Overview
overview
10Static
static
10Payload/Yo...lderis
windows7-x64
1Payload/Yo...strate
windows7-x64
1Payload/Yo...elp.js
windows7-x64
1Payload/Yo...mework
windows7-x64
1Payload/Yo...ler.js
windows7-x64
1Payload/Yo...t.html
windows7-x64
1Payload/Yo...t.html
windows7-x64
1Payload/Yo...ser.js
windows7-x64
1Payload/Yo...ser.js
windows7-x64
1Payload/Yo...ent.js
windows7-x64
1Payload/Yo....dylib
windows7-x64
3Payload/Yo....dylib
windows7-x64
3Payload/Yo....dylib
windows7-x64
3Payload/Yo....dylib
windows7-x64
3Payload/Yo....dylib
windows7-x64
3Payload/Yo....dylib
windows7-x64
3Payload/Yo....dylib
windows7-x64
3Payload/Yo....dylib
windows7-x64
3Payload/Yo....dylib
windows7-x64
3Payload/Yo...ed_ios
windows7-x64
1Payload/Yo...fo.xml
windows7-x64
1Payload/Yo...ension
windows7-x64
1Payload/Yo...ension
windows7-x64
1Payload/Yo...ension
windows7-x64
1Payload/Yo...ension
windows7-x64
1Payload/Yo...ension
windows7-x64
1Payload/Yo...ouTube
windows7-x64
1Payload/Yo...fig.js
windows7-x64
1Payload/Yo...fig.js
windows7-x64
1Payload/Yo...fig.js
windows7-x64
1Payload/Yo...to_.js
windows7-x64
1Payload/Yo...237.js
windows7-x64
1Analysis
-
max time kernel
1803s -
max time network
1608s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
06-02-2023 15:57
Behavioral task
behavioral1
Sample
Payload/YouTube.app/Frameworks/Alderis.framework/Alderis
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
Payload/YouTube.app/Frameworks/CydiaSubstrate.framework/CydiaSubstrate
Resource
win7-20221111-en
Behavioral task
behavioral3
Sample
Payload/YouTube.app/Frameworks/Module_Framework.framework/GHKContactUsResources.bundle/get_help.js
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
Payload/YouTube.app/Frameworks/Module_Framework.framework/Module_Framework
Resource
win7-20221111-en
Behavioral task
behavioral5
Sample
Payload/YouTube.app/Frameworks/Module_Framework.framework/RedirectLandingMessageHandler.js
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
Payload/YouTube.app/Frameworks/Module_Framework.framework/SUPSupportContentResources.bundle/ColorThemedCSSFormat.html
Resource
win7-20221111-en
Behavioral task
behavioral7
Sample
Payload/YouTube.app/Frameworks/Module_Framework.framework/SUPSupportContentResources.bundle/RenderedContentFormat.html
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
Payload/YouTube.app/Frameworks/Module_Framework.framework/SUPSupportContentResources.bundle/SearchResultsParser.js
Resource
win7-20220812-en
Behavioral task
behavioral9
Sample
Payload/YouTube.app/Frameworks/Module_Framework.framework/SUPSupportContentResources.bundle/SurveyContactFormParser.js
Resource
win7-20220901-en
Behavioral task
behavioral10
Sample
Payload/YouTube.app/Frameworks/Module_Framework.framework/WebViewComponent.js
Resource
win7-20220812-en
Behavioral task
behavioral11
Sample
Payload/YouTube.app/Frameworks/YTABGoodies.dylib
Resource
win7-20221111-en
Behavioral task
behavioral12
Sample
Payload/YouTube.app/Frameworks/YTReExplore.dylib
Resource
win7-20221111-en
Behavioral task
behavioral13
Sample
Payload/YouTube.app/Frameworks/YTShortsProgress.dylib
Resource
win7-20220812-en
Behavioral task
behavioral14
Sample
Payload/YouTube.app/Frameworks/YTUHD.dylib
Resource
win7-20221111-en
Behavioral task
behavioral15
Sample
Payload/YouTube.app/Frameworks/YouTubeDislikesReturn.dylib
Resource
win7-20220812-en
Behavioral task
behavioral16
Sample
Payload/YouTube.app/Frameworks/YouTubeReborn.dylib
Resource
win7-20220901-en
Behavioral task
behavioral17
Sample
Payload/YouTube.app/Frameworks/fixYouTubeLogin.dylib
Resource
win7-20220812-en
Behavioral task
behavioral18
Sample
Payload/YouTube.app/Frameworks/iSponsorBlock.dylib
Resource
win7-20221111-en
Behavioral task
behavioral19
Sample
Payload/YouTube.app/Frameworks/libcolorpicker.dylib
Resource
win7-20221111-en
Behavioral task
behavioral20
Sample
Payload/YouTube.app/Frameworks/widevine_cdm_secured_ios.framework/widevine_cdm_secured_ios
