URL:

https://pendrivelinux.com/yumi-multiboot-usb-creator/

Full analysis: https://app.any.run/tasks/94c8c98d-f1c2-4104-b389-79df99857434
Verdict: Malicious activity
Analysis date: November 02, 2023, 15:32:11
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
SHA1:

B81CB8D8F9C2E35956BB7EB301985AED04555DDD

SHA256:

251E814186CAE2D94DA2F102785330CEBBB2C1C4D9B009A471C2F5712690364A

SSDEEP:

3:N8EhLGK3cOItfG3ttlERMK:2EhyGcStPEt

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • YUMI-exFAT-1.0.2.4.exe (PID: 4032)
      • YUMI-exFAT-1.0.2.4.exe (PID: 292)
      • YUMI-exFAT-1.0.2.4.exe (PID: 3040)
  • SUSPICIOUS

    • Reads the Internet Settings

      • YUMI-exFAT-1.0.2.4.exe (PID: 4032)
      • YUMI-exFAT-1.0.2.4.exe (PID: 292)
      • YUMI-exFAT-1.0.2.4.exe (PID: 3040)
    • Checks Windows Trust Settings

      • YUMI-exFAT-1.0.2.4.exe (PID: 4032)
      • YUMI-exFAT-1.0.2.4.exe (PID: 292)
      • YUMI-exFAT-1.0.2.4.exe (PID: 3040)
    • Reads security settings of Internet Explorer

      • YUMI-exFAT-1.0.2.4.exe (PID: 4032)
      • YUMI-exFAT-1.0.2.4.exe (PID: 292)
      • YUMI-exFAT-1.0.2.4.exe (PID: 3040)
    • Reads settings of System Certificates

      • YUMI-exFAT-1.0.2.4.exe (PID: 4032)
      • YUMI-exFAT-1.0.2.4.exe (PID: 292)
      • YUMI-exFAT-1.0.2.4.exe (PID: 3040)
    • Adds/modifies Windows certificates

      • iexplore.exe (PID: 3440)
    • Drops 7-zip archiver for unpacking

      • YUMI-exFAT-1.0.2.4.exe (PID: 4032)
      • YUMI-exFAT-1.0.2.4.exe (PID: 292)
      • YUMI-exFAT-1.0.2.4.exe (PID: 3040)
    • The process creates files with name similar to system file names

      • YUMI-exFAT-1.0.2.4.exe (PID: 4032)
      • YUMI-exFAT-1.0.2.4.exe (PID: 292)
    • Malware-specific behavior (creating "System.dll" in Temp)

      • YUMI-exFAT-1.0.2.4.exe (PID: 4032)
      • YUMI-exFAT-1.0.2.4.exe (PID: 292)
  • INFO

    • Application launched itself

      • iexplore.exe (PID: 3440)
    • Reads the machine GUID from the registry

      • wmpnscfg.exe (PID: 3516)
      • YUMI-exFAT-1.0.2.4.exe (PID: 4032)
      • YUMI-exFAT-1.0.2.4.exe (PID: 292)
      • YUMI-exFAT-1.0.2.4.exe (PID: 3040)
    • Checks supported languages

      • wmpnscfg.exe (PID: 3516)
      • YUMI-exFAT-1.0.2.4.exe (PID: 4032)
      • YUMI-exFAT-1.0.2.4.exe (PID: 292)
      • YUMI-exFAT-1.0.2.4.exe (PID: 3040)
    • Manual execution by a user

      • wmpnscfg.exe (PID: 3516)
      • explorer.exe (PID: 788)
      • YUMI-exFAT-1.0.2.4.exe (PID: 292)
      • YUMI-exFAT-1.0.2.4.exe (PID: 3040)
    • Reads the computer name

      • wmpnscfg.exe (PID: 3516)
      • YUMI-exFAT-1.0.2.4.exe (PID: 4032)
      • YUMI-exFAT-1.0.2.4.exe (PID: 292)
      • YUMI-exFAT-1.0.2.4.exe (PID: 3040)
    • Create files in a temporary directory

      • YUMI-exFAT-1.0.2.4.exe (PID: 4032)
      • YUMI-exFAT-1.0.2.4.exe (PID: 292)
      • YUMI-exFAT-1.0.2.4.exe (PID: 3040)
    • The process uses the downloaded file

      • iexplore.exe (PID: 3440)
    • Checks proxy server information

      • YUMI-exFAT-1.0.2.4.exe (PID: 4032)
      • YUMI-exFAT-1.0.2.4.exe (PID: 292)
      • YUMI-exFAT-1.0.2.4.exe (PID: 3040)
    • Drops the executable file immediately after the start

      • iexplore.exe (PID: 3440)
      • iexplore.exe (PID: 3196)
    • Creates files or folders in the user directory

