Analysis

  • max time kernel
    149s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25/03/2024, 13:57

General

  • Target

    de2c35223095306856442ebb7957a1ba.exe

  • Size

    172KB

  • MD5

    de2c35223095306856442ebb7957a1ba

  • SHA1

    92d0e743bbdc9fe8250c73fe1e55667c5d5c894b

  • SHA256

    b0e8425423458fad530b24589ea58c0fc9458d690cd235502e5aa16c4c76a670

  • SHA512

    0756bea5bceed98264b6d9455ac90ac59d8d0b821345c61e491d66c56800b765cec8b038150ce4b713aa3e25ce877974cd7a2f23cfe955f72473645345247b27

  • SSDEEP

    3072:eTVlB5QqiwcCA0laletdpVinzswyAQjh/gSF3Ef3ykQoz7WC4:qIqtc30l+2yzswyAQjh/gSF3Ef3ykQog

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\de2c35223095306856442ebb7957a1ba.exe
    "C:\Users\Admin\AppData\Local\Temp\de2c35223095306856442ebb7957a1ba.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2256
    • C:\Users\Admin\yiifa.exe
      "C:\Users\Admin\yiifa.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2068

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\yiifa.exe

    Filesize

    172KB

    MD5

    333baf5fe3fc48fb212e3d8eab257f4d

    SHA1

    10aa8a2a67e3b692d5170e369a49f92a73b0a6a3

    SHA256

    d84c174154a85d35941e033198883e65e6895f532cc0508431e08321194e1d4f

    SHA512

    eeb024e93a1d60d4dd89764d5daf4a9d2c705427e55370241f7a06fbf11c1ed8ed39a09f84f80753a34dd2c62d6279e53e7889dd97cce30c48a7cdaed22396ef