Resource
win7-20220812-en
Behavioral task
behavioral21
Sample
Payload/YouTube.app/Info.xml
Resource
win7-20221111-en
Behavioral task
behavioral22
Sample
Payload/YouTube.app/PlugIns/BroadcastUIExtension.appex/BroadcastUIExtension
Resource
win7-20220901-en
Behavioral task
behavioral23
Sample
Payload/YouTube.app/PlugIns/BroadcastUploadExtension.appex/BroadcastUploadExtension
Resource
win7-20220812-en
Behavioral task
behavioral24
Sample
Payload/YouTube.app/PlugIns/MessagesExtension.appex/MessagesExtension
Resource
win7-20221111-en
Behavioral task
behavioral25
Sample
Payload/YouTube.app/PlugIns/NotificationContentExtension.appex/NotificationContentExtension
Resource
win7-20220812-en
Behavioral task
behavioral26
Sample
Payload/YouTube.app/PlugIns/NotificationServiceExtension.appex/NotificationServiceExtension
Resource
win7-20220812-en
Behavioral task
behavioral27
Sample
Payload/YouTube.app/YouTube
Resource
win7-20221111-en
Behavioral task
behavioral28
Sample
Payload/YouTube.app/mainapp_filegroup/392940140_js_module_config.js
Resource
win7-20221111-en
Behavioral task
behavioral29
Sample
Payload/YouTube.app/mainapp_filegroup/427043361_js_module_config.js
Resource
win7-20220901-en
Behavioral task
behavioral30
Sample
Payload/YouTube.app/mainapp_filegroup/42_js_module_config.js
Resource
win7-20220812-en
Behavioral task
behavioral31
Sample
Payload/YouTube.app/mainapp_filegroup/_srs_resources_main_app_eml_bundle_-819589501/playlist_add_to_.js
Resource
win7-20220901-en
Behavioral task
behavioral32
Sample
Payload/YouTube.app/mainapp_filegroup/_srs_resources_main_app_eml_bundle_-819589501/root_d5415560901eb237.js
Resource
win7-20221111-en
General
-
Target
Payload/YouTube.app/Frameworks/YTUHD.dylib
-
Size
65KB
-
MD5
f472c8ac20cd90c8f830b16714aa32f7
-
SHA1
804447374bd7226ca2161015acd7c238714429ed
-
SHA256
157246e3f7e1ba56bfff0d5b2ec3b56da8ced39451d1832c3ef5c1732a698208
-
SHA512
b562e567f68b665df16987525a8b785d5129cbffce13abc247b4782ed27f248170c50d84e321727975bd99f378fad99e932daf23b06e81cf88b9789487fc27a3
-
SSDEEP
192:IAh1Wm9tFpPAAT3s4FHfF2CRV6HBh5J48tmtcYXahm2:IAh797rT3s4FHfMCH67Ftmtc
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 10 IoCs
Processes:
rundll32.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000_CLASSES\dylib_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000_CLASSES\.dylib\ = "dylib_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000_CLASSES\dylib_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000_CLASSES\dylib_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000_CLASSES\dylib_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000_CLASSES\.dylib rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000_CLASSES\dylib_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000_CLASSES\dylib_auto_file\shell rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid process 1384 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
AcroRd32.exepid process 1384 AcroRd32.exe 1384 AcroRd32.exe 1384 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.exerundll32.exedescription pid process target process PID 1348 wrote to memory of 368 1348 cmd.exe rundll32.exe PID 1348 wrote to memory of 368 1348 cmd.exe rundll32.exe PID 1348 wrote to memory of 368 1348 cmd.exe rundll32.exe PID 368 wrote to memory of 1384 368 rundll32.exe AcroRd32.exe PID 368 wrote to memory of 1384 368 rundll32.exe AcroRd32.exe PID 368 wrote to memory of 1384 368 rundll32.exe AcroRd32.exe PID 368 wrote to memory of 1384 368 rundll32.exe AcroRd32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Payload\YouTube.app\Frameworks\YTUHD.dylib1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Payload\YouTube.app\Frameworks\YTUHD.dylib2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Payload\YouTube.app\Frameworks\YTUHD.dylib"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx