Analysis

  • max time kernel
    145s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-04-2023 19:12

General

  • Target

    Yagami 1.0/Yagami.exe

  • Size

    2.4MB

  • MD5

    952d820b9c648d4e7a70e4ae78701e4d

  • SHA1

    743693a3e7a6faa524438ce4ecab4bb424e54dfc

  • SHA256

    86314f1b1004e693ef2d1bbdb399fa9410f56d9daf68a77ae72d1b50f84a9f6c

  • SHA512

    91f55efa7a4215a58f78265212365f551d5329bfcf095e3512dbf1aa08ae380f5f2ab4144c4d9c2a08905a7ca3e9ad563230f6c144d853cbaa7ea3ba1f8324fd

  • SSDEEP

    49152:D89Sti9ZmME9zD0fx/ZZWGNh8bu3kR6Zj2G2mfFtjd4qwp14m8P4LHLKrCczISJ3:D8EME930fxRZWymbuURGz2mfFtjKqwpo

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Yagami 1.0\Yagami.exe
    "C:\Users\Admin\AppData\Local\Temp\Yagami 1.0\Yagami.exe"
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1596

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1596-133-0x0000000001010000-0x0000000001625000-memory.dmp

    Filesize

    6.1MB

  • memory/1596-135-0x0000000001010000-0x0000000001625000-memory.dmp

    Filesize

    6.1MB

  • memory/1596-140-0x0000000000400000-0x0000000000677000-memory.dmp

    Filesize

    2.5MB

  • memory/1596-141-0x0000000068A80000-0x0000000069044000-memory.dmp

    Filesize

    5.8MB

  • memory/1596-142-0x0000000061B40000-0x0000000062136000-memory.dmp

    Filesize

    6.0MB

  • memory/1596-143-0x000000006B680000-0x000000006B77C000-memory.dmp

    Filesize

    1008KB

  • memory/1596-144-0x000000006EB40000-0x000000006EB64000-memory.dmp

    Filesize

    144KB

  • memory/1596-145-0x0000000064B40000-0x0000000064B5B000-memory.dmp

    Filesize

    108KB

  • memory/1596-147-0x0000000069900000-0x0000000069AC1000-memory.dmp

    Filesize

    1.8MB

  • memory/1596-146-0x000000006FE40000-0x000000006FFBE000-memory.dmp

    Filesize

    1.5MB

  • memory/1596-148-0x0000000001010000-0x0000000001625000-memory.dmp

    Filesize

    6.1MB

  • memory/1596-149-0x0000000066540000-0x000000006659F000-memory.dmp

    Filesize

    380KB

  • memory/1596-150-0x000000006AA80000-0x000000006AC37000-memory.dmp

    Filesize

    1.7MB

  • memory/1596-151-0x00000000628C0000-0x0000000062905000-memory.dmp

    Filesize

    276KB

  • memory/1596-178-0x0000000061B40000-0x0000000062136000-memory.dmp

    Filesize

    6.0MB

  • memory/1596-189-0x0000000068A80000-0x0000000069044000-memory.dmp

    Filesize

    5.8MB

  • memory/1596-190-0x0000000061B40000-0x0000000062136000-memory.dmp

    Filesize

    6.0MB

  • memory/1596-196-0x0000000001010000-0x0000000001625000-memory.dmp

    Filesize

    6.1MB

  • memory/1596-198-0x000000006AA80000-0x000000006AC37000-memory.dmp

    Filesize

    1.7MB