Analysis

  • max time kernel
    151s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/12/2022, 23:40

General

  • Target

    a970b932c0d08f58bc593eee24d23fa39b9cc1b66eabee755d9087939965d170.exe

  • Size

    156KB

  • MD5

    876d3bba8a0193913b97e88e28c4503c

  • SHA1

    840d4a9b46859d52bfb0277a6a75dc4d419dbaf2

  • SHA256

    a970b932c0d08f58bc593eee24d23fa39b9cc1b66eabee755d9087939965d170

  • SHA512

    d26bec3de3a3c7be252aaf4b46e1518f131cd30f5af3fe99accc6b2037f4c8a0845b20e89709491fb094234d637f4bcdf29ab5b472cdf59c2f6ad2d22fa96bb0

  • SSDEEP

    3072:vsTNiVcx8jeFvB0Z/I8xSFJKAr2CrIL3NoF0:UpIcvqVuJfr2CML3+i

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a970b932c0d08f58bc593eee24d23fa39b9cc1b66eabee755d9087939965d170.exe
    "C:\Users\Admin\AppData\Local\Temp\a970b932c0d08f58bc593eee24d23fa39b9cc1b66eabee755d9087939965d170.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1040
    • C:\Users\Admin\yiemaur.exe
      "C:\Users\Admin\yiemaur.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4364

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\yiemaur.exe

          Filesize

          156KB

          MD5

          2aaf5d09301a62dd792cf75127db8873

          SHA1

          d144c91042331c23952b0b6b266081eeada97dd0

          SHA256

          ab3201462a3d5fb2fc052abe264694fd5b122b5f1f7cb07a697fb0f8732d0eb0

          SHA512

          19c08790b1ef1e5227ea7eed7aa4c6952587cd6ecd74cce9cbe20654ea756221db07d8619c3d2cfd49ee81a974b379108e9710ab3b7adb7bc33569ff75666c69

        • C:\Users\Admin\yiemaur.exe

          Filesize

          156KB

          MD5

          2aaf5d09301a62dd792cf75127db8873

          SHA1

          d144c91042331c23952b0b6b266081eeada97dd0

          SHA256

          ab3201462a3d5fb2fc052abe264694fd5b122b5f1f7cb07a697fb0f8732d0eb0

          SHA512

          19c08790b1ef1e5227ea7eed7aa4c6952587cd6ecd74cce9cbe20654ea756221db07d8619c3d2cfd49ee81a974b379108e9710ab3b7adb7bc33569ff75666c69