Analysis
-
max time kernel
300s -
max time network
280s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
06-11-2023 05:08
Behavioral task
behavioral1
Sample
ffad1db3679cbb413b1b72a358c986f37327530dddaf91f8feefaff59099b225.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
ffad1db3679cbb413b1b72a358c986f37327530dddaf91f8feefaff59099b225.exe
Resource
win10-20231020-en
General
-
Target
ffad1db3679cbb413b1b72a358c986f37327530dddaf91f8feefaff59099b225.exe
-
Size
3.2MB
-
MD5
f4ba796f39305262e65d0ebd9d0ee33e
-
SHA1
8b425d5af330f85ffd1f0cd3695046a44309fea6
-
SHA256
ffad1db3679cbb413b1b72a358c986f37327530dddaf91f8feefaff59099b225
-
SHA512
8e9298639fbdbfe1495acb3a2e481363403d80501ca383c4a28b4404ecbb26216ef07cb5525fe18124e82da80e0379577872368448c9c39b14d20096d447a05f
-
SSDEEP
49152:OlK6hZB6fbUdfVXiZgX/uvuV6YM2bt831GstdvlbROZuaK60ZsOz/C:GK6hQUNMZgPehs1sP7OZqZs
Malware Config
Signatures
-
Detects DLL dropped by Raspberry Robin. 1 IoCs
Raspberry Robin.
resource yara_rule behavioral1/memory/2872-33-0x00000000750A0000-0x00000000751B0000-memory.dmp Raspberry_Robin_DLL_MAY_2022 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 14 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Utsysc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ YKM.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Utsysc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ YKM.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ YKM.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Utsysc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ YKM.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Utsysc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ clips.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Utsysc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ YKM.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Utsysc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ YKM.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ffad1db3679cbb413b1b72a358c986f37327530dddaf91f8feefaff59099b225.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 28 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Utsysc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion YKM.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Utsysc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Utsysc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Utsysc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion YKM.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion clips.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion YKM.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Utsysc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion YKM.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion YKM.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion YKM.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion YKM.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Utsysc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Utsysc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion clips.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion YKM.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion YKM.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Utsysc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Utsysc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion YKM.