Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
26/11/2022, 21:44
Static task
static1
Behavioral task
behavioral1
Sample
03820722736bdbd88f7bccb04e644955e9bb723e783ff9fa66d3823fb2508987.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
03820722736bdbd88f7bccb04e644955e9bb723e783ff9fa66d3823fb2508987.exe
Resource
win10v2004-20220812-en
General
-
Target
03820722736bdbd88f7bccb04e644955e9bb723e783ff9fa66d3823fb2508987.exe
-
Size
48KB
-
MD5
d52a8103b4b14f808ab259a3086e638e
-
SHA1
5fb489fdebd00f04749aff39701807830a434a53
-
SHA256
03820722736bdbd88f7bccb04e644955e9bb723e783ff9fa66d3823fb2508987
-
SHA512
a9ca665f49e58f642312c632142d9c6c6ad8511161f7f68dc854d80b33998f402072a841694c4ff77bf6238ca0d47be224bf15c60f4183ba29305136ca4e5f13
-
SSDEEP
768:7TT8R3ev8GEe854yRVnQbhcdqDMhCgXyHRVZHOlwYd:7f8R8+54yRVnQdwXyHRjuL
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 944 ywkkso.exe -
Loads dropped DLL 1 IoCs
pid Process 944 ywkkso.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: ywkkso.exe File opened (read-only) \??\E: ywkkso.exe File opened (read-only) \??\F: ywkkso.exe File opened (read-only) \??\H: ywkkso.exe File opened (read-only) \??\M: ywkkso.exe File opened (read-only) \??\Q: ywkkso.exe File opened (read-only) \??\V: ywkkso.exe File opened (read-only) \??\Z: ywkkso.exe File opened (read-only) \??\K: ywkkso.exe File opened (read-only) \??\N: ywkkso.exe File opened (read-only) \??\O: ywkkso.exe File opened (read-only) \??\R: ywkkso.exe File opened (read-only) \??\U: ywkkso.exe File opened (read-only) \??\I: ywkkso.exe File opened (read-only) \??\J: ywkkso.exe File opened (read-only) \??\P: ywkkso.exe File opened (read-only) \??\T: ywkkso.exe File opened (read-only) \??\Y: ywkkso.exe File opened (read-only) \??\G: ywkkso.exe File opened (read-only) \??\L: ywkkso.exe File opened (read-only) \??\S: ywkkso.exe File opened (read-only) \??\W: ywkkso.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\ywkkso.exe 03820722736bdbd88f7bccb04e644955e9bb723e783ff9fa66d3823fb2508987.exe File opened for modification C:\Windows\SysWOW64\ywkkso.exe 03820722736bdbd88f7bccb04e644955e9bb723e783ff9fa66d3823fb2508987.exe File created C:\Windows\SysWOW64\gei33.dll ywkkso.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\7-Zip\lpk.dll ywkkso.exe File opened for modification C:\Program Files\7-Zip\lpk.dll ywkkso.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1696 03820722736bdbd88f7bccb04e644955e9bb723e783ff9fa66d3823fb2508987.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\03820722736bdbd88f7bccb04e644955e9bb723e783ff9fa66d3823fb2508987.exe"C:\Users\Admin\AppData\Local\Temp\03820722736bdbd88f7bccb04e644955e9bb723e783ff9fa66d3823fb2508987.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: RenamesItself
PID:1696
-
C:\Windows\SysWOW64\ywkkso.exeC:\Windows\SysWOW64\ywkkso.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
PID:944
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD5d52a8103b4b14f808ab259a3086e638e
SHA15fb489fdebd00f04749aff39701807830a434a53
SHA25603820722736bdbd88f7bccb04e644955e9bb723e783ff9fa66d3823fb2508987
SHA512a9ca665f49e58f642312c632142d9c6c6ad8511161f7f68dc854d80b33998f402072a841694c4ff77bf6238ca0d47be224bf15c60f4183ba29305136ca4e5f13
-
Filesize
48KB
MD5d52a8103b4b14f808ab259a3086e638e
SHA15fb489fdebd00f04749aff39701807830a434a53
SHA25603820722736bdbd88f7bccb04e644955e9bb723e783ff9fa66d3823fb2508987
SHA512a9ca665f49e58f642312c632142d9c6c6ad8511161f7f68dc854d80b33998f402072a841694c4ff77bf6238ca0d47be224bf15c60f4183ba29305136ca4e5f13
-
Filesize
58KB
MD5caa437442a847db69f4360b166c36d04
SHA155b5001c0330adc5999f7523be7dcc78a44ab23f
SHA25616fab994afe78b9c4d273a895149d54049b7b19591a9ec6bd02d35375f5fd5a9
SHA5124e14b76feda93ef78c4f8c71b5673661eb6f50fe4c24ca17526bfb07f67e04d22723015e0ac45c2a2cb075a05987a9ec30eebd0413bc7053713b1262ab618c48