Analysis

  • max time kernel
    151s
  • max time network
    131s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/12/2022, 09:14

General

  • Target

    f5409128bde9c06dbd832bf833868d786ff46769e6f16971b579f735f2f910d4.exe

  • Size

    192KB

  • MD5

    004918ec7b16999ede2e98283bc6ff57

  • SHA1

    18d6a56675b8851fe1e96a169caa689ff5e653a8

  • SHA256

    f5409128bde9c06dbd832bf833868d786ff46769e6f16971b579f735f2f910d4

  • SHA512

    b10f3005fd9af68dac554436ea19336d12d9858174eaca8d4ae2b39bcdf17225f167b8de5e7b72381c7367752571faf0fd4528a77e6695017371f806553f4acd

  • SSDEEP

    3072:PJ1ZuCWv2JQcFBKBJy6apbuD2VMbj1hlUywVbo9lk:PxBWvUFIJlapu2V21r/di

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 54 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f5409128bde9c06dbd832bf833868d786ff46769e6f16971b579f735f2f910d4.exe
    "C:\Users\Admin\AppData\Local\Temp\f5409128bde9c06dbd832bf833868d786ff46769e6f16971b579f735f2f910d4.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3440
    • C:\Users\Admin\yiidaa.exe
      "C:\Users\Admin\yiidaa.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1848

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\yiidaa.exe

          Filesize

          192KB

          MD5

          2dc50c0ede761ada5e3851fb7b08b1fa

          SHA1

          cd5cf6de981c1f3ebcf6f715e01c95341723867f

          SHA256

          e4c4e2396732036ce075b0f436978f87b0ab9c15b9b55131f24835cbf14408f1

          SHA512

          4d3fe4bc37c1e03f2ac67f640d641d8a7406352ffbee4db01017915e22e47239fee99ad7b0953244868a3a13758866ec57abecb76952bac6b694956eb1bb3126

        • C:\Users\Admin\yiidaa.exe

          Filesize

          192KB

          MD5

          2dc50c0ede761ada5e3851fb7b08b1fa

          SHA1

          cd5cf6de981c1f3ebcf6f715e01c95341723867f

          SHA256

          e4c4e2396732036ce075b0f436978f87b0ab9c15b9b55131f24835cbf14408f1

          SHA512

          4d3fe4bc37c1e03f2ac67f640d641d8a7406352ffbee4db01017915e22e47239fee99ad7b0953244868a3a13758866ec57abecb76952bac6b694956eb1bb3126