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Utsysc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion YKM.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Utsysc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ffad1db3679cbb413b1b72a358c986f37327530dddaf91f8feefaff59099b225.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Utsysc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion YKM.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ffad1db3679cbb413b1b72a358c986f37327530dddaf91f8feefaff59099b225.exe -
Executes dropped EXE 14 IoCs
pid Process 2704 Utsysc.exe 380 clips.exe 764 mnr.exe 1952 YKM.exe 2288 YKM.exe 700 Utsysc.exe 2732 YKM.exe 2888 Utsysc.exe 1640 Utsysc.exe 2548 YKM.exe 2436 Utsysc.exe 1964 YKM.exe 2396 YKM.exe 1920 Utsysc.exe -
Loads dropped DLL 7 IoCs
pid Process 2872 ffad1db3679cbb413b1b72a358c986f37327530dddaf91f8feefaff59099b225.exe 2704 Utsysc.exe 2704 Utsysc.exe 2704 Utsysc.exe 2704 Utsysc.exe 1480 cmd.exe 1480 cmd.exe -
resource yara_rule behavioral1/memory/2872-0-0x0000000000B10000-0x0000000001295000-memory.dmp themida behavioral1/memory/2872-5-0x0000000000B10000-0x0000000001295000-memory.dmp themida behavioral1/memory/2872-8-0x0000000000B10000-0x0000000001295000-memory.dmp themida behavioral1/memory/2872-11-0x0000000000B10000-0x0000000001295000-memory.dmp themida behavioral1/memory/2872-17-0x0000000000B10000-0x0000000001295000-memory.dmp themida behavioral1/memory/2872-18-0x0000000000B10000-0x0000000001295000-memory.dmp themida behavioral1/memory/2872-19-0x0000000000B10000-0x0000000001295000-memory.dmp themida behavioral1/memory/2872-20-0x0000000000B10000-0x0000000001295000-memory.dmp themida behavioral1/memory/2872-21-0x0000000000B10000-0x0000000001295000-memory.dmp themida behavioral1/files/0x00070000000120ed-27.dat themida behavioral1/files/0x00070000000120ed-28.dat themida behavioral1/files/0x00070000000120ed-30.dat themida behavioral1/memory/2872-31-0x0000000000B10000-0x0000000001295000-memory.dmp themida behavioral1/memory/2704-42-0x0000000000ED0000-0x0000000001655000-memory.dmp themida behavioral1/memory/2704-45-0x0000000000ED0000-0x0000000001655000-memory.dmp themida behavioral1/memory/2704-47-0x0000000000ED0000-0x0000000001655000-memory.dmp themida behavioral1/memory/2704-49-0x0000000000ED0000-0x0000000001655000-memory.dmp themida behavioral1/memory/2704-53-0x0000000000ED0000-0x0000000001655000-memory.dmp themida behavioral1/memory/2704-51-0x0000000000ED0000-0x0000000001655000-memory.dmp themida behavioral1/memory/2704-40-0x0000000000ED0000-0x0000000001655000-memory.dmp themida behavioral1/memory/2704-63-0x0000000000ED0000-0x0000000001655000-memory.dmp themida behavioral1/files/0x00070000000120ed-64.dat themida behavioral1/memory/2704-65-0x0000000000ED0000-0x0000000001655000-memory.dmp themida behavioral1/files/0x0007000000015c66-78.dat themida behavioral1/files/0x0007000000015c66-84.dat themida behavioral1/files/0x0007000000015c66-86.dat themida behavioral1/files/0x0007000000015c66-90.dat themida behavioral1/memory/380-93-0x0000000000DA0000-0x00000000019F4000-memory.dmp themida behavioral1/memory/380-94-0x0000000000DA0000-0x00000000019F4000-memory.dmp themida behavioral1/memory/380-115-0x0000000000DA0000-0x00000000019F4000-memory.dmp themida behavioral1/memory/380-116-0x0000000000DA0000-0x00000000019F4000-memory.dmp themida