      • YUMI-exFAT-1.0.2.4.exe (PID: 292)
      • YUMI-exFAT-1.0.2.4.exe (PID: 3040)
      • YUMI-exFAT-1.0.2.4.exe (PID: 4032)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
61
Monitored processes
8
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe wmpnscfg.exe no specs yumi-exfat-1.0.2.4.exe no specs yumi-exfat-1.0.2.4.exe explorer.exe no specs yumi-exfat-1.0.2.4.exe yumi-exfat-1.0.2.4.exe

Process information

PID
CMD
Path
Indicators
Parent process
292"C:\Users\admin\Desktop\YUMI-exFAT-1.0.2.4.exe" C:\Users\admin\Desktop\YUMI-exFAT-1.0.2.4.exe
explorer.exe
User:
admin
Company:
pendrivelinux.com
Integrity Level:
HIGH
Description:
YUMI exFAT : Your USB MultiBoot Installer
Exit code:
0
Version:
1.0.2.4
Modules
Images
c:\users\admin\desktop\yumi-exfat-1.0.2.4.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
788"C:\Windows\explorer.exe" C:\Windows\explorer.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
3040"C:\Users\admin\Desktop\YUMI-exFAT-1.0.2.4.exe" C:\Users\admin\Desktop\YUMI-exFAT-1.0.2.4.exe
explorer.exe
User:
admin
Company:
pendrivelinux.com
Integrity Level:
HIGH
Description:
YUMI exFAT : Your USB MultiBoot Installer
Exit code:
0
Version:
1.0.2.4
Modules
Images
c:\users\admin\desktop\yumi-exfat-1.0.2.4.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
3196"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3440 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
3440"C:\Program Files\Internet Explorer\iexplore.exe" "https://pendrivelinux.com/yumi-multiboot-usb-creator/"C:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
3516"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\ole32.dll
4032"C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PO2HN1X2\YUMI-exFAT-1.0.2.4.exe" C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PO2HN1X2\YUMI-exFAT-1.0.2.4.exe
iexplore.exe
User:
admin
Company:
pendrivelinux.com
Integrity Level:
HIGH
Description:
YUMI exFAT : Your USB MultiBoot Installer
Exit code:
1
Version:
1.0.2.4
Modules
Images
c:\users\admin\appdata\local\microsoft\windows\temporary internet files\content.ie5\po2hn1x2\yumi-exfat-1.0.2.4.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
4044"C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PO2HN1X2\YUMI-exFAT-1.0.2.4.exe" C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PO2HN1X2\YUMI-exFAT-1.0.2.4.exeiexplore.exe
User:
admin
Company:
pendrivelinux.com
Integrity Level:
MEDIUM
Description:
YUMI exFAT : Your USB MultiBoot Installer
Exit code:
3221226540
Version:
1.0.2.4
Modules
Images
c:\users\admin\appdata\local\microsoft\windows\temporary internet files\content.ie5\po2hn1x2\yumi-exfat-1.0.2.4.exe
c:\windows\system32\ntdll.dll
Total events
34 936
Read events
34 702
Write events
227
Delete events
7

Modification events

(PID) Process:(3440) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
0
(PID) Process:(3440) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
30847387
(PID) Process:(3440) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30847437
(PID) Process:(3440) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(3440) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(3440) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(3440) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(3440) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
4600000059010000090000000000000000000000000000000400000000000000C0E333BBEAB1D3010000000000000000000000000100000002000000C0A8016B000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(3440) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(3440) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
Executable files
28
Suspicious files
93
Text files
184
Unknown types
1

