Analysis
-
max time kernel
133s -
max time network
143s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
24-06-2024 10:56
Behavioral task
behavioral1
Sample
Yashma ransomware builder v1.2.exe
Resource
win10-20240404-en
General
-
Target
Yashma ransomware builder v1.2.exe
-
Size
538KB
-
MD5
13e878ed7e547523cffc5728f6ba4190
-
SHA1
878ad3025f8ea6b61ad4521782035963b3675a52
-
SHA256
f9a5a72ead096594c5d59abe706e3716f6000c3b4ebd7690f2eb114a37d1a7db
-
SHA512
a7fa4f14deb65aa8de18e37e4fba3d2fa6ed696b70c4d0f1f49a65a4d43da76eff0d9a9c4703a6e3c13a37eb5d1a427e43be8c0ea6b1288a50a1c5175d9392c7
-
SSDEEP
3072:tq0G/vqRT5i2YcRVm16Pn690H7GMgXuD//bFLAkCgkUKEyF9aT5Zt19r+E1/bFLz:U0G/GiWm16YaGMVFLQdD8FLz
Malware Config
Signatures
-
Chaos
Ransomware family first seen in June 2021.
-
Chaos Ransomware 1 IoCs
resource yara_rule behavioral1/memory/1340-1-0x0000000000C80000-0x0000000000D0C000-memory.dmp family_chaos -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\rescache\_merged\4272278488\2581520266.pri SecHealthUI.exe File created C:\Windows\rescache\_merged\4272278488\2581520266.pri SecHealthUI.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 1340 Yashma ransomware builder v1.2.exe 1340 Yashma ransomware builder v1.2.exe 1340 Yashma ransomware builder v1.2.exe 1340 Yashma ransomware builder v1.2.exe 1340 Yashma ransomware builder v1.2.exe 1340 Yashma ransomware builder v1.2.exe 1340 Yashma ransomware builder v1.2.exe 1340 Yashma ransomware builder v1.2.exe 1340 Yashma ransomware builder v1.2.exe 1340 Yashma ransomware builder v1.2.exe 1340 Yashma ransomware builder v1.2.exe 1340 Yashma ransomware builder v1.2.exe 1340 Yashma ransomware builder v1.2.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1340 Yashma ransomware builder v1.2.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2692 SecHealthUI.exe 3856 SecHealthUI.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Yashma ransomware builder v1.2.exe"C:\Users\Admin\AppData\Local\Temp\Yashma ransomware builder v1.2.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1340
-
C:\Windows\SystemApps\Microsoft.Windows.SecHealthUI_cw5n1h2txyewy\SecHealthUI.exe"C:\Windows\SystemApps\Microsoft.Windows.SecHealthUI_cw5n1h2txyewy\SecHealthUI.exe" -ServerName:SecHealthUI.AppXep4x2tbtjws1v9qqs0rmb3hxykvkpqtn.mca1⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:2692
-
C:\Windows\SystemApps\Microsoft.Windows.SecHealthUI_cw5n1h2txyewy\SecHealthUI.exe"C:\Windows\SystemApps\Microsoft.Windows.SecHealthUI_cw5n1h2txyewy\SecHealthUI.exe" -ServerName:SecHealthUI.AppXep4x2tbtjws1v9qqs0rmb3hxykvkpqtn.mca1⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:3856
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Packages\microsoft.windows.sechealthui_cw5n1h2txyewy\AC\Microsoft\Windows\4272278488\2581520266.pri
Filesize70KB
MD5dc37deff2947a4ec8bf9b40a3dc25c49
SHA1422bdce2dc21c634760c8b06a60c4ebf131cc592
SHA25600dee1b03565baf7c105f1484f27a2e04d900538c153372482fbedd8cde61d85
SHA512bbe9730344e0f648c53d2d5c518791ce8d92c1f04e1b9646bb4feca24d5f41fae255eff57ad7c36ff1d26869ad25eede25bbd4e98a59267d41ee71f3885d9dd4