Analysis

  • max time kernel
    150s
  • max time network
    52s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 00:20

General

  • Target

    e76df772a3b6365a6ce50b9f1082d5ff2852db9dea49d0ea505e984cff251995.exe

  • Size

    228KB

  • MD5

    4324aa4659212879d36d7052e3d0eceb

  • SHA1

    56830b6ad0b5ad483b624bda5b734eccc42124a7

  • SHA256

    e76df772a3b6365a6ce50b9f1082d5ff2852db9dea49d0ea505e984cff251995

  • SHA512

    69afec1e4beb08b0329b5360c84bd9fbd8ace91d5bffb35f3327416ee972928a424429c8d49309973d66e662a949a99081b3eedd343beeb8fc65c6de7989f99a

  • SSDEEP

    3072:OgZaPi5UYJVFV5eDQHsuvNA05Vqtto24VmcZMUuXi46qndrAxIbYpa:qO3JrLeDQHr+uV0to24VmlUuSvqdN

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 55 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e76df772a3b6365a6ce50b9f1082d5ff2852db9dea49d0ea505e984cff251995.exe
    "C:\Users\Admin\AppData\Local\Temp\e76df772a3b6365a6ce50b9f1082d5ff2852db9dea49d0ea505e984cff251995.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1416
    • C:\Users\Admin\yoito.exe
      "C:\Users\Admin\yoito.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2044

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\yoito.exe

    Filesize

    228KB

    MD5

    c83d7c5bd685dc4ec505355d86e5384d

    SHA1

    c83bf673a61c441ae3032188ac94b9d93d6e6e60

    SHA256

    a94da91195c7e395ff67fe564a63e29833bdf203d1855fcec998b7863eb708ac

    SHA512

    896368ed60648a4e52d4f7564e3243aa2aed826493c770eba2258ad8ebfbd2fde5fa00ac60276baa4322929a8ebe302c4b125deb4e0f85ca9a4473377b473735

  • C:\Users\Admin\yoito.exe

    Filesize

    228KB

    MD5

    c83d7c5bd685dc4ec505355d86e5384d

    SHA1

    c83bf673a61c441ae3032188ac94b9d93d6e6e60

    SHA256

    a94da91195c7e395ff67fe564a63e29833bdf203d1855fcec998b7863eb708ac

    SHA512

    896368ed60648a4e52d4f7564e3243aa2aed826493c770eba2258ad8ebfbd2fde5fa00ac60276baa4322929a8ebe302c4b125deb4e0f85ca9a4473377b473735

  • \Users\Admin\yoito.exe

    Filesize

    228KB

    MD5

    c83d7c5bd685dc4ec505355d86e5384d

    SHA1

    c83bf673a61c441ae3032188ac94b9d93d6e6e60

    SHA256

    a94da91195c7e395ff67fe564a63e29833bdf203d1855fcec998b7863eb708ac

    SHA512

    896368ed60648a4e52d4f7564e3243aa2aed826493c770eba2258ad8ebfbd2fde5fa00ac60276baa4322929a8ebe302c4b125deb4e0f85ca9a4473377b473735

  • \Users\Admin\yoito.exe

    Filesize

    228KB

    MD5

    c83d7c5bd685dc4ec505355d86e5384d

    SHA1

    c83bf673a61c441ae3032188ac94b9d93d6e6e60

    SHA256

    a94da91195c7e395ff67fe564a63e29833bdf203d1855fcec998b7863eb708ac

    SHA512

    896368ed60648a4e52d4f7564e3243aa2aed826493c770eba2258ad8ebfbd2fde5fa00ac60276baa4322929a8ebe302c4b125deb4e0f85ca9a4473377b473735

  • memory/1416-56-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1416-57-0x0000000074DC1000-0x0000000074DC3000-memory.dmp

    Filesize

    8KB

  • memory/1416-65-0x00000000030B0000-0x00000000030EA000-memory.dmp

    Filesize

    232KB

  • memory/1416-68-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/2044-60-0x0000000000000000-mapping.dmp

  • memory/2044-66-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/2044-69-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB