Analysis

  • max time kernel
    153s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-12-2022 09:43

General

  • Target

    92ffc602883a88c9990ca947980f941987813412c0746050cf4c86c2872cbf3f.exe

  • Size

    276KB

  • MD5

    0af5789e9bdb2a01d155406cc7881ef0

  • SHA1

    d1a8a15913a6f1f4086501a4eccd11a061c92612

  • SHA256

    92ffc602883a88c9990ca947980f941987813412c0746050cf4c86c2872cbf3f

  • SHA512

    e11624190e095ebeef31026a2b813eb93d1d22e822fe93948917cb7422cdb5153de6d57b5135f7846898fdd984c8025589150c539ce673d5c2475cfb1f555c7e

  • SSDEEP

    6144:tUmkhRQaX/m7bfTWaxAQ9aLb+Kf6+2/MKsjh9Bqas5Ti3q/VlgAd:thkhRQaX/m7bfTWaVKf52/MKsjh90aQB

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 55 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\92ffc602883a88c9990ca947980f941987813412c0746050cf4c86c2872cbf3f.exe
    "C:\Users\Admin\AppData\Local\Temp\92ffc602883a88c9990ca947980f941987813412c0746050cf4c86c2872cbf3f.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4956
    • C:\Users\Admin\yuzel.exe
      "C:\Users\Admin\yuzel.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4652

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\yuzel.exe

    Filesize

    276KB

    MD5

    602b5d8b84cd5e7f40df668589da386a

    SHA1

    7726cdd527a136c209c1ea4bdd1040ec3d346552

    SHA256

    eb3e23ca1a5ee64307972ff3725c80a7e525fe4b81c4539b8658dd7cfc3c7b94

    SHA512

    54c5124e0b8cf068a0f112aead6da2e8753be81dbac1ea9dd77adece6fb4255f6da4cfe9f1bad15cfe1d61f2ebc01871ff30a9932c7e5d932242cbdc5373e5b0

  • C:\Users\Admin\yuzel.exe

    Filesize

    276KB

    MD5

    602b5d8b84cd5e7f40df668589da386a

    SHA1

    7726cdd527a136c209c1ea4bdd1040ec3d346552

    SHA256

    eb3e23ca1a5ee64307972ff3725c80a7e525fe4b81c4539b8658dd7cfc3c7b94

    SHA512

    54c5124e0b8cf068a0f112aead6da2e8753be81dbac1ea9dd77adece6fb4255f6da4cfe9f1bad15cfe1d61f2ebc01871ff30a9932c7e5d932242cbdc5373e5b0

  • memory/4652-134-0x0000000000000000-mapping.dmp