Dropped files

PID
Process
Filename
Type
3196iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Tar7EDC.tmpbinary
MD5:9441737383D21192400ECA82FDA910EC
SHA256:BC3A6E84E41FAEB57E7C21AA3B60C2A64777107009727C5B7C0ED8FE658909E5
3196iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\OSDA4WYL.txttext
MD5:D0F17CD711F4C7AF28334763BDA816C4
SHA256:88C29993AC2E4F71A098729BCE899921A023889832EDC62864A5F9C3A0BBF6B3
3196iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506binary
MD5:0EA1FC5AE31FB7F56526939C3FB37C1B
SHA256:1C018000C2B75C8A97D0E0A7942C428ECC650BAE82B1B29B5442F661F6F833F2
3196iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:8BC01F1089F13556B64CBCF0926467D2
SHA256:763EE0A0EEF83871043510C30CDC5106DF53DB613B6ECCA55EDB335C3D396500
3196iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751binary
MD5:E4B4DD89A9640B56E4D97A256C322E13
SHA256:AF2CB97DFF6AE9813EDD23C6430C466766E1B944817FCBC26969F5B75BF2D660
3196iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\4H7RWK7O.txttext
MD5:CF0C7FB567F3347A6655B0FE7C52F378
SHA256:3A99999CC76A0823F5E6C81B6DEA6EA65830BA9736BD760093AA6E3C53D5161C
3196iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Cab7EDB.tmpcompressed
MD5:F3441B8572AAE8801C04F3060B550443
SHA256:6720349E7D82EE0A8E73920D3C2B7CB2912D9FCF2EDB6FD98F2F12820158B0BF
3196iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\1B1495DD322A24490E2BF2FAABAE1C61binary
MD5:DEC6BBE308EB44937F77160A25EE32DB
SHA256:68A71DE28F488586C2B169F4652347E0A1FD632D48A6D6725393607BFA18BC7E
3196iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\4PTEHWFB.txttext
MD5:3458C072A05542EA5B823ADB98501593
SHA256:BAB3603F8C81ED7C7665E04121E52956A211F80928664DC42F398020049D4BE1
3196iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1B1495DD322A24490E2BF2FAABAE1C61binary
MD5:CA9C04A9256D19DAE57E41FD5AFA3E72
SHA256:EA1F78078C0F5DE0F6E590803C44BE3E322088691AC51E2DA172BEEC8AD62F47
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
20
TCP/UDP connections
59
DNS requests
26
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3196
iexplore.exe
GET
200
8.241.123.126:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?24ee352ddd3d4dea
US
compressed
4.66 Kb
unknown
3196
iexplore.exe
GET
200
172.217.18.99:80
http://ocsp.pki.goog/gtsr1/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBQwkcLWD4LqGJ7bE7B1XZsEbmfwUAQU5K8rJnEaK0gnhS9SZizv8IkTcT4CDQIDvFCjJ1PwkYAi7fE%3D
US
binary
724 b
unknown
3196
iexplore.exe
GET
200
8.241.123.126:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?7f22e41b60d8fd96
US
compressed
61.6 Kb
unknown
3196
iexplore.exe
GET
200
23.197.120.82:80
http://x2.c.lencr.org/
US
binary
300 b
unknown
3196
iexplore.exe
GET
200
8.241.123.126:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?d6bb2ad0af14907d
US
compressed
4.66 Kb
unknown
3196
iexplore.exe
GET
200
8.241.123.126:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?a3e161be64fd9a79
US
compressed
61.6 Kb
unknown
3196
iexplore.exe
GET
200
23.60.200.134:80
http://x1.c.lencr.org/
DE
binary
717 b
unknown
3196
iexplore.exe
GET
200
172.217.18.99:80
http://ocsp.pki.goog/gsr1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCEHe9DWzbNvka6iEPxPBY0w0%3D
US
binary
1.41 Kb
unknown
3196
iexplore.exe
GET
200
172.217.18.99:80
http://ocsp.pki.goog/gtsr1/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBQwkcLWD4LqGJ7bE7B1XZsEbmfwUAQU5K8rJnEaK0gnhS9SZizv8IkTcT4CDQIDvFNZazTHGPUBUGY%3D
US
binary
724 b
unknown
3196
iexplore.exe
GET
200
172.217.18.99:80
http://ocsp.pki.goog/gtsr1/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBQwkcLWD4LqGJ7bE7B1XZsEbmfwUAQU5K8rJnEaK0gnhS9SZizv8IkTcT4CDQIDvFCjJ1PwkYAi7fE%3D
US
binary
724 b
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown
4
System
192.168.100.255:138
whitelisted
3196
iexplore.exe
172.67.145.16:443
pendrivelinux.com
CLOUDFLARENET
US
unknown
2588
svchost.exe
239.255.255.250:1900
whitelisted
3196
iexplore.exe
8.241.123.126:80
ctldl.windowsupdate.com
LEVEL3
US
unknown
3196
iexplore.exe
23.60.200.134:80
x1.c.lencr.org
AKAMAI-AS
DE
unknown
3196
iexplore.exe
23.197.120.82:80
x2.c.lencr.org
Akamai International B.V.
US
unknown
3196
iexplore.exe
172.67.144.62:443
privacy.gatekeeperconsent.com
CLOUDFLARENET
US
unknown
3196
iexplore.exe
216.58.212.168:443
www.googletagmanager.com
GOOGLE
US
whitelisted

DNS requests

Domain
IP
Reputation
pendrivelinux.com
  • 104.21.73.137
  • 172.67.145.16
unknown
ctldl.windowsupdate.com
  • 8.241.123.126
  • 67.27.234.126
  • 8.248.149.254
  • 8.241.123.254
  • 67.26.75.254
whitelisted
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
x1.c.lencr.org
  • 23.60.200.134
whitelisted
x2.c.lencr.org
  • 23.197.120.82
whitelisted
privacy.gatekeeperconsent.com
  • 172.67.144.62
  • 104.21.28.48
unknown
www.googletagmanager.com
  • 216.58.212.168
whitelisted
ezodn.com
  • 172.64.136.15
  • 172.64.137.15
whitelisted
the.gatekeeperconsent.com
  • 172.67.144.62
  • 104.21.28.48
unknown

Threats

No threats detected
No debug info