behavioral1/memory/380-117-0x0000000000DA0000-0x00000000019F4000-memory.dmp themida behavioral1/memory/380-118-0x0000000000DA0000-0x00000000019F4000-memory.dmp themida behavioral1/memory/380-119-0x0000000000DA0000-0x00000000019F4000-memory.dmp themida behavioral1/files/0x0007000000015c66-120.dat themida behavioral1/memory/380-132-0x0000000000DA0000-0x00000000019F4000-memory.dmp themida behavioral1/memory/2704-135-0x0000000000ED0000-0x0000000001655000-memory.dmp themida behavioral1/files/0x0006000000015ea7-136.dat themida behavioral1/files/0x0006000000015ea7-137.dat themida behavioral1/files/0x0006000000015ea7-138.dat themida behavioral1/files/0x0006000000015ea7-140.dat themida behavioral1/memory/1952-142-0x0000000000E50000-0x0000000001AA4000-memory.dmp themida behavioral1/memory/1952-145-0x0000000000E50000-0x0000000001AA4000-memory.dmp themida behavioral1/memory/1952-151-0x0000000000E50000-0x0000000001AA4000-memory.dmp themida behavioral1/memory/1952-152-0x0000000000E50000-0x0000000001AA4000-memory.dmp themida behavioral1/memory/1952-153-0x0000000000E50000-0x0000000001AA4000-memory.dmp themida behavioral1/memory/1952-154-0x0000000000E50000-0x0000000001AA4000-memory.dmp themida behavioral1/memory/1952-155-0x0000000000E50000-0x0000000001AA4000-memory.dmp themida behavioral1/memory/1952-158-0x0000000000E50000-0x0000000001AA4000-memory.dmp themida behavioral1/memory/1952-159-0x0000000000E50000-0x0000000001AA4000-memory.dmp themida behavioral1/files/0x0006000000015ea7-162.dat themida behavioral1/memory/2288-164-0x0000000000E50000-0x0000000001AA4000-memory.dmp themida behavioral1/files/0x00070000000120ed-163.dat themida behavioral1/memory/2288-211-0x0000000000E50000-0x0000000001AA4000-memory.dmp themida behavioral1/memory/700-213-0x0000000000ED0000-0x0000000001655000-memory.dmp themida behavioral1/memory/700-214-0x0000000000ED0000-0x0000000001655000-memory.dmp themida behavioral1/memory/700-215-0x0000000000ED0000-0x0000000001655000-memory.dmp themida behavioral1/memory/700-216-0x0000000000ED0000-0x0000000001655000-memory.dmp themida behavioral1/memory/700-217-0x0000000000ED0000-0x0000000001655000-memory.dmp themida behavioral1/memory/700-218-0x0000000000ED0000-0x0000000001655000-memory.dmp themida behavioral1/memory/700-219-0x0000000000ED0000-0x0000000001655000-memory.dmp themida behavioral1/memory/700-220-0x0000000000ED0000-0x0000000001655000-memory.dmp themida behavioral1/memory/700-276-0x0000000000ED0000-0x0000000001655000-memory.dmp themida behavioral1/memory/2288-279-0x0000000000E50000-0x0000000001AA4000-memory.dmp themida -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Windows\CurrentVersion\Run\clips.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000001001\\clips.exe" Utsysc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Windows\CurrentVersion\Run\mnr.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000004001\\mnr.exe" Utsysc.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ffad1db3679cbb413b1b72a358c986f37327530dddaf91f8feefaff59099b225.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA YKM.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA YKM.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA YKM.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA clips.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Utsysc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Utsysc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA YKM.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Utsysc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Utsysc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Utsysc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA YKM.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Utsysc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA YKM.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 14 IoCs
