Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 07:34
Static task
static1
Behavioral task
behavioral1
Sample
hsyiv.bin.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
hsyiv.bin.exe
Resource
win10v2004-20221111-en
General
-
Target
hsyiv.bin.exe
-
Size
14KB
-
MD5
59a2f3c3d2e53dc02e8a4c7fcdcc8437
-
SHA1
82b44fd36dd5a203552e6488fca1c0f2bfbccdb5
-
SHA256
b5776bef66403d0e6488f8acd8782d4226f4c1b8ecff872388e3d1e8f6057767
-
SHA512
05fef69ab781dc5af3dc499c61152260eed828f8ea90e27a3c0e6f0d3d8dc54766fe13b5fcf3d0f8c2dda08fdd092ec35c532cd04eac6844be4ee1f2625ee5a0
-
SSDEEP
384:/ckDjtqzcszJRPAO6fmC1bUL9NX8wV+aoUyexBTi1Pf:0e+JPokCZY78wE5lejTid
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
hsyiv.bin.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation hsyiv.bin.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exepid process 2572 powershell.exe 2572 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
hsyiv.bin.exepowershell.exedescription pid process Token: SeDebugPrivilege 3932 hsyiv.bin.exe Token: SeDebugPrivilege 2572 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
hsyiv.bin.exedescription pid process target process PID 3932 wrote to memory of 2572 3932 hsyiv.bin.exe powershell.exe PID 3932 wrote to memory of 2572 3932 hsyiv.bin.exe powershell.exe PID 3932 wrote to memory of 2572 3932 hsyiv.bin.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\hsyiv.bin.exe"C:\Users\Admin\AppData\Local\Temp\hsyiv.bin.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMwA2AA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2572