Overview
overview
7Static
static
3yx_dts.exe
windows7-x64
7yx_dts.exe
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3dts.exe
windows7-x64
3dts.exe
windows10-2004-x64
3iconAnimate.exe
windows7-x64
3iconAnimate.exe
windows10-2004-x64
3iconTips.exe
windows7-x64
3iconTips.exe
windows10-2004-x64
3uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/inetc.dll
windows7-x64
3$PLUGINSDIR/inetc.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3Analysis
-
max time kernel
94s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 14:00
Static task
static1
Behavioral task
behavioral1
Sample
yx_dts.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
yx_dts.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
dts.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
dts.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
iconAnimate.exe
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
iconAnimate.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
iconTips.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
iconTips.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
uninst.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
uninst.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win7-20240729-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/inetc.dll
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/inetc.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20241007-en
General
-
Target
yx_dts.exe
-
Size
889KB
-
MD5
09ce8089df9c73890dd0569c053e10c5
-
SHA1
ca150d526dc7bf9161b8b9da4617ff461d5ae9d9
-
SHA256
d6ac9b5838aad1062ed759ee201e77e07314a0434a9236c6f8b54363e79c541b
-
SHA512
414c80288666d609740956aec1f999d07412ee1998574da2374847a46137d828d4b42917c50ab167272313e802da03099bdb6d3518812fa307640c960cf8df6c
-
SSDEEP
24576:4617vD7Kv8d4lXdcGs3KAh++8JS7+Jrmzo8t:4G7L+TY73l58JS7CKoy
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation yx_dts.exe -
Executes dropped EXE 3 IoCs
pid Process 1968 dts.exe 4012 dts.exe 3360 dts.exe -
Loads dropped DLL 3 IoCs
pid Process 2152 yx_dts.exe 2152 yx_dts.exe 2152 yx_dts.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 dts.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yx_dts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dts.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 2152 yx_dts.exe 2152 yx_dts.exe 3360 dts.exe 3360 dts.exe 3360 dts.exe 3360 dts.exe 3360 dts.exe 3360 dts.exe 3360 dts.exe 3360 dts.exe 3360 dts.exe 3360 dts.exe 3360 dts.exe 3360 dts.exe 3360 dts.exe 3360 dts.exe 3360 dts.exe 3360 dts.exe 3360 dts.exe 3360 dts.exe 3360 dts.exe 3360 dts.exe 3360 dts.exe 3360 dts.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1968 dts.exe 1968 dts.exe 4012 dts.exe 4012 dts.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2152 wrote to memory of 1968 2152 yx_dts.exe 84 PID 2152 wrote to memory of 1968 2152 yx_dts.exe 84 PID 2152 wrote to memory of 1968 2152 yx_dts.exe 84 PID 2152 wrote to memory of 4012 2152 yx_dts.exe 85 PID 2152 wrote to memory of 4012 2152 yx_dts.exe 85 PID 2152 wrote to memory of 4012 2152 yx_dts.exe 85 PID 2152 wrote to memory of 3360 2152 yx_dts.exe 86 PID 2152 wrote to memory of 3360 2152 yx_dts.exe 86 PID 2152 wrote to memory of 3360 2152 yx_dts.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\yx_dts.exe"C:\Users\Admin\AppData\Local\Temp\yx_dts.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Users\Admin\AppData\Roaming\dts\mydts\dts.exe"C:\Users\Admin\AppData\Roaming\dts\mydts\dts.exe" SW_SHOWNORMAL2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1968
-
-
C:\Users\Admin\AppData\Roaming\dts\mydts\dts.exe"C:\Users\Admin\AppData\Roaming\dts\mydts\dts.exe" /autorun /setuprun2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4012
-
-
C:\Users\Admin\AppData\Roaming\dts\mydts\dts.exe"C:\Users\Admin\AppData\Roaming\dts\mydts\dts.exe" /setupsucc2⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3360
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD58614c450637267afacad1645e23ba24a
SHA1e7b7b09b5bbc13e910aa36316d9cc5fc5d4dcdc2
SHA2560fa04f06a6de18d316832086891e9c23ae606d7784d5d5676385839b21ca2758
SHA512af46cd679097584ff9a1d894a729b6397f4b3af17dff3e6f07bef257bc7e48ffa341d82daf298616cd5df1450fc5ab7435cacb70f27302b6db193f01a9f8391b
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
414B
MD573c7eb1e201cadcdfc9263d8e3d982b5
SHA1c896dc8fbe566a5f37247c13d236ee4ad6872730
SHA256632bd324dde38adff24c540f99a53d92c2c5ca3c021aff411d4230f70ea7afab
SHA5125129838fd8c75bfaea668a8a6b433b6b6fd4ba166bed3b822cab2883b72f01cbe1c305435d444bea9c3c485b7e9e8d3779452eda17387cb78af48118ea6e85ee
-
Filesize
446B
MD57b0ad132ee8a6e2eab029203b15b8d57
SHA1f06f6fea5f627c08d5aa45355459c906a6765e71
SHA2569c2c35947f62bba1639afa80c683c6fb38800b91c7ddf2b7a28e6ae2b463c388
SHA512b2b09a1b755a79f894c12cc86c7155441bcc5085a4a9071ae450efdecda775b9b160fca977e4bd0e4bd223ac7364d3f6c183655cd41a6da4d50a56d3908c6bb2
-
Filesize
843KB
MD5d0e6bfcf97bc61745ba68118df26b971
SHA1cc3696f5722ee55acddadd8ca5495294d47ae455
SHA25623b94fb2952b692f6e8e7dbd2bb4ae013cb4ad2c0b99066a2538d5c73b4a4216
SHA5120c9106d4c9414e54c7c19d8a11b441fd1bfb013e02d5990c7acc5c5c3b73b1a3efd8effd5a98fa5c54033a80b33605f5324084ccb497130ffb366dd44ac80e09
-
Filesize
383B
MD548fd2ead551dbd2a88e7c8b1d5ecf506
SHA14844fae2d49135936a063b41087601dc22c54e9a
SHA256b9a7bb9b824a7903b508c3ea1f5128ab098fdaf849b3978549637bf60611073e
SHA51225644b00513f3a234ce3386ddda7acae2b3a0cb6dbd51c8cbc811e929462553e336659c18684d1e3fcf8d3d0d001e897c15060f7eefc07859dff116b7a2a5681