Resubmissions

13/02/2023, 07:54

230213-jryhwabg87 3

11/02/2021, 09:13

210211-y1csq58stn 1

Analysis

  • max time kernel
    104s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/02/2023, 07:54

General

  • Target

    yk.exe

  • Size

    1.6MB

  • MD5

    4bfc360791eda8959554af2239ee9d00

  • SHA1

    60ec9c4caeb1d9402862ee411c6d84bf923fcf09

  • SHA256

    1bfa8af4b51d9fc54d4baa49df27116f44ce269da9123625c1f2ba17289ea2cd

  • SHA512

    49e7389fe9c15cb532a33311062f006dd926a3e8ea85021ea6db611af8a78411f7a329a8ca583b4fc946e4fe5ee94e993e7c35a018610e53361dfbacba7076b8

  • SSDEEP

    49152:d7BOw4P8wVGhizV569oEZ9pEZF6AU4DNgzpUSJd4PjejDKZk2I:jOcwVGhizV5ZEvpEZF6AU4DKVJWPjejD

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 33 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\yk.exe
    "C:\Users\Admin\AppData\Local\Temp\yk.exe"
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:1460

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads