suspicious use of WriteProcessMemory
    PID:1756
    • C:\Windows\TEMP\hrlE745.tmp
      C:\Windows\TEMP\hrlE745.tmp
      2⤵
      • Executes dropped EXE
      PID:1700

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\ywkkso.exe

          Filesize

          34KB

          MD5

          35cef4d8899d029b91292671489c1d70

          SHA1

          4fd6705c5797c80cf38316719c10ff0f36eeb149

          SHA256

          f8a8df688da71632c557437047ab4ea5aa58ef274ade68b871216d9969aa8c6e

          SHA512

          6a3e0289b00ed2177345f558db05f38feb6d7d361f02f9ec5323975337ae9b1616a3dff033ebfb6e6dfd9e405b433b43203c1e3b2d5481244906fbaa11dd81cf

        • C:\Windows\SysWOW64\ywkkso.exe

          Filesize

          34KB

          MD5

          35cef4d8899d029b91292671489c1d70

          SHA1

          4fd6705c5797c80cf38316719c10ff0f36eeb149

          SHA256

          f8a8df688da71632c557437047ab4ea5aa58ef274ade68b871216d9969aa8c6e

          SHA512

          6a3e0289b00ed2177345f558db05f38feb6d7d361f02f9ec5323975337ae9b1616a3dff033ebfb6e6dfd9e405b433b43203c1e3b2d5481244906fbaa11dd81cf

        • C:\Windows\Temp\hrlE745.tmp

          Filesize

          34KB

          MD5

          35cef4d8899d029b91292671489c1d70

          SHA1

          4fd6705c5797c80cf38316719c10ff0f36eeb149

          SHA256

          f8a8df688da71632c557437047ab4ea5aa58ef274ade68b871216d9969aa8c6e

          SHA512

          6a3e0289b00ed2177345f558db05f38feb6d7d361f02f9ec5323975337ae9b1616a3dff033ebfb6e6dfd9e405b433b43203c1e3b2d5481244906fbaa11dd81cf

        • \Windows\SysWOW64\hra8.dll

          Filesize

          42KB

          MD5

          650c15e84b4714971dc86b1d8b7e88c5

          SHA1

          7153d080e2d8b7e7c4bca5bd19fa98dc8b72d6bd

          SHA256

          602ea9d49bd459c8cc21cc6e28e7927c8b46a5ba1f7f353a71b0843824f1ff6d

          SHA512

          7345328c891fbe5493b29533bde3df2d4f0dabe5cb4980ed25d4bb17cbfab1ec4e350e1ba52e3d3155d66a13aea428d311104b887564beeece1b18c88ead6246

        • \Windows\Temp\hrlE745.tmp

          Filesize

          34KB

          MD5

          35cef4d8899d029b91292671489c1d70

          SHA1

          4fd6705c5797c80cf38316719c10ff0f36eeb149

          SHA256

          f8a8df688da71632c557437047ab4ea5aa58ef274ade68b871216d9969aa8c6e

          SHA512

          6a3e0289b00ed2177345f558db05f38feb6d7d361f02f9ec5323975337ae9b1616a3dff033ebfb6e6dfd9e405b433b43203c1e3b2d5481244906fbaa11dd81cf

        • \Windows\Temp\hrlE745.tmp

          Filesize

          34KB

          MD5

          35cef4d8899d029b91292671489c1d70

          SHA1

          4fd6705c5797c80cf38316719c10ff0f36eeb149

          SHA256

          f8a8df688da71632c557437047ab4ea5aa58ef274ade68b871216d9969aa8c6e

          SHA512

          6a3e0289b00ed2177345f558db05f38feb6d7d361f02f9ec5323975337ae9b1616a3dff033ebfb6e6dfd9e405b433b43203c1e3b2d5481244906fbaa11dd81cf

        • memory/1756-58-0x00000000756B1000-0x00000000756B3000-memory.dmp

          Filesize

          8KB