General
-
Target
yfga_game.exe
-
Size
46.7MB
-
Sample
240715-n278aaxhmd
-
MD5
9d846a2d794eb4614b3d0feaa6f83259
-
SHA1
ff6d194172fa313b8921a80cecc84f470d8dc2d0
-
SHA256
cfd64f9ed065d19f7c488db3a8e29a553c9e61849b1d08765006110d73d3434b
-
SHA512
6a8115aa70bd1d0d0af474a2d9d5f4ad03e2fa09277a1f3f3e6063682329b1b42aeef206f4a74d2fb76cd12afe4daf0bd1571c26c7121741a782241d3d28b521
-
SSDEEP
786432:c7Ud58tChs1g2uzRx7KPB8NUc3sXEPeEwkHYvgctIKpJZXnfsrQl92Z3tHDUOsj1:4t96L76B0HkGUvgcaKpDPBl92HHDdsGy
Static task
static1
Behavioral task
behavioral1
Sample
yfga_game.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
yfga_game.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
yfga_game.exe
Resource
win11-20240709-en
Malware Config
Extracted
C:\Users\Admin\Desktop\yfga_game_dcd76740-bd0c-4f03-9cd6-cfe0538b65cd\@[email protected]
wannacry
115p7UMMngoj1pMvkpHijcRdfJNXj6LrLn
Extracted
C:\Users\Admin\Desktop\yfga_game_96f6e4e4-863c-462c-89e2-f48695740ae1\@[email protected]
wannacry
13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94
Targets
-
-
Target
yfga_game.exe
-
Size
46.7MB
-
MD5
9d846a2d794eb4614b3d0feaa6f83259
-
SHA1
ff6d194172fa313b8921a80cecc84f470d8dc2d0
-
SHA256
cfd64f9ed065d19f7c488db3a8e29a553c9e61849b1d08765006110d73d3434b
-
SHA512
6a8115aa70bd1d0d0af474a2d9d5f4ad03e2fa09277a1f3f3e6063682329b1b42aeef206f4a74d2fb76cd12afe4daf0bd1571c26c7121741a782241d3d28b521
-
SSDEEP
786432:c7Ud58tChs1g2uzRx7KPB8NUc3sXEPeEwkHYvgctIKpJZXnfsrQl92Z3tHDUOsj1:4t96L76B0HkGUvgcaKpDPBl92HHDdsGy
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Disables Task Manager via registry modification
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-
File and Directory Permissions Modification: Windows File and Directory Permissions Modification
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1