pid Process 2872 ffad1db3679cbb413b1b72a358c986f37327530dddaf91f8feefaff59099b225.exe 2704 Utsysc.exe 380 clips.exe 1952 YKM.exe 700 Utsysc.exe 2288 YKM.exe 2888 Utsysc.exe 2732 YKM.exe 1640 Utsysc.exe 2548 YKM.exe 2436 Utsysc.exe 1964 YKM.exe 1920 Utsysc.exe 2396 YKM.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2680 schtasks.exe 832 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2772 timeout.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2872 ffad1db3679cbb413b1b72a358c986f37327530dddaf91f8feefaff59099b225.exe 2704 Utsysc.exe 764 mnr.exe 700 Utsysc.exe 2888 Utsysc.exe 1640 Utsysc.exe 2436 Utsysc.exe 1920 Utsysc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 764 mnr.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2872 ffad1db3679cbb413b1b72a358c986f37327530dddaf91f8feefaff59099b225.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2704 2872 ffad1db3679cbb413b1b72a358c986f37327530dddaf91f8feefaff59099b225.exe 28 PID 2872 wrote to memory of 2704 2872 ffad1db3679cbb413b1b72a358c986f37327530dddaf91f8feefaff59099b225.exe 28 PID 2872 wrote to memory of 2704 2872 ffad1db3679cbb413b1b72a358c986f37327530dddaf91f8feefaff59099b225.exe 28 PID 2872 wrote to memory of 2704 2872 ffad1db3679cbb413b1b72a358c986f37327530dddaf91f8feefaff59099b225.exe 28 PID 2872 wrote to memory of 2704 2872 ffad1db3679cbb413b1b72a358c986f37327530dddaf91f8feefaff59099b225.exe 28 PID 2872 wrote to memory of 2704 2872 ffad1db3679cbb413b1b72a358c986f37327530dddaf91f8feefaff59099b225.exe 28 PID 2872 wrote to memory of 2704 2872 ffad1db3679cbb413b1b72a358c986f37327530dddaf91f8feefaff59099b225.exe 28 PID 2704 wrote to memory of 2680 2704 Utsysc.exe 29 PID 2704 wrote to memory of 2680 2704 Utsysc.exe 29 PID 2704 wrote to memory of 2680 2704 Utsysc.exe 29 PID 2704 wrote to memory of 2680 2704 Utsysc.exe 29 PID 2704 wrote to memory of 380 2704 Utsysc.exe 33 PID 2704 wrote to memory of 380 2704 Utsysc.exe 33 PID 2704 wrote to memory of 380 2704 Utsysc.exe 33 PID 2704 wrote to memory of 380 2704 Utsysc.exe 33 PID 2704 wrote to memory of 764 2704 Utsysc.exe 34 PID 2704 wrote to memory of 764 2704 Utsysc.exe 34 PID 2704 wrote to memory of 764 2704 Utsysc.exe 34 PID 2704 wrote to memory of 764 2704 Utsysc.exe 34 PID 380 wrote to memory of 1480 380 clips.exe 35 PID 380 wrote to memory of 1480 380 clips.exe 35 PID 380 wrote to memory of 1480 380 clips.exe 35 PID 380 wrote to memory of 1480 380 clips.exe 35 PID 1480 wrote to memory of 2772 1480 cmd.exe 37 PID 1480 wrote to memory of 2772 1480 cmd.exe 37 PID 1480 wrote to memory of 2772 1480 cmd.exe 37 PID 1480 wrote to memory of 2772 1480 cmd.exe 37 PID 1480 wrote to memory of 1952 1480 cmd.exe 38 PID 1480 wrote to memory of 1952 1480 cmd.exe 38 PID 1480 wrote to memory of 1952 1480 cmd.exe 38 PID 1480 wrote to memory of 1952 1480 cmd.exe 38 PID 1952 wrote to memory of 832 1952 YKM.exe 40 PID 1952 