Analysis

  • max time kernel
    164s
  • max time network
    175s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-11-2022 18:54

General

  • Target

    b4c39704e03eec805fd9c7b66bbc1f9ea1bfb0c18fe403879430558fe2dd6ded.exe

  • Size

    132KB

  • MD5

    22bb6773516a2ad2fef8db0874990f3b

  • SHA1

    d12b27396198b446ddbaab273593acdca15ff63f

  • SHA256

    b4c39704e03eec805fd9c7b66bbc1f9ea1bfb0c18fe403879430558fe2dd6ded

  • SHA512

    af7fb54153d2b7a3abac12cda6e70a88b211492d62cadd88f61749dbd6d4fb87aee19050a3a554bbb4aa55a0e21cc69605b4aa2a46767c1835d7d93b2636fb1b

  • SSDEEP

    1536:cwWxwgYu9+7gWbrimfWSeJFzkRcTwdE1dIumgDL0FfxTGypitFdY:cwoT8gWi2eJFzkRswZumgDLOffitXY

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 54 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b4c39704e03eec805fd9c7b66bbc1f9ea1bfb0c18fe403879430558fe2dd6ded.exe
    "C:\Users\Admin\AppData\Local\Temp\b4c39704e03eec805fd9c7b66bbc1f9ea1bfb0c18fe403879430558fe2dd6ded.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4112
    • C:\Users\Admin\yaafa.exe
      "C:\Users\Admin\yaafa.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2708

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\yaafa.exe

    Filesize

    132KB

    MD5

    52fe524f4795e24228be235224c5a9c5

    SHA1

    2da684891f8cfc5342381f47088d0710ef661116

    SHA256

    8b1b5fb5c8247e378eb08a83513d51ea5445fe134c8db4e196376423c0b4ffd1

    SHA512

    2ba237969f126459ddaac5214aa0c88f0cd0d47cd31dac972ff31eb8b82b857bb9b71d4e090bec187180d0d1c809d581184f8be8deb49958967c8a7c24c4904a

  • C:\Users\Admin\yaafa.exe

    Filesize

    132KB

    MD5

    52fe524f4795e24228be235224c5a9c5

    SHA1

    2da684891f8cfc5342381f47088d0710ef661116

    SHA256

    8b1b5fb5c8247e378eb08a83513d51ea5445fe134c8db4e196376423c0b4ffd1

    SHA512

    2ba237969f126459ddaac5214aa0c88f0cd0d47cd31dac972ff31eb8b82b857bb9b71d4e090bec187180d0d1c809d581184f8be8deb49958967c8a7c24c4904a

  • memory/2708-135-0x0000000000000000-mapping.dmp

  • memory/2708-140-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/2708-141-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/4112-132-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB