Analysis

  • max time kernel
    152s
  • max time network
    96s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    29-11-2022 17:35

General

  • Target

    7f3224d1b37ed70a6e08ff03b6d0fe5cc2c311b4949b70d987c86dc9acc6cb9a.exe

  • Size

    164KB

  • MD5

    73a7b0c956a843768e9fa9843d2dba10

  • SHA1

    a5eeaa7ca702c49fe82ef4f7eac4b745a6774130

  • SHA256

    7f3224d1b37ed70a6e08ff03b6d0fe5cc2c311b4949b70d987c86dc9acc6cb9a

  • SHA512

    abcb60bc4ebf347575a5b0282aa5c1d6a1738e01e6cd0c05a10f9c825fd0c732ecb88dce2cb378d7ff83b98edb9391e2344360c3caef00226c05d500c465a20b

  • SSDEEP

    3072:JoHDN+3uCog8lq0mEQZXPb+OXBJatOdS7dcovquoF+N7bZD16iYIQusGGTkLGFMD:gGu9Tlqn3XPaptOdS7dcovquoF+N7bZJ

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7f3224d1b37ed70a6e08ff03b6d0fe5cc2c311b4949b70d987c86dc9acc6cb9a.exe
    "C:\Users\Admin\AppData\Local\Temp\7f3224d1b37ed70a6e08ff03b6d0fe5cc2c311b4949b70d987c86dc9acc6cb9a.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2036
    • C:\Users\Admin\ynjef.exe
      "C:\Users\Admin\ynjef.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:556

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\ynjef.exe

    Filesize

    164KB

    MD5

    2a2f42a0a1e98432ea502ef15c7024ef

    SHA1

    3a46dc6c99e2e4f5dfdc2cee56c06f3a6ad2bd11

    SHA256

    4a3899445afae65e3d342b8c12b3761becda3ef14e97cab6852997093033bd93

    SHA512

    5f2ac442f626e9103626974452e3777ed3d97ba1e217f8b44255e679108fe80d9746040e86574f6d12aa7a8cbeb36db72ee4f0b634924058170c308bbdffc2af

  • C:\Users\Admin\ynjef.exe

    Filesize

    164KB

    MD5

    2a2f42a0a1e98432ea502ef15c7024ef

    SHA1

    3a46dc6c99e2e4f5dfdc2cee56c06f3a6ad2bd11

    SHA256

    4a3899445afae65e3d342b8c12b3761becda3ef14e97cab6852997093033bd93

    SHA512

    5f2ac442f626e9103626974452e3777ed3d97ba1e217f8b44255e679108fe80d9746040e86574f6d12aa7a8cbeb36db72ee4f0b634924058170c308bbdffc2af

  • \Users\Admin\ynjef.exe

    Filesize

    164KB

    MD5

    2a2f42a0a1e98432ea502ef15c7024ef

    SHA1

    3a46dc6c99e2e4f5dfdc2cee56c06f3a6ad2bd11

    SHA256

    4a3899445afae65e3d342b8c12b3761becda3ef14e97cab6852997093033bd93

    SHA512

    5f2ac442f626e9103626974452e3777ed3d97ba1e217f8b44255e679108fe80d9746040e86574f6d12aa7a8cbeb36db72ee4f0b634924058170c308bbdffc2af

  • \Users\Admin\ynjef.exe

    Filesize

    164KB

    MD5

    2a2f42a0a1e98432ea502ef15c7024ef

    SHA1

    3a46dc6c99e2e4f5dfdc2cee56c06f3a6ad2bd11

    SHA256

    4a3899445afae65e3d342b8c12b3761becda3ef14e97cab6852997093033bd93

    SHA512

    5f2ac442f626e9103626974452e3777ed3d97ba1e217f8b44255e679108fe80d9746040e86574f6d12aa7a8cbeb36db72ee4f0b634924058170c308bbdffc2af

  • memory/2036-56-0x0000000075FE1000-0x0000000075FE3000-memory.dmp

    Filesize

    8KB