wrote to memory of 832 1952 YKM.exe 40 PID 1952 wrote to memory of 832 1952 YKM.exe 40 PID 1952 wrote to memory of 832 1952 YKM.exe 40 PID 304 wrote to memory of 2288 304 taskeng.exe 45 PID 304 wrote to memory of 2288 304 taskeng.exe 45 PID 304 wrote to memory of 2288 304 taskeng.exe 45 PID 304 wrote to memory of 2288 304 taskeng.exe 45 PID 304 wrote to memory of 700 304 taskeng.exe 46 PID 304 wrote to memory of 700 304 taskeng.exe 46 PID 304 wrote to memory of 700 304 taskeng.exe 46 PID 304 wrote to memory of 700 304 taskeng.exe 46 PID 304 wrote to memory of 700 304 taskeng.exe 46 PID 304 wrote to memory of 700 304 taskeng.exe 46 PID 304 wrote to memory of 700 304 taskeng.exe 46 PID 304 wrote to memory of 2888 304 taskeng.exe 47 PID 304 wrote to memory of 2888 304 taskeng.exe 47 PID 304 wrote to memory of 2888 304 taskeng.exe 47 PID 304 wrote to memory of 2888 304 taskeng.exe 47 PID 304 wrote to memory of 2888 304 taskeng.exe 47 PID 304 wrote to memory of 2888 304 taskeng.exe 47 PID 304 wrote to memory of 2888 304 taskeng.exe 47 PID 304 wrote to memory of 2732 304 taskeng.exe 48 PID 304 wrote to memory of 2732 304 taskeng.exe 48 PID 304 wrote to memory of 2732 304 taskeng.exe 48 PID 304 wrote to memory of 2732 304 taskeng.exe 48 PID 304 wrote to memory of 2548 304 taskeng.exe 49 PID 304 wrote to memory of 2548 304 taskeng.exe 49 PID 304 wrote to memory of 2548 304 taskeng.exe 49 PID 304 wrote to memory of 2548 304 taskeng.exe 49 PID 304 wrote to memory of 1640 304 taskeng.exe 50 PID 304 wrote to memory of 1640 304 taskeng.exe 50 PID 304 wrote to memory of 1640 304 taskeng.exe 50
Processes
-
C:\Users\Admin\AppData\Local\Temp\ffad1db3679cbb413b1b72a358c986f37327530dddaf91f8feefaff59099b225.exe"C:\Users\Admin\AppData\Local\Temp\ffad1db3679cbb413b1b72a358c986f37327530dddaf91f8feefaff59099b225.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe"C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN Utsysc.exe /TR "C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe" /F3⤵
- Creates scheduled task(s)
PID:2680
-
-
C:\Users\Admin\AppData\Local\Temp\1000001001\clips.exe"C:\Users\Admin\AppData\Local\Temp\1000001001\clips.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:380 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\sak.0.bat" "4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\SysWOW64\timeout.exetimeout 35⤵
- Delays execution with timeout.exe
PID:2772
-
-
C:\ProgramData\SMUCCI\YKM.exe"C:\ProgramData\SMUCCI\YKM.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc MINUTE /mo 1 /RL HIGHEST /tn "YKM" /tr C:\ProgramData\SMUCCI\YKM.exe /f6⤵
- Creates scheduled task(s)
PID:832
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000004001\mnr.exe"C:\Users\Admin\AppData\Local\Temp\1000004001\mnr.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:764
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {368FFCAC-02B9-47CD-B347-44292F1B184C} S-1-5-21-3618187007-3650799920-3290345941-1000:BPDFUYWR\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:304 -
C:\ProgramData\SMUCCI\YKM.exeC:\ProgramData\SMUCCI\YKM.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2288
-
-
C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exeC:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:700
-
-
C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exeC:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2888
