Analysis
-
max time kernel
130s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
27/06/2023, 04:17
Static task
static1
Behavioral task
behavioral1
Sample
yarrdisassembly.asm
Resource
win7-20230621-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
yarrdisassembly.asm
Resource
win10v2004-20230621-en
3 signatures
150 seconds
General
-
Target
yarrdisassembly.asm
-
Size
31KB
-
MD5
8ea62c10ca63e43c4bfdd892b24c4648
-
SHA1
9fda74b764b6c8f94488221e0ea9cc31e951a0c5
-
SHA256
74fe00e6fdc73fc082553e31b9038969df858ae93e099465f15bdf071b4e2c18
-
SHA512
e92b1d0f3dfa5cd63d8a961e5320d5841896f74702142a934ca754d70412178bde8a45cdeb9031b4be1f417822013f0e6de59e342f9422f3417f8bad62258845
-
SSDEEP
768:dIK9zE2X3nmhKiXPN0MX+I98KA4XOrNNrO2kbNs:dIK9zE2X3nmhKi/N0MX+I9DOrNNrOZbm
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1437583205-2177757337-340526699-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1316 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1244 wrote to memory of 1316 1244 cmd.exe 29 PID 1244 wrote to memory of 1316 1244 cmd.exe 29 PID 1244 wrote to memory of 1316 1244 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\yarrdisassembly.asm1⤵
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\yarrdisassembly.asm2⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:1316
-