Overview
overview
3Static
static
3YuukiPS.zip
windows10-2004-x64
1BouncyCast...to.dll
windows10-2004-x64
1BrotliSharpLib.dll
windows10-2004-x64
1DiscordRPC.dll
windows10-2004-x64
1Downloader.dll
windows10-2004-x64
1ICSharpCod...ib.dll
windows10-2004-x64
1Memory.dll
windows10-2004-x64
1MetadataConverter.dll
windows10-2004-x64
1Newtonsoft.Json.dll
windows10-2004-x64
1RestSharp.dll
windows10-2004-x64
1System.Management.dll
windows10-2004-x64
1Titanium.W...xy.dll
windows10-2004-x64
1YuukiPS.deps.json
windows10-2004-x64
3YuukiPS.exe
windows10-2004-x64
1YuukiPS.dll.config
windows10-2004-x64
3YuukiPS.exe
windows10-2004-x64
1YuukiPS.ru...g.json
windows10-2004-x64
3runtimes/w...nt.dll
windows10-2004-x64
1Analysis
-
max time kernel
143s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
26-09-2023 18:46
Static task
static1
Behavioral task
behavioral1
Sample
YuukiPS.zip
Resource
win10v2004-20230915-en
Behavioral task
behavioral2
Sample
BouncyCastle.Crypto.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral3
Sample
BrotliSharpLib.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral4
Sample
DiscordRPC.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral5
Sample
Downloader.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral6
Sample
ICSharpCode.SharpZipLib.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral7
Sample
Memory.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral8
Sample
MetadataConverter.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral9
Sample
Newtonsoft.Json.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral10
Sample
RestSharp.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral11
Sample
System.Management.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral12
Sample
Titanium.Web.Proxy.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral13
Sample
YuukiPS.deps.json
Resource
win10v2004-20230915-en
Behavioral task
behavioral14
Sample
YuukiPS.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral15
Sample
YuukiPS.dll.config
Resource
win10v2004-20230915-en
Behavioral task
behavioral16
Sample
YuukiPS.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral17
Sample
YuukiPS.runtimeconfig.json
Resource
win10v2004-20230915-en
Behavioral task
behavioral18
Sample
runtimes/win/lib/net6.0/System.Management.dll
Resource
win10v2004-20230915-en
General
-
Target
YuukiPS.deps.json
-
Size
9KB
-
MD5
5b8057823ff2d46a95984693c91d24fb
-
SHA1
6960aa7eeb28f19d56328b26d5917e3601d6d132
-
SHA256
77a066cee60114250da11de0c108adb1fb2904abc1a4f83bac2760cabbd22c26
-
SHA512
7ce9e42ca25821f1961b8735bb4eef7c26ac0844a32538a82632273fca200b5de054d601e28e5429fae980f6f6277737abd9323a7d851ac52fce77e7534bac92
-
SSDEEP
96:YCwNLaJyM3FPzkt1r13YOWqhZ54RU7HLcfXfEKfdVUsXBMWWEg++ONBxabNOOtP9:YjL2VPzC/3Y38IB4O9abPArVw
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
Processes:
cmd.exeOpenWith.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
OpenWith.exepid process 4440 OpenWith.exe