Overview
overview
10Static
static
10Payload/Yo...lderis
windows7-x64
1Payload/Yo...strate
windows7-x64
1Payload/Yo...elp.js
windows7-x64
1Payload/Yo...mework
windows7-x64
1Payload/Yo...ler.js
windows7-x64
1Payload/Yo...t.html
windows7-x64
1Payload/Yo...t.html
windows7-x64
1Payload/Yo...ser.js
windows7-x64
1Payload/Yo...ser.js
windows7-x64
1Payload/Yo...ent.js
windows7-x64
1Payload/Yo....dylib
windows7-x64
3Payload/Yo....dylib
windows7-x64
3Payload/Yo....dylib
windows7-x64
3Payload/Yo....dylib
windows7-x64
3Payload/Yo....dylib
windows7-x64
3Payload/Yo....dylib
windows7-x64
3Payload/Yo....dylib
windows7-x64
3Payload/Yo....dylib
windows7-x64
3Payload/Yo....dylib
windows7-x64
3Payload/Yo...ed_ios
windows7-x64
1Payload/Yo...fo.xml
windows7-x64
1Payload/Yo...ension
windows7-x64
1Payload/Yo...ension
windows7-x64
1Payload/Yo...ension
windows7-x64
1Payload/Yo...ension
windows7-x64
1Payload/Yo...ension
windows7-x64
1Payload/Yo...ouTube
windows7-x64
1Payload/Yo...fig.js
windows7-x64
1Payload/Yo...fig.js
windows7-x64
1Payload/Yo...fig.js
windows7-x64
1Payload/Yo...to_.js
windows7-x64
1Payload/Yo...237.js
windows7-x64
1Analysis
-
max time kernel
1810s -
max time network
1839s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
06-02-2023 15:57
Behavioral task
behavioral1
Sample
Payload/YouTube.app/Frameworks/Alderis.framework/Alderis
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
Payload/YouTube.app/Frameworks/CydiaSubstrate.framework/CydiaSubstrate
Resource
win7-20221111-en
Behavioral task
behavioral3
Sample
Payload/YouTube.app/Frameworks/Module_Framework.framework/GHKContactUsResources.bundle/get_help.js
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
Payload/YouTube.app/Frameworks/Module_Framework.framework/Module_Framework
Resource
win7-20221111-en
Behavioral task
behavioral5
Sample
Payload/YouTube.app/Frameworks/Module_Framework.framework/RedirectLandingMessageHandler.js
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
Payload/YouTube.app/Frameworks/Module_Framework.framework/SUPSupportContentResources.bundle/ColorThemedCSSFormat.html
Resource
win7-20221111-en
Behavioral task
behavioral7
Sample
Payload/YouTube.app/Frameworks/Module_Framework.framework/SUPSupportContentResources.bundle/RenderedContentFormat.html
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
Payload/YouTube.app/Frameworks/Module_Framework.framework/SUPSupportContentResources.bundle/SearchResultsParser.js
Resource
win7-20220812-en
Behavioral task
behavioral9
Sample
Payload/YouTube.app/Frameworks/Module_Framework.framework/SUPSupportContentResources.bundle/SurveyContactFormParser.js
Resource
win7-20220901-en
Behavioral task
behavioral10
Sample
Payload/YouTube.app/Frameworks/Module_Framework.framework/WebViewComponent.js
Resource
win7-20220812-en
Behavioral task
behavioral11
Sample
Payload/YouTube.app/Frameworks/YTABGoodies.dylib
Resource
win7-20221111-en
Behavioral task
behavioral12
Sample
Payload/YouTube.app/Frameworks/YTReExplore.dylib
Resource
win7-20221111-en
Behavioral task
behavioral13
Sample
Payload/YouTube.app/Frameworks/YTShortsProgress.dylib
Resource
win7-20220812-en
Behavioral task
behavioral14
Sample
Payload/YouTube.app/Frameworks/YTUHD.dylib
Resource
win7-20221111-en
Behavioral task
behavioral15
Sample
Payload/YouTube.app/Frameworks/YouTubeDislikesReturn.dylib
Resource
win7-20220812-en
Behavioral task
behavioral16
Sample
Payload/YouTube.app/Frameworks/YouTubeReborn.dylib
Resource
win7-20220901-en
Behavioral task
behavioral17
Sample
Payload/YouTube.app/Frameworks/fixYouTubeLogin.dylib
Resource
win7-20220812-en
Behavioral task
behavioral18
Sample
Payload/YouTube.app/Frameworks/iSponsorBlock.dylib
Resource
win7-20221111-en
Behavioral task
behavioral19
Sample
Payload/YouTube.app/Frameworks/libcolorpicker.dylib
Resource
win7-20221111-en
Behavioral task
behavioral20
Sample
