Analysis

  • max time kernel
    161s
  • max time network
    193s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-12-2022 19:17

General

  • Target

    a8c76cdc4e6262e9cc7c0abd4241d3370d7dcf1998c78b51c3eda410e2b195b5.exe

  • Size

    296KB

  • MD5

    1ce9aa5f15d96505c08720cc148d8600

  • SHA1

    393c291a31e4e394ccefd4a443b5bac229ab446b

  • SHA256

    a8c76cdc4e6262e9cc7c0abd4241d3370d7dcf1998c78b51c3eda410e2b195b5

  • SHA512

    a3cd02a0888c077b4db21a2c303f5d9d1cc1d375f05ea1016e0275b39219702a1224a32b2235914e02b5aca6458614eb46bf3752772378af1497c268769b6778

  • SSDEEP

    3072:BcDg2q+sg+swlSN9BkPFzW85u9ututumuOu+uxuOugujuju9u9ugu9uPuTu6utu3:Bcq+sg+s

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 50 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a8c76cdc4e6262e9cc7c0abd4241d3370d7dcf1998c78b51c3eda410e2b195b5.exe
    "C:\Users\Admin\AppData\Local\Temp\a8c76cdc4e6262e9cc7c0abd4241d3370d7dcf1998c78b51c3eda410e2b195b5.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:792
    • C:\Users\Admin\yaobif.exe
      "C:\Users\Admin\yaobif.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2792

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\yaobif.exe

    Filesize

    296KB

    MD5

    778507252049b7272d970b3bb119148f

    SHA1

    2886a7e0e73df6807654d10437f91af89014b903

    SHA256

    7f29fb1ea485e7bf8df5eef8e8c2910dcac885a05a6a75da951f6108d1ab8d8f

    SHA512

    92e766aae5a35c6fb84aa170360d37b8200d1cb2cc184d9422cf78b769dc5576219c98e12e5134eb00186f4637c3d2e48bf87938cb54669fb0db95b4f5919636

  • C:\Users\Admin\yaobif.exe

    Filesize

    296KB

    MD5

    778507252049b7272d970b3bb119148f

    SHA1

    2886a7e0e73df6807654d10437f91af89014b903

    SHA256

    7f29fb1ea485e7bf8df5eef8e8c2910dcac885a05a6a75da951f6108d1ab8d8f

    SHA512

    92e766aae5a35c6fb84aa170360d37b8200d1cb2cc184d9422cf78b769dc5576219c98e12e5134eb00186f4637c3d2e48bf87938cb54669fb0db95b4f5919636

  • memory/2792-134-0x0000000000000000-mapping.dmp