Analysis

  • max time kernel
    150s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    05-12-2022 23:35

General

  • Target

    a9ba07c866f44aed21e556a48408ad2474929ef9316981480ced319f3ef97823.exe

  • Size

    224KB

  • MD5

    89630b0c79e5b8a352a8e4f334a5f6db

  • SHA1

    5b102da558ffa8f554a056ad83ad451faa5d036c

  • SHA256

    a9ba07c866f44aed21e556a48408ad2474929ef9316981480ced319f3ef97823

  • SHA512

    95dca77ad0f6ba6080d23bc01dc5968384c6da717edbae873c2ca22c146465d82a58d65f5636e4421a888d812d23bd2f5a2093afb525f7e7b389b0a07cc5541d

  • SSDEEP

    6144:2m7oqr3iNvcMI55xjg4+tU1pZ5UdxIOTQMyHct1FHRQoG2:R7oQMULfjg4+tU1pZ5UdxIOTQMyHS1Fv

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 54 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a9ba07c866f44aed21e556a48408ad2474929ef9316981480ced319f3ef97823.exe
    "C:\Users\Admin\AppData\Local\Temp\a9ba07c866f44aed21e556a48408ad2474929ef9316981480ced319f3ef97823.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:360
    • C:\Users\Admin\yiejel.exe
      "C:\Users\Admin\yiejel.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:968

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\yiejel.exe

    Filesize

    224KB

    MD5

    374f2d0b3c6d62ee188c14a611bc128f

    SHA1

    de901f3e97dd0232a6f1d2154ca6db4c91f4c43b

    SHA256

    6fb61d10108a02b9d82eecceaa44e45fd46d6b0179a0dafe13c112814634c410

    SHA512

    246287893fbe2b8ee6742ecda9423ce5965ecea330a148d08c15c00bf4c7b0180ccfbbb6f878035c6e56cfd86284dfa2995d3a6c70f727dd38d330cccc70fb84

  • C:\Users\Admin\yiejel.exe

    Filesize

    224KB

    MD5

    374f2d0b3c6d62ee188c14a611bc128f

    SHA1

    de901f3e97dd0232a6f1d2154ca6db4c91f4c43b

    SHA256

    6fb61d10108a02b9d82eecceaa44e45fd46d6b0179a0dafe13c112814634c410

    SHA512

    246287893fbe2b8ee6742ecda9423ce5965ecea330a148d08c15c00bf4c7b0180ccfbbb6f878035c6e56cfd86284dfa2995d3a6c70f727dd38d330cccc70fb84

  • \Users\Admin\yiejel.exe

    Filesize

    224KB

    MD5

    374f2d0b3c6d62ee188c14a611bc128f

    SHA1

    de901f3e97dd0232a6f1d2154ca6db4c91f4c43b

    SHA256

    6fb61d10108a02b9d82eecceaa44e45fd46d6b0179a0dafe13c112814634c410

    SHA512

    246287893fbe2b8ee6742ecda9423ce5965ecea330a148d08c15c00bf4c7b0180ccfbbb6f878035c6e56cfd86284dfa2995d3a6c70f727dd38d330cccc70fb84

  • \Users\Admin\yiejel.exe

    Filesize

    224KB

    MD5

    374f2d0b3c6d62ee188c14a611bc128f

    SHA1

    de901f3e97dd0232a6f1d2154ca6db4c91f4c43b

    SHA256

    6fb61d10108a02b9d82eecceaa44e45fd46d6b0179a0dafe13c112814634c410

    SHA512

    246287893fbe2b8ee6742ecda9423ce5965ecea330a148d08c15c00bf4c7b0180ccfbbb6f878035c6e56cfd86284dfa2995d3a6c70f727dd38d330cccc70fb84

  • memory/360-56-0x0000000075771000-0x0000000075773000-memory.dmp

    Filesize

    8KB

  • memory/360-57-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/360-66-0x0000000002950000-0x0000000002990000-memory.dmp

    Filesize

    256KB

  • memory/360-67-0x0000000002950000-0x0000000002990000-memory.dmp

    Filesize

    256KB

  • memory/360-69-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/968-60-0x0000000000000000-mapping.dmp

  • memory/968-68-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/968-70-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB