Analysis

  • max time kernel
    152s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-12-2022 09:21

General

  • Target

    c92fb58efe88fdfee65ab9a6d984a53f363990f0b226162dbf8a78a801fb758a.exe

  • Size

    240KB

  • MD5

    ce0327c98ec502c910367d7744ed7229

  • SHA1

    4620acb837ce07d78f2f1db967f572d02da8c7fc

  • SHA256

    c92fb58efe88fdfee65ab9a6d984a53f363990f0b226162dbf8a78a801fb758a

  • SHA512

    c16b4e2f27f38fe9c527094bcbf89a3af1e84dd1bc368d520122fb7fbac10fb5793d38c0839e98a156715404d40ed1de1402ea96ac8772731ed0d8827ad772af

  • SSDEEP

    6144:BWb3dwqsNTNEXGlQR58EqxF6snji81RUinKq3aEESliDvi:BWLdQKjeaEEpe

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c92fb58efe88fdfee65ab9a6d984a53f363990f0b226162dbf8a78a801fb758a.exe
    "C:\Users\Admin\AppData\Local\Temp\c92fb58efe88fdfee65ab9a6d984a53f363990f0b226162dbf8a78a801fb758a.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2564
    • C:\Users\Admin\yyxoaq.exe
      "C:\Users\Admin\yyxoaq.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:208

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\yyxoaq.exe

    Filesize

    240KB

    MD5

    04434f3df390619ee1318993e443d8b8

    SHA1

    b734c76fc2e64ed353445a9fcb29b9ec367dd30b

    SHA256

    db210f83ebaadd18ade2b22ad05ee643aaf01c3f69cc6dff5f2103da896a1fe9

    SHA512

    56abfe28f1ed6a357db3e7cf6ff37c6ebdf4e1f2b198f04e4a8da3648ce3d6857f00bfe4a0e32bc5d384aee5a53e86e9cd1801ee1e6f86cf90f8352dc5c863de

  • C:\Users\Admin\yyxoaq.exe

    Filesize

    240KB

    MD5

    04434f3df390619ee1318993e443d8b8

    SHA1

    b734c76fc2e64ed353445a9fcb29b9ec367dd30b

    SHA256

    db210f83ebaadd18ade2b22ad05ee643aaf01c3f69cc6dff5f2103da896a1fe9

    SHA512

    56abfe28f1ed6a357db3e7cf6ff37c6ebdf4e1f2b198f04e4a8da3648ce3d6857f00bfe4a0e32bc5d384aee5a53e86e9cd1801ee1e6f86cf90f8352dc5c863de

  • memory/208-134-0x0000000000000000-mapping.dmp