Payload/YouTube.app/Frameworks/widevine_cdm_secured_ios.framework/widevine_cdm_secured_ios
Resource
win7-20220812-en
Behavioral task
behavioral21
Sample
Payload/YouTube.app/Info.xml
Resource
win7-20221111-en
Behavioral task
behavioral22
Sample
Payload/YouTube.app/PlugIns/BroadcastUIExtension.appex/BroadcastUIExtension
Resource
win7-20220901-en
Behavioral task
behavioral23
Sample
Payload/YouTube.app/PlugIns/BroadcastUploadExtension.appex/BroadcastUploadExtension
Resource
win7-20220812-en
Behavioral task
behavioral24
Sample
Payload/YouTube.app/PlugIns/MessagesExtension.appex/MessagesExtension
Resource
win7-20221111-en
Behavioral task
behavioral25
Sample
Payload/YouTube.app/PlugIns/NotificationContentExtension.appex/NotificationContentExtension
Resource
win7-20220812-en
Behavioral task
behavioral26
Sample
Payload/YouTube.app/PlugIns/NotificationServiceExtension.appex/NotificationServiceExtension
Resource
win7-20220812-en
Behavioral task
behavioral27
Sample
Payload/YouTube.app/YouTube
Resource
win7-20221111-en
Behavioral task
behavioral28
Sample
Payload/YouTube.app/mainapp_filegroup/392940140_js_module_config.js
Resource
win7-20221111-en
Behavioral task
behavioral29
Sample
Payload/YouTube.app/mainapp_filegroup/427043361_js_module_config.js
Resource
win7-20220901-en
Behavioral task
behavioral30
Sample
Payload/YouTube.app/mainapp_filegroup/42_js_module_config.js
Resource
win7-20220812-en
Behavioral task
behavioral31
Sample
Payload/YouTube.app/mainapp_filegroup/_srs_resources_main_app_eml_bundle_-819589501/playlist_add_to_.js
Resource
win7-20220901-en
Behavioral task
behavioral32
Sample
Payload/YouTube.app/mainapp_filegroup/_srs_resources_main_app_eml_bundle_-819589501/root_d5415560901eb237.js
Resource
win7-20221111-en
General
-
Target
Payload/YouTube.app/Frameworks/iSponsorBlock.dylib
-
Size
270KB
-
MD5
f77bba263dc0b492185cb495a80207f1
-
SHA1
ab9b0692abf3e021ebb82bb45a7b8c6c6bb4f23c
-
SHA256
52343466bba775a752138613f154b7a2e2a8903b41014bb86b0c7f39f5c2e371
-
SHA512
af1c927158de67fd809a0b71885044b8511bef69adb57f8a0906a1f6de6c64dfe7dbc8fe89d66d0a0bacd85979e3bda1ac294116c0313096f1c7220b5c0e3cf7
-
SSDEEP
6144:HAUTKiv0SyGF1Uk5qcebWXxwG6rlcpfOaOvemICFh7:gksS5qcebWXxwG6rlcpfOaMpFh7
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 10 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\dylib_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\.dylib rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\dylib_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\dylib_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\.dylib\ = "dylib_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\dylib_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\dylib_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\dylib_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid process 1552 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
AcroRd32.exepid process 1552 AcroRd32.exe 1552 AcroRd32.exe 1552 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.exerundll32.exedescription pid process target process PID 1888 wrote to memory of 704 1888 cmd.exe rundll32.exe PID 1888 wrote to memory of 704 1888 cmd.exe rundll32.exe PID 1888 wrote to memory of 704 1888 cmd.exe rundll32.exe PID 704 wrote to memory of 1552 704 rundll32.exe AcroRd32.exe PID 704 wrote to memory of 1552 704 rundll32.exe AcroRd32.exe PID 704 wrote to memory of 1552 704 rundll32.exe AcroRd32.exe PID 704 wrote to memory of 1552 704 rundll32.exe AcroRd32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Payload\YouTube.app\Frameworks\iSponsorBlock.dylib1⤵
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Payload\YouTube.app\Frameworks\iSponsorBlock.dylib2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:704 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Payload\YouTube.app\Frameworks\iSponsorBlock.dylib"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1552
-
-