Analysis

  • max time kernel
    158s
  • max time network
    55s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    02-12-2022 23:43

General

  • Target

    ad0e76e2d0687c1c76ec8c706f0113b9b8459dc6c14e75864afbf876501bcfef.exe

  • Size

    293KB

  • MD5

    4f93ca947f0bde1b6cdca3d515d7eef9

  • SHA1

    9ddfe6858ab0cb510c1569c93da85783ab9dfaa1

  • SHA256

    ad0e76e2d0687c1c76ec8c706f0113b9b8459dc6c14e75864afbf876501bcfef

  • SHA512

    233be13cee29763bf22493cb2277683f3826b0ceace0b186f04b5ca27dabe3a6058f1ac8239407682ea34ce98b0c6b9d351c90a97162113d695158e2623b9786

  • SSDEEP

    6144:7uaPHPr5dFvW8HGzNz8I4vDWsQAcSnuXLH6M4hvBZnvJ:CaPHVdFvW8Hu/4vDKpXLGhvBf

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ad0e76e2d0687c1c76ec8c706f0113b9b8459dc6c14e75864afbf876501bcfef.exe
    "C:\Users\Admin\AppData\Local\Temp\ad0e76e2d0687c1c76ec8c706f0113b9b8459dc6c14e75864afbf876501bcfef.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1728
    • C:\Users\Admin\ynyiw.exe
      "C:\Users\Admin\ynyiw.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1516

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\ynyiw.exe

    Filesize

    293KB

    MD5

    5db643a94a3b5b772e5957f3972ed567

    SHA1

    423e4da63096b6244497b2a63bc319809ef9c1b6

    SHA256

    439e54e79f55d006fd8c3ee903850e5e6378652382209311db469bf097575da2

    SHA512

    95a89f3d255f1434cceb6e491bbc367c2c8e5c7f755daa9eab1370e6a5f5f313220e259868b1789bd5ad054ae6df9df07aefedac39a330c53af822f5fd1c923a

  • C:\Users\Admin\ynyiw.exe

    Filesize

    293KB

    MD5

    5db643a94a3b5b772e5957f3972ed567

    SHA1

    423e4da63096b6244497b2a63bc319809ef9c1b6

    SHA256

    439e54e79f55d006fd8c3ee903850e5e6378652382209311db469bf097575da2

    SHA512

    95a89f3d255f1434cceb6e491bbc367c2c8e5c7f755daa9eab1370e6a5f5f313220e259868b1789bd5ad054ae6df9df07aefedac39a330c53af822f5fd1c923a

  • \Users\Admin\ynyiw.exe

    Filesize

    293KB

    MD5

    5db643a94a3b5b772e5957f3972ed567

    SHA1

    423e4da63096b6244497b2a63bc319809ef9c1b6

    SHA256

    439e54e79f55d006fd8c3ee903850e5e6378652382209311db469bf097575da2

    SHA512

    95a89f3d255f1434cceb6e491bbc367c2c8e5c7f755daa9eab1370e6a5f5f313220e259868b1789bd5ad054ae6df9df07aefedac39a330c53af822f5fd1c923a

  • \Users\Admin\ynyiw.exe

    Filesize

    293KB

    MD5

    5db643a94a3b5b772e5957f3972ed567

    SHA1

    423e4da63096b6244497b2a63bc319809ef9c1b6

    SHA256

    439e54e79f55d006fd8c3ee903850e5e6378652382209311db469bf097575da2

    SHA512

    95a89f3d255f1434cceb6e491bbc367c2c8e5c7f755daa9eab1370e6a5f5f313220e259868b1789bd5ad054ae6df9df07aefedac39a330c53af822f5fd1c923a

  • memory/1516-67-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/1516-61-0x0000000000000000-mapping.dmp

  • memory/1516-71-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/1728-59-0x0000000002910000-0x000000000295C000-memory.dmp

    Filesize

    304KB

  • memory/1728-57-0x0000000075DA1000-0x0000000075DA3000-memory.dmp

    Filesize

    8KB

  • memory/1728-66-0x0000000002910000-0x000000000295C000-memory.dmp

    Filesize

    304KB

  • memory/1728-56-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/1728-69-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/1728-70-0x0000000002910000-0x000000000295C000-memory.dmp

    Filesize

    304KB