Analysis

  • max time kernel
    150s
  • max time network
    50s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    01/12/2022, 23:28

General

  • Target

    340ba456edfd84d6cb4db71ddb069af57daa89aa6395f220a1ff94a2b1874c0b.exe

  • Size

    148KB

  • MD5

    8f424c1de97050fcb9687e87b3c62674

  • SHA1

    a9dcf27acfbfd92ca84c831664ac148ae695be7b

  • SHA256

    340ba456edfd84d6cb4db71ddb069af57daa89aa6395f220a1ff94a2b1874c0b

  • SHA512

    d8f193be414f798a89a02c91f4621670dd355285774c775a104f6514601d90d4443d33fc36c07f58f33d927b2278e64d20c86989f4c094a4a342e9444af2b5cb

  • SSDEEP

    1536:5o9LSOf4BlqPAKcxnX+PBcRlouQvSPouXZ6D6Jj5wl+dwCMZUbP7VBTqJf2YhxYM:WIKalqPpy+Pco6ouZ68Kl+dnMZUb5

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\340ba456edfd84d6cb4db71ddb069af57daa89aa6395f220a1ff94a2b1874c0b.exe
    "C:\Users\Admin\AppData\Local\Temp\340ba456edfd84d6cb4db71ddb069af57daa89aa6395f220a1ff94a2b1874c0b.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1880
    • C:\Users\Admin\yvweed.exe
      "C:\Users\Admin\yvweed.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1120

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\yvweed.exe

    Filesize

    148KB

    MD5

    9a8e0d11dab2a46238ac0afe04ab88c1

    SHA1

    da7679c87d831e111406f1ddd62ec978d3e24de5

    SHA256

    1aeec476128f24a0744aee429d60459104deeea6065483179eb20afd4b590347

    SHA512

    bab08ade70dc5a2639127236b9e1492611ec9690765aab9c1dbe1dd8b35225694392e9aeb765bd62d3dc55e872b0dc8cc21dbfa725edba843cbd932f1ad0d72b

  • C:\Users\Admin\yvweed.exe

    Filesize

    148KB

    MD5

    9a8e0d11dab2a46238ac0afe04ab88c1

    SHA1

    da7679c87d831e111406f1ddd62ec978d3e24de5

    SHA256

    1aeec476128f24a0744aee429d60459104deeea6065483179eb20afd4b590347

    SHA512

    bab08ade70dc5a2639127236b9e1492611ec9690765aab9c1dbe1dd8b35225694392e9aeb765bd62d3dc55e872b0dc8cc21dbfa725edba843cbd932f1ad0d72b

  • \Users\Admin\yvweed.exe

    Filesize

    148KB

    MD5

    9a8e0d11dab2a46238ac0afe04ab88c1

    SHA1

    da7679c87d831e111406f1ddd62ec978d3e24de5

    SHA256

    1aeec476128f24a0744aee429d60459104deeea6065483179eb20afd4b590347

    SHA512

    bab08ade70dc5a2639127236b9e1492611ec9690765aab9c1dbe1dd8b35225694392e9aeb765bd62d3dc55e872b0dc8cc21dbfa725edba843cbd932f1ad0d72b

  • \Users\Admin\yvweed.exe

    Filesize

    148KB

    MD5

    9a8e0d11dab2a46238ac0afe04ab88c1

    SHA1

    da7679c87d831e111406f1ddd62ec978d3e24de5

    SHA256

    1aeec476128f24a0744aee429d60459104deeea6065483179eb20afd4b590347

    SHA512

    bab08ade70dc5a2639127236b9e1492611ec9690765aab9c1dbe1dd8b35225694392e9aeb765bd62d3dc55e872b0dc8cc21dbfa725edba843cbd932f1ad0d72b

  • memory/1880-56-0x0000000075D71000-0x0000000075D73000-memory.dmp

    Filesize

    8KB