Analysis

  • max time kernel
    141s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/08/2023, 18:58

General

  • Target

    yaya.sp.exe

  • Size

    37.1MB

  • MD5

    d44e5ac3e0e8945ecb7157957e296f18

  • SHA1

    0ce9a164680099da30d9894a682d5a7760894165

  • SHA256

    490183e200d1ea3c04c3fb18d19e3b600c03a6b28bb3619570c2e64bc9c1905e

  • SHA512

    9083a2ba995c44a793baac30ad90965ba1e244772056e8dd40a13810762c71de01729c9c0b5a397bcdce7019e6a4769c9d8c86dc75a279ef7ac900ba171ab66e

  • SSDEEP

    786432:TkpzYXiGpSX8a/66X4/C8L/plOg6q/TpFEB8e97K8TVTSn:AzvCSLzX/GDOg6Ke9+8TV

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\yaya.sp.exe
    "C:\Users\Admin\AppData\Local\Temp\yaya.sp.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:3740

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/3740-0-0x0000000000400000-0x00000000031C8000-memory.dmp

          Filesize

          45.8MB

        • memory/3740-1-0x0000000010000000-0x0000000010191000-memory.dmp

          Filesize

          1.6MB

        • memory/3740-5-0x0000000077652000-0x0000000077653000-memory.dmp

          Filesize

          4KB

        • memory/3740-6-0x0000000006B10000-0x0000000006B11000-memory.dmp

          Filesize

          4KB

        • memory/3740-7-0x0000000006B20000-0x0000000006B21000-memory.dmp

          Filesize

          4KB

        • memory/3740-8-0x0000000000400000-0x00000000031C8000-memory.dmp

          Filesize

          45.8MB