Analysis

  • max time kernel
    177s
  • max time network
    104s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    27/11/2022, 18:48

General

  • Target

    b091d23bbaf8d6d6bf0d48299a8452a979d76f497c69476f4d46cc60d80aa497.exe

  • Size

    88KB

  • MD5

    748ec7b6f01dc4cfe734ddde128379ad

  • SHA1

    58b9df240f833b785fc3d5d69810eb573ee0858c

  • SHA256

    b091d23bbaf8d6d6bf0d48299a8452a979d76f497c69476f4d46cc60d80aa497

  • SHA512

    3ab3b254d078b236c72f28bfe13bc4c8c478717a08493caf6f8bff0aef0a17894cdcc536330a7e6a4f0cc5f309b55c16d8afb26738eb8b94e0459f91a0ca12e7

  • SSDEEP

    768:QCxXPXxmJwemFIkud+P9WiMTwOUMBHFIkNcXHoaLtAy9ZZ1RG+naYn6fSFTsFJdY:/lVsfMZ1G0L+mRZx1sR1z

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 45 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b091d23bbaf8d6d6bf0d48299a8452a979d76f497c69476f4d46cc60d80aa497.exe
    "C:\Users\Admin\AppData\Local\Temp\b091d23bbaf8d6d6bf0d48299a8452a979d76f497c69476f4d46cc60d80aa497.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1648
    • C:\Users\Admin\yaamig.exe
      "C:\Users\Admin\yaamig.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1772

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\yaamig.exe

    Filesize

    88KB

    MD5

    721b2386fa50d2cca3fe9a947e6940e3

    SHA1

    5815f82bfc18d01616c05b1c7c025cb290c6fd4f

    SHA256

    4aa54cf87340f5464e995b9315e6870fd2610cdb19c47e84bd60ea2a32c49387

    SHA512

    5817f80319ee26f8bf10eafd8c1ee7b588d7a1dceed12f4b0068758354f620a53a8c3de15e970d0f34dd40bda4d760ed1a05c71b8f8ce3d7d8f155825da2bdbb

  • C:\Users\Admin\yaamig.exe

    Filesize

    88KB

    MD5

    721b2386fa50d2cca3fe9a947e6940e3

    SHA1

    5815f82bfc18d01616c05b1c7c025cb290c6fd4f

    SHA256

    4aa54cf87340f5464e995b9315e6870fd2610cdb19c47e84bd60ea2a32c49387

    SHA512

    5817f80319ee26f8bf10eafd8c1ee7b588d7a1dceed12f4b0068758354f620a53a8c3de15e970d0f34dd40bda4d760ed1a05c71b8f8ce3d7d8f155825da2bdbb

  • \Users\Admin\yaamig.exe

    Filesize

    88KB

    MD5

    721b2386fa50d2cca3fe9a947e6940e3

    SHA1

    5815f82bfc18d01616c05b1c7c025cb290c6fd4f

    SHA256

    4aa54cf87340f5464e995b9315e6870fd2610cdb19c47e84bd60ea2a32c49387

    SHA512

    5817f80319ee26f8bf10eafd8c1ee7b588d7a1dceed12f4b0068758354f620a53a8c3de15e970d0f34dd40bda4d760ed1a05c71b8f8ce3d7d8f155825da2bdbb

  • \Users\Admin\yaamig.exe

    Filesize

    88KB

    MD5

    721b2386fa50d2cca3fe9a947e6940e3

    SHA1

    5815f82bfc18d01616c05b1c7c025cb290c6fd4f

    SHA256

    4aa54cf87340f5464e995b9315e6870fd2610cdb19c47e84bd60ea2a32c49387

    SHA512

    5817f80319ee26f8bf10eafd8c1ee7b588d7a1dceed12f4b0068758354f620a53a8c3de15e970d0f34dd40bda4d760ed1a05c71b8f8ce3d7d8f155825da2bdbb

  • memory/1648-56-0x0000000075BE1000-0x0000000075BE3000-memory.dmp

    Filesize

    8KB