-
-
C:\ProgramData\SMUCCI\YKM.exeC:\ProgramData\SMUCCI\YKM.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2732
-
-
C:\ProgramData\SMUCCI\YKM.exeC:\ProgramData\SMUCCI\YKM.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2548
-
-
C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exeC:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1640
-
-
C:\ProgramData\SMUCCI\YKM.exeC:\ProgramData\SMUCCI\YKM.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1964
-
-
C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exeC:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2436
-
-
C:\ProgramData\SMUCCI\YKM.exeC:\ProgramData\SMUCCI\YKM.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2396
-
-
C:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exeC:\Users\Admin\AppData\Local\Temp\b64c58644b\Utsysc.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1920
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.8MB
MD5c6ae3bd0ab0e78257468cdab2b867707
SHA17ceaea50b3684b4fd5394da5bcdaf2b892f0aca2
SHA2560c45879e4f510d8eef11fb33154a26d2dae2e42ff1c78414f513643cd2a9bbd1
SHA512577edad006b29544fd9572cd79d414fb1a1633e3ab520d2b34a3cff37542628152807bc51bae875587f2958be9095247164dc45cdbceea921ca947116eb94dbd
-
Filesize
4.8MB
MD5c6ae3bd0ab0e78257468cdab2b867707
SHA17ceaea50b3684b4fd5394da5bcdaf2b892f0aca2
SHA2560c45879e4f510d8eef11fb33154a26d2dae2e42ff1c78414f513643cd2a9bbd1
SHA512577edad006b29544fd9572cd79d414fb1a1633e3ab520d2b34a3cff37542628152807bc51bae875587f2958be9095247164dc45cdbceea921ca947116eb94dbd
-
Filesize
4.8MB
MD5c6ae3bd0ab0e78257468cdab2b867707
SHA17ceaea50b3684b4fd5394da5bcdaf2b892f0aca2
SHA2560c45879e4f510d8eef11fb33154a26d2dae2e42ff1c78414f513643cd2a9bbd1
SHA512577edad006b29544fd9572cd79d414fb1a1633e3ab520d2b34a3cff37542628152807bc51bae875587f2958be9095247164dc45cdbceea921ca947116eb94dbd
-
Filesize
4.8MB
MD5c6ae3bd0ab0e78257468cdab2b867707
SHA17ceaea50b3684b4fd5394da5bcdaf2b892f0aca2
SHA2560c45879e4f510d8eef11fb33154a26d2dae2e42ff1c78414f513643cd2a9bbd1
SHA512577edad006b29544fd9572cd79d414fb1a1633e3ab520d2b34a3cff37542628152807bc51bae875587f2958be9095247164dc45cdbceea921ca947116eb94dbd
-
Filesize
4.8MB
MD5c6ae3bd0ab0e78257468cdab2b867707
SHA17ceaea50b3684b4fd5394da5bcdaf2b892f0aca2
SHA2560c45879e4f510d8eef11fb33154a26d2dae2e42ff1c78414f513643cd2a9bbd1
SHA512577edad006b29544fd9572cd79d414fb1a1633e3ab520d2b34a3cff37542628152807bc51bae875587f2958be9095247164dc45cdbceea921ca947116eb94dbd
-
Filesize
4.8MB
MD5c6ae3bd0ab0e78257468cdab2b867707
SHA17ceaea50b3684b4fd5394da5bcdaf2b892f0aca2
SHA2560c45879e4f510d8eef11fb33154a26d2dae2e42ff1c78414f513643cd2a9bbd1
SHA512577edad006b29544fd9572cd79d414fb1a1633e3ab520d2b34a3cff37542628152807bc51bae875587f2958be9095247164dc45cdbceea921ca947116eb94dbd
-
Filesize
4.8MB
MD5c6ae3bd0ab0e78257468cdab2b867707
SHA17ceaea50b3684b4fd5394da5bcdaf2b892f0aca2
SHA2560c45879e4f510d8eef11fb33154a26d2dae2e42ff1c78414f513643cd2a9bbd1
SHA512577edad006b29544fd9572cd79d414fb1a1633e3ab520d2b34a3cff37542628152807bc51bae875587f2958be9095247164dc45cdbceea921ca947116eb94dbd
-
Filesize
4.8MB
MD5c6ae3bd0ab0e78257468cdab2b867707
SHA17ceaea50b3684b4fd5394da5bcdaf2b892f0aca2
SHA2560c45879e4f510d8eef11fb33154a26d2dae2e42ff1c78414f513643cd2a9bbd1
SHA512577edad006b29544fd9572cd79d414fb1a1633e3ab520d2b34a3cff37542628152807bc51bae875587f2958be9095247164dc45cdbceea921ca947116eb94dbd
