Analysis

  • max time kernel
    169s
  • max time network
    63s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 18:48

General

  • Target

    fa3b94157c124546ca0981100a6c2c095167b1d8577c026119c604c745baea0d.exe

  • Size

    220KB

  • MD5

    4d2ecaee7d1124a4e17f1cac127f2b96

  • SHA1

    6f0bc78ae426bd42400a4472bab258585257bb4c

  • SHA256

    fa3b94157c124546ca0981100a6c2c095167b1d8577c026119c604c745baea0d

  • SHA512

    23fa24ebdf72966877d08a9460976978c95d050268b018c07a7dce9fa21321336474fd4bba47f04ae06761b0ee9f40847a9a7ad37885cbf0385468c3260f0df0

  • SSDEEP

    3072:PUOu+kr8YUL4qx9RIHgil3UuhSa3U3dD8d6Oy+MIrnj3J+Nhi:cO7ko15x9SHVeOj0Q

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 28 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fa3b94157c124546ca0981100a6c2c095167b1d8577c026119c604c745baea0d.exe
    "C:\Users\Admin\AppData\Local\Temp\fa3b94157c124546ca0981100a6c2c095167b1d8577c026119c604c745baea0d.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1292
    • C:\Users\Admin\yisif.exe
      "C:\Users\Admin\yisif.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1128

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\yisif.exe

    Filesize

    220KB

    MD5

    a3b6c217794a357278b49410f3bde62f

    SHA1

    f6aa5441258d830168f4cccce7975413e7ef99a1

    SHA256

    3b21b753befef55d286fa7dc7defb0d37f2950beaab256afc964c34e7add1272

    SHA512

    1a7d0e440f07868e604030d8494a5859216cdd1fac0b7118827a57fd2ee418fce110f838d1d2299b0bf0be2684828e7b61bf6bf12b994aa1d4158905b25906e5

  • C:\Users\Admin\yisif.exe

    Filesize

    220KB

    MD5

    a3b6c217794a357278b49410f3bde62f

    SHA1

    f6aa5441258d830168f4cccce7975413e7ef99a1

    SHA256

    3b21b753befef55d286fa7dc7defb0d37f2950beaab256afc964c34e7add1272

    SHA512

    1a7d0e440f07868e604030d8494a5859216cdd1fac0b7118827a57fd2ee418fce110f838d1d2299b0bf0be2684828e7b61bf6bf12b994aa1d4158905b25906e5

  • \Users\Admin\yisif.exe

    Filesize

    220KB

    MD5

    a3b6c217794a357278b49410f3bde62f

    SHA1

    f6aa5441258d830168f4cccce7975413e7ef99a1

    SHA256

    3b21b753befef55d286fa7dc7defb0d37f2950beaab256afc964c34e7add1272

    SHA512

    1a7d0e440f07868e604030d8494a5859216cdd1fac0b7118827a57fd2ee418fce110f838d1d2299b0bf0be2684828e7b61bf6bf12b994aa1d4158905b25906e5

  • \Users\Admin\yisif.exe

    Filesize

    220KB

    MD5

    a3b6c217794a357278b49410f3bde62f

    SHA1

    f6aa5441258d830168f4cccce7975413e7ef99a1

    SHA256

    3b21b753befef55d286fa7dc7defb0d37f2950beaab256afc964c34e7add1272

    SHA512

    1a7d0e440f07868e604030d8494a5859216cdd1fac0b7118827a57fd2ee418fce110f838d1d2299b0bf0be2684828e7b61bf6bf12b994aa1d4158905b25906e5

  • memory/1128-59-0x0000000000000000-mapping.dmp

  • memory/1292-56-0x0000000074FD1000-0x0000000074FD3000-memory.dmp

    Filesize

    8KB