Analysis

  • max time kernel
    168s
  • max time network
    174s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/12/2022, 19:24

General

  • Target

    98fd1ee8d748bc48004d5eea57842e0a78ec8b19ae0fc934451a97293ebcb72a.exe

  • Size

    116KB

  • MD5

    52bf1ea0c4232e3de7f14dfed7122599

  • SHA1

    4a7f2ff38c6a6713ac44ad7c8e9ed3ecde8b122d

  • SHA256

    98fd1ee8d748bc48004d5eea57842e0a78ec8b19ae0fc934451a97293ebcb72a

  • SHA512

    29d5d328a337d3687b2ec9b86dfe0841542c08ab0d3a97b3d9d7e33cadeca028e04639c1a91ad7f8195a9e236d124272857934e36452acb05320152967d71795

  • SSDEEP

    1536:14pxoB++PL8Kw6KBOIW4Z8HO1Zwt0f4HeDUEdMOPy9sbgNWwo7JaSU:6pj+PLfIr1ZNDUEdvwQG

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 55 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\98fd1ee8d748bc48004d5eea57842e0a78ec8b19ae0fc934451a97293ebcb72a.exe
    "C:\Users\Admin\AppData\Local\Temp\98fd1ee8d748bc48004d5eea57842e0a78ec8b19ae0fc934451a97293ebcb72a.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2220
    • C:\Users\Admin\ylmim.exe
      "C:\Users\Admin\ylmim.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1408

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\ylmim.exe

    Filesize

    116KB

    MD5

    78752a1d38ecda7ab7cb8922b01538a0

    SHA1

    cef7cb3aad439674c4bfd956ac6b93e832bb5e01

    SHA256

    936653f18973cee6deab2e9bf1e5183334d8487affc71e0be595729e127eeebd

    SHA512

    d6e2153b6876cc45d588d596acc26da25c6cfa66a0fdecb11e5ff7717fcfef2ecc0af34845e0fc58e3c777fec47c735d7415b9a233fa777d9b528455183b114c

  • C:\Users\Admin\ylmim.exe

    Filesize

    116KB

    MD5

    78752a1d38ecda7ab7cb8922b01538a0

    SHA1

    cef7cb3aad439674c4bfd956ac6b93e832bb5e01

    SHA256

    936653f18973cee6deab2e9bf1e5183334d8487affc71e0be595729e127eeebd

    SHA512

    d6e2153b6876cc45d588d596acc26da25c6cfa66a0fdecb11e5ff7717fcfef2ecc0af34845e0fc58e3c777fec47c735d7415b9a233fa777d9b528455183b114c