-
Filesize
4.8MB
MD5c6ae3bd0ab0e78257468cdab2b867707
SHA17ceaea50b3684b4fd5394da5bcdaf2b892f0aca2
SHA2560c45879e4f510d8eef11fb33154a26d2dae2e42ff1c78414f513643cd2a9bbd1
SHA512577edad006b29544fd9572cd79d414fb1a1633e3ab520d2b34a3cff37542628152807bc51bae875587f2958be9095247164dc45cdbceea921ca947116eb94dbd
-
Filesize
4.8MB
MD5c6ae3bd0ab0e78257468cdab2b867707
SHA17ceaea50b3684b4fd5394da5bcdaf2b892f0aca2
SHA2560c45879e4f510d8eef11fb33154a26d2dae2e42ff1c78414f513643cd2a9bbd1
SHA512577edad006b29544fd9572cd79d414fb1a1633e3ab520d2b34a3cff37542628152807bc51bae875587f2958be9095247164dc45cdbceea921ca947116eb94dbd
-
Filesize
2.8MB
MD56584c57539dd7f05013ecd3806683fb4
SHA1db5a75108f2185b2e0680ccebcadaa339e517f0b
SHA256b587f52032999910f4f2ba4fad3b734667be1ca93de36af283386af3fe4866e2
SHA512675ba382a41c5f00c42c28dd9767756b2db1aec4841ff84d2144e4b9f7b0b44e630a354f725bf51a49ea7aad377abedd7e6722abab2133ee893e93aab2b7d8e4
-
Filesize
2.8MB
MD56584c57539dd7f05013ecd3806683fb4
SHA1db5a75108f2185b2e0680ccebcadaa339e517f0b
SHA256b587f52032999910f4f2ba4fad3b734667be1ca93de36af283386af3fe4866e2
SHA512675ba382a41c5f00c42c28dd9767756b2db1aec4841ff84d2144e4b9f7b0b44e630a354f725bf51a49ea7aad377abedd7e6722abab2133ee893e93aab2b7d8e4
-
Filesize
2.8MB
MD56584c57539dd7f05013ecd3806683fb4
SHA1db5a75108f2185b2e0680ccebcadaa339e517f0b
SHA256b587f52032999910f4f2ba4fad3b734667be1ca93de36af283386af3fe4866e2
SHA512675ba382a41c5f00c42c28dd9767756b2db1aec4841ff84d2144e4b9f7b0b44e630a354f725bf51a49ea7aad377abedd7e6722abab2133ee893e93aab2b7d8e4
-
Filesize
3.2MB
MD5f4ba796f39305262e65d0ebd9d0ee33e
SHA18b425d5af330f85ffd1f0cd3695046a44309fea6
SHA256ffad1db3679cbb413b1b72a358c986f37327530dddaf91f8feefaff59099b225
SHA5128e9298639fbdbfe1495acb3a2e481363403d80501ca383c4a28b4404ecbb26216ef07cb5525fe18124e82da80e0379577872368448c9c39b14d20096d447a05f
-
Filesize
3.2MB
MD5f4ba796f39305262e65d0ebd9d0ee33e
SHA18b425d5af330f85ffd1f0cd3695046a44309fea6
SHA256ffad1db3679cbb413b1b72a358c986f37327530dddaf91f8feefaff59099b225
SHA5128e9298639fbdbfe1495acb3a2e481363403d80501ca383c4a28b4404ecbb26216ef07cb5525fe18124e82da80e0379577872368448c9c39b14d20096d447a05f
-
Filesize
3.2MB
MD5f4ba796f39305262e65d0ebd9d0ee33e
SHA18b425d5af330f85ffd1f0cd3695046a44309fea6
SHA256ffad1db3679cbb413b1b72a358c986f37327530dddaf91f8feefaff59099b225
SHA5128e9298639fbdbfe1495acb3a2e481363403d80501ca383c4a28b4404ecbb26216ef07cb5525fe18124e82da80e0379577872368448c9c39b14d20096d447a05f
-
Filesize
3.2MB
MD5f4ba796f39305262e65d0ebd9d0ee33e
SHA18b425d5af330f85ffd1f0cd3695046a44309fea6
SHA256ffad1db3679cbb413b1b72a358c986f37327530dddaf91f8feefaff59099b225
SHA5128e9298639fbdbfe1495acb3a2e481363403d80501ca383c4a28b4404ecbb26216ef07cb5525fe18124e82da80e0379577872368448c9c39b14d20096d447a05f
-
Filesize
3.2MB
MD5f4ba796f39305262e65d0ebd9d0ee33e
SHA18b425d5af330f85ffd1f0cd3695046a44309fea6
SHA256ffad1db3679cbb413b1b72a358c986f37327530dddaf91f8feefaff59099b225
SHA5128e9298639fbdbfe1495acb3a2e481363403d80501ca383c4a28b4404ecbb26216ef07cb5525fe18124e82da80e0379577872368448c9c39b14d20096d447a05f
-
Filesize
3.2MB
MD5f4ba796f39305262e65d0ebd9d0ee33e
SHA18b425d5af330f85ffd1f0cd3695046a44309fea6
SHA256ffad1db3679cbb413b1b72a358c986f37327530dddaf91f8feefaff59099b225
SHA5128e9298639fbdbfe1495acb3a2e481363403d80501ca383c4a28b4404ecbb26216ef07cb5525fe18124e82da80e0379577872368448c9c39b14d20096d447a05f
