General
-
Target
yfga_game.exe
-
Size
46.7MB
-
Sample
240715-n64ewsyfjb
-
MD5
9d846a2d794eb4614b3d0feaa6f83259
-
SHA1
ff6d194172fa313b8921a80cecc84f470d8dc2d0
-
SHA256
cfd64f9ed065d19f7c488db3a8e29a553c9e61849b1d08765006110d73d3434b
-
SHA512
6a8115aa70bd1d0d0af474a2d9d5f4ad03e2fa09277a1f3f3e6063682329b1b42aeef206f4a74d2fb76cd12afe4daf0bd1571c26c7121741a782241d3d28b521
-
SSDEEP
786432:c7Ud58tChs1g2uzRx7KPB8NUc3sXEPeEwkHYvgctIKpJZXnfsrQl92Z3tHDUOsj1:4t96L76B0HkGUvgcaKpDPBl92HHDdsGy
Static task
static1
Behavioral task
behavioral1
Sample
yfga_game.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
yfga_game.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
yfga_game.exe
Resource
win11-20240709-en
Malware Config
Extracted
C:\Users\Admin\Desktop\yfga_game_dc152b52-85e4-4b09-861d-7d365833a691\@[email protected]
wannacry
115p7UMMngoj1pMvkpHijcRdfJNXj6LrLn
Extracted
C:\Users\Admin\Desktop\yfga_game_abc14401-340f-4e81-8547-6eafa4f991ee\@[email protected]
wannacry
13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94
Targets
-
-
Target
yfga_game.exe
-
Size
46.7MB
-
MD5
9d846a2d794eb4614b3d0feaa6f83259
-
SHA1
ff6d194172fa313b8921a80cecc84f470d8dc2d0
-
SHA256
cfd64f9ed065d19f7c488db3a8e29a553c9e61849b1d08765006110d73d3434b
-
SHA512
6a8115aa70bd1d0d0af474a2d9d5f4ad03e2fa09277a1f3f3e6063682329b1b42aeef206f4a74d2fb76cd12afe4daf0bd1571c26c7121741a782241d3d28b521
-
SSDEEP
786432:c7Ud58tChs1g2uzRx7KPB8NUc3sXEPeEwkHYvgctIKpJZXnfsrQl92Z3tHDUOsj1:4t96L76B0HkGUvgcaKpDPBl92HHDdsGy
-
Modifies visiblity of hidden/system files in Explorer
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Disables Task Manager via registry modification
-
Drops file in Drivers directory
-
Manipulates Digital Signatures
Attackers can apply techniques such as modifying certain DLL exports to make their binary seem valid.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
File and Directory Permissions Modification: Windows File and Directory Permissions Modification
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1