VTI Score 75 / 100 | |
VTI Database Version | 2.2 |
VTI Rule Match Count | 23 |
VTI Rule Type | Default (PE, ...) |
Anti Analysis | ||
Try to detect virtual machine | ||
Possibly trying to detect VM via rdtsc. | ||
OS | ||
Modify system configuration | ||
Disable the display of hidden files and folders. | ||
Modify system security configuration | ||
Disable UAC notification. | ||
PE | ||
Drop PE file | ||
Drop file "c:\users\wi2yhmti onvscy7pe\ayooemee\xumiasww.exe". | ||
Drop file "c:\programdata\vmymsigm\yoummieo.exe". | ||
Drop file "c:\programdata\baieaacu\xuaecwog.exe". | ||
Execute dropped PE file | ||
Execute dropped file "c:\users\wi2yhmti onvscy7pe\ayooemee\xumiasww.exe". | ||
Execute dropped file "c:\programdata\vmymsigm\yoummieo.exe". | ||
Execute dropped file "c:\programdata\baieaacu\xuaecwog.exe". | ||
Persistence | ||
Install system startup script or application | ||
Add "C:\Users\WI2yhmtI onvScY7Pe\ayooEMEE\XuMIAsww.exe" to windows startup via registry. | ||
Add "C:\ProgramData\VmYMsIgM\YOUMMIEo.exe" to windows startup via registry. | ||
Add "C:\Windows\system32\userinit.exe,C:\ProgramData\VmYMsIgM\YOUMMIEo.exe," to windows startup via registry. | ||
Add "C:\ProgramData\VmYMsIgM\YOUMMIEo.exe," to windows startup via registry. | ||
Install system service | ||
Install service "cEMAEwpb" by CreateServiceW. | ||
Process | ||
Allocate a page with write and execute permissions | ||
Allocate a page with "PAGE_EXECUTE_READWRITE" permissions, often used to dynamically unpack code. | ||
Create system object | ||
Create mutex with name "AsEwIwsA". | ||
Create mutex with name "TYAckMgs". | ||
Create process with hidden window | ||
The process "C:\Users\WI2yhmtI onvScY7Pe\ayooEMEE\XuMIAsww.exe" starts with hidden window. | ||
The process "C:\ProgramData\VmYMsIgM\YOUMMIEo.exe" starts with hidden window. | ||
The process "C:\Users\WI2YHM~1\AppData\Local\Temp\dWAAskwo.bat" starts with hidden window. | ||
The process "reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1" starts with hidden window. | ||
The process "reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2" starts with hidden window. | ||
The process "reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f" starts with hidden window. | ||
- | Browser | |
- | Device | |
- | File System | |
- | Hide Tracks | |
- | Information Stealing | |
- | Injection | |
- | Kernel | |
- | Masquerade | |
- | Network | |
- | VBA Macro | |
- | YARA |