-
Filesize
3.2MB
MD5f4ba796f39305262e65d0ebd9d0ee33e
SHA18b425d5af330f85ffd1f0cd3695046a44309fea6
SHA256ffad1db3679cbb413b1b72a358c986f37327530dddaf91f8feefaff59099b225
SHA5128e9298639fbdbfe1495acb3a2e481363403d80501ca383c4a28b4404ecbb26216ef07cb5525fe18124e82da80e0379577872368448c9c39b14d20096d447a05f
-
Filesize
3.2MB
MD5f4ba796f39305262e65d0ebd9d0ee33e
SHA18b425d5af330f85ffd1f0cd3695046a44309fea6
SHA256ffad1db3679cbb413b1b72a358c986f37327530dddaf91f8feefaff59099b225
SHA5128e9298639fbdbfe1495acb3a2e481363403d80501ca383c4a28b4404ecbb26216ef07cb5525fe18124e82da80e0379577872368448c9c39b14d20096d447a05f
-
Filesize
167B
MD5ffa0b90ec1ee7d31b3824b0799156deb
SHA1b86c767681ac5ab573d2d5aefc03c8e9b2748c50
SHA256c09fa7477abefc632ddc6d113222001d20554444f9a3e478d2806b439f64e87d
SHA5127cc3f048205777f9c3aa492ead5f10e9bdb0f959b9a27a74d09932d5855fda93182d27e6f242f0ca368f03c0b9dc2ed0199294cb5155c01604b31aadfe29f457
-
Filesize
167B
MD5ffa0b90ec1ee7d31b3824b0799156deb
SHA1b86c767681ac5ab573d2d5aefc03c8e9b2748c50
SHA256c09fa7477abefc632ddc6d113222001d20554444f9a3e478d2806b439f64e87d
SHA5127cc3f048205777f9c3aa492ead5f10e9bdb0f959b9a27a74d09932d5855fda93182d27e6f242f0ca368f03c0b9dc2ed0199294cb5155c01604b31aadfe29f457
-
Filesize
4.8MB
MD5c6ae3bd0ab0e78257468cdab2b867707
SHA17ceaea50b3684b4fd5394da5bcdaf2b892f0aca2
SHA2560c45879e4f510d8eef11fb33154a26d2dae2e42ff1c78414f513643cd2a9bbd1
SHA512577edad006b29544fd9572cd79d414fb1a1633e3ab520d2b34a3cff37542628152807bc51bae875587f2958be9095247164dc45cdbceea921ca947116eb94dbd
-
Filesize
4.8MB
MD5c6ae3bd0ab0e78257468cdab2b867707
SHA17ceaea50b3684b4fd5394da5bcdaf2b892f0aca2
SHA2560c45879e4f510d8eef11fb33154a26d2dae2e42ff1c78414f513643cd2a9bbd1
SHA512577edad006b29544fd9572cd79d414fb1a1633e3ab520d2b34a3cff37542628152807bc51bae875587f2958be9095247164dc45cdbceea921ca947116eb94dbd
-
Filesize
4.8MB
MD5c6ae3bd0ab0e78257468cdab2b867707
SHA17ceaea50b3684b4fd5394da5bcdaf2b892f0aca2
SHA2560c45879e4f510d8eef11fb33154a26d2dae2e42ff1c78414f513643cd2a9bbd1
SHA512577edad006b29544fd9572cd79d414fb1a1633e3ab520d2b34a3cff37542628152807bc51bae875587f2958be9095247164dc45cdbceea921ca947116eb94dbd
-
Filesize
4.8MB
MD5c6ae3bd0ab0e78257468cdab2b867707
SHA17ceaea50b3684b4fd5394da5bcdaf2b892f0aca2
SHA2560c45879e4f510d8eef11fb33154a26d2dae2e42ff1c78414f513643cd2a9bbd1
SHA512577edad006b29544fd9572cd79d414fb1a1633e3ab520d2b34a3cff37542628152807bc51bae875587f2958be9095247164dc45cdbceea921ca947116eb94dbd
-
Filesize
2.8MB
MD56584c57539dd7f05013ecd3806683fb4
SHA1db5a75108f2185b2e0680ccebcadaa339e517f0b
SHA256b587f52032999910f4f2ba4fad3b734667be1ca93de36af283386af3fe4866e2
SHA512675ba382a41c5f00c42c28dd9767756b2db1aec4841ff84d2144e4b9f7b0b44e630a354f725bf51a49ea7aad377abedd7e6722abab2133ee893e93aab2b7d8e4
-
Filesize
2.8MB
MD56584c57539dd7f05013ecd3806683fb4
SHA1db5a75108f2185b2e0680ccebcadaa339e517f0b
SHA256b587f52032999910f4f2ba4fad3b734667be1ca93de36af283386af3fe4866e2
SHA512675ba382a41c5f00c42c28dd9767756b2db1aec4841ff84d2144e4b9f7b0b44e630a354f725bf51a49ea7aad377abedd7e6722abab2133ee893e93aab2b7d8e4
-
Filesize
3.2MB
MD5f4ba796f39305262e65d0ebd9d0ee33e
SHA18b425d5af330f85ffd1f0cd3695046a44309fea6
SHA256ffad1db3679cbb413b1b72a358c986f37327530dddaf91f8feefaff59099b225
SHA5128e9298639fbdbfe1495acb3a2e481363403d80501ca383c4a28b4404ecbb26216ef07cb5525fe18124e82da80e0379577872368448c9c39b14d20096d447a05f