Analysis

  • max time kernel
    133s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    16/04/2023, 19:12

General

  • Target

    Yagami 1.0/Yagami.exe

  • Size

    2.4MB

  • MD5

    952d820b9c648d4e7a70e4ae78701e4d

  • SHA1

    743693a3e7a6faa524438ce4ecab4bb424e54dfc

  • SHA256

    86314f1b1004e693ef2d1bbdb399fa9410f56d9daf68a77ae72d1b50f84a9f6c

  • SHA512

    91f55efa7a4215a58f78265212365f551d5329bfcf095e3512dbf1aa08ae380f5f2ab4144c4d9c2a08905a7ca3e9ad563230f6c144d853cbaa7ea3ba1f8324fd

  • SSDEEP

    49152:D89Sti9ZmME9zD0fx/ZZWGNh8bu3kR6Zj2G2mfFtjd4qwp14m8P4LHLKrCczISJ3:D8EME930fxRZWymbuURGz2mfFtjKqwpo

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Yagami 1.0\Yagami.exe
    "C:\Users\Admin\AppData\Local\Temp\Yagami 1.0\Yagami.exe"
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1856
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x558
    1⤵
      PID:1876

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1856-54-0x0000000000AA0000-0x00000000010B5000-memory.dmp

      Filesize

      6.1MB

    • memory/1856-56-0x0000000000AA0000-0x00000000010B5000-memory.dmp

      Filesize

      6.1MB

    • memory/1856-61-0x0000000000400000-0x0000000000677000-memory.dmp

      Filesize

      2.5MB

    • memory/1856-62-0x0000000068A80000-0x0000000069044000-memory.dmp

      Filesize

      5.8MB

    • memory/1856-63-0x000000006EB40000-0x000000006EB64000-memory.dmp

      Filesize

      144KB

    • memory/1856-64-0x0000000064B40000-0x0000000064B5B000-memory.dmp

      Filesize

      108KB

    • memory/1856-65-0x000000006FE40000-0x000000006FFBE000-memory.dmp

      Filesize

      1.5MB

    • memory/1856-66-0x0000000061B40000-0x0000000062136000-memory.dmp

      Filesize

      6.0MB

    • memory/1856-67-0x000000006B680000-0x000000006B77C000-memory.dmp

      Filesize

      1008KB

    • memory/1856-68-0x0000000069900000-0x0000000069AC1000-memory.dmp

      Filesize

      1.8MB

    • memory/1856-69-0x0000000000AA0000-0x00000000010B5000-memory.dmp

      Filesize

      6.1MB

    • memory/1856-70-0x0000000066540000-0x000000006659F000-memory.dmp

      Filesize

      380KB

    • memory/1856-71-0x000000006AA80000-0x000000006AC37000-memory.dmp

      Filesize

      1.7MB

    • memory/1856-72-0x00000000628C0000-0x0000000062905000-memory.dmp

      Filesize

      276KB

    • memory/1856-73-0x0000000000400000-0x0000000000677000-memory.dmp

      Filesize

      2.5MB

    • memory/1856-74-0x0000000068A80000-0x0000000069044000-memory.dmp

      Filesize

      5.8MB

    • memory/1856-75-0x000000006EB40000-0x000000006EB64000-memory.dmp

      Filesize

      144KB

    • memory/1856-76-0x0000000064B40000-0x0000000064B5B000-memory.dmp

      Filesize

      108KB

    • memory/1856-78-0x0000000061B40000-0x0000000062136000-memory.dmp

      Filesize

      6.0MB

    • memory/1856-81-0x0000000000AA0000-0x00000000010B5000-memory.dmp

      Filesize

      6.1MB

    • memory/1856-82-0x0000000066540000-0x000000006659F000-memory.dmp

      Filesize

      380KB

    • memory/1856-83-0x000000006AA80000-0x000000006AC37000-memory.dmp

      Filesize

      1.7MB

    • memory/1856-102-0x0000000061B40000-0x0000000062136000-memory.dmp

      Filesize

      6.0MB