Overview
overview
10Static
static
1018a919efd1...26.exe
windows7-x64
1018a919efd1...26.exe
windows10-2004-x64
10$PLUGINSDI...er.dll
windows7-x64
1$PLUGINSDI...er.dll
windows10-2004-x64
1$PLUGINSDI...ls.dll
windows7-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows7-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3LICENSES.c...m.html
windows7-x64
1LICENSES.c...m.html
windows10-2004-x64
1YTMonster.exe
windows7-x64
10YTMonster.exe
windows10-2004-x64
10api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-1.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1Analysis
-
max time kernel
122s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
07-07-2024 12:02
Behavioral task
behavioral1
Sample
18a919efd1cbc2d3b39bd623827b4bc5fa719dffa538fc53a47e085818a75826.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
18a919efd1cbc2d3b39bd623827b4bc5fa719dffa538fc53a47e085818a75826.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/WinShell.dll
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/WinShell.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral11
Sample
LICENSES.chromium.html
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
LICENSES.chromium.html
Resource
win10v2004-20240704-en
Behavioral task
behavioral13
Sample
YTMonster.exe
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
YTMonster.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral15
Sample
api-ms-win-core-console-l1-1-0.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral16
Sample
api-ms-win-core-datetime-l1-1-0.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral17
Sample
api-ms-win-core-debug-l1-1-0.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral18
Sample
api-ms-win-core-errorhandling-l1-1-0.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
api-ms-win-core-file-l1-1-0.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral20
Sample
api-ms-win-core-file-l1-2-0.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral21
Sample
api-ms-win-core-file-l2-1-0.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral22
Sample
api-ms-win-core-handle-l1-1-0.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral23
Sample
api-ms-win-core-heap-l1-1-0.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral24
Sample
api-ms-win-core-interlocked-l1-1-0.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral25
Sample
api-ms-win-core-libraryloader-l1-1-0.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral26
Sample
api-ms-win-core-localization-l1-2-0.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
api-ms-win-core-memory-l1-1-0.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral28
Sample
api-ms-win-core-namedpipe-l1-1-0.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral29
Sample
api-ms-win-core-processenvironment-l1-1-0.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral30
Sample
api-ms-win-core-processthreads-l1-1-0.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral31
Sample
api-ms-win-core-processthreads-l1-1-1.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral32
Sample
api-ms-win-core-profile-l1-1-0.dll
Resource
win10v2004-20240508-en
General
-
Target
YTMonster.exe
-
Size
67.8MB
-
MD5
3fdb08e49c7b01e875ab9b4ba0e46b7b
-
SHA1
fa03f357c262d40ab02c14809fbb08eed121fb61
-
SHA256
5159761d844f5802bc9192767eae06d8eed503473c9ecbe0f949d1069a28572d
-
SHA512
6aac18ae56b929699663f7e44898402d16b6de23100b6e2a09d3bc24e67954b6ded04014a0feb6e03558e9cda7db096e4ace93937df3aeefcaee3ccc69b876eb
-
SSDEEP
393216:QQbSg4mED8QQakiC3+LJRSxhhhlevntJ7XhN6NT5+bRL1ozWc8bu8esBKpVGsFMj:POLJiwrFjO/B6ZwJc9Ga5OBgePTPMsXo
Malware Config
Signatures
-
Modifies registry class 7 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\ytm-desktop YTMonster.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\ytm-desktop\URL Protocol YTMonster.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\ytm-desktop\ = "URL:ytm-desktop" YTMonster.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\ytm-desktop\shell\open\command YTMonster.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\ytm-desktop\shell YTMonster.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\ytm-desktop\shell\open YTMonster.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\ytm-desktop\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\YTMonster.exe\" \"%1\"" YTMonster.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 YTMonster.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 YTMonster.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 YTMonster.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 YTMonster.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2492 wrote to memory of 2912 2492 YTMonster.exe 31 PID 2492 wrote to memory of 2912 2492 YTMonster.exe 31 PID 2492 wrote to memory of 2912 2492 YTMonster.exe 31 PID 2492 wrote to memory of 2676 2492 YTMonster.exe 32 PID 2492 wrote to memory of 2676 2492 YTMonster.exe 32 PID 2492 wrote to memory of 2676 2492 YTMonster.exe 32 PID 2492 wrote to memory of 2748 2492 YTMonster.exe 33 PID 2492 wrote to memory of 2748 2492 YTMonster.exe 33 PID 2492 wrote to memory of 2748 2492 YTMonster.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\YTMonster.exe"C:\Users\Admin\AppData\Local\Temp\YTMonster.exe"1⤵
- Modifies registry class
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\YTMonster.exe"C:\Users\Admin\AppData\Local\Temp\YTMonster.exe" --type=gpu-process --no-sandbox --gpu-preferences=KAAAAAAAAACAAwCAAQAAAAAAAAAAAGAAEAAAAAAAAAAAAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAKAAAAEAAAAAAAAAAAAAAACwAAABAAAAAAAAAAAQAAAAoAAAAQAAAAAAAAAAEAAAALAAAA --service-request-channel-token=81CEEA581C912790942175FB7E709687 --mojo-platform-channel-handle=1032 /prefetch:22⤵PID:2912
-
-
C:\Users\Admin\AppData\Local\Temp\YTMonster.exe"C:\Users\Admin\AppData\Local\Temp\YTMonster.exe" --type=renderer --no-sandbox --service-pipe-token=682C5CD539B960573B541078D9B803D5 --lang=en-US --app-user-model-id=com.ytmonster.desktop --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --node-integration=true --webview-tag=true --no-sandbox --background-color=#131313 --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-compositor-image-animations --service-request-channel-token=682C5CD539B960573B541078D9B803D5 --renderer-client-id=5 --mojo-platform-channel-handle=1268 /prefetch:12⤵PID:2676
-
-
C:\Users\Admin\AppData\Local\Temp\YTMonster.exe"C:\Users\Admin\AppData\Local\Temp\YTMonster.exe" --type=gpu-process --no-sandbox --gpu-preferences=KAAAAAAAAACAAwCAAQAAAAAAAAAAAGAAEAAAAAAAAAAAAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAKAAAAEAAAAAAAAAAAAAAACwAAABAAAAAAAAAAAQAAAAoAAAAQAAAAAAAAAAEAAAALAAAA --use-gl=swiftshader-webgl --service-request-channel-token=82B052A63AC211F56F41ACAA77B64766 --mojo-platform-channel-handle=1524 /prefetch:22⤵PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510ac4dccefced7172b3255adbf18e211
SHA15c7ee0c1a3ff22d0d34dca75b5dda7053d1905bf
SHA256220bdf59712566071ce0f84cde6f6a3774bc0bb64ba37bbfe27bff75414a3515
SHA512b56e25ce4012824c1aada329249fcd4b98ec9da7a2e5717dd0b430eb12d12549f6a6d6495b8cfec817868c65c0094c6646ce83dcd757175f0d68d5ff7fabd4df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d46bce9e851e8a7e7bac28d7e38a7114
SHA19728c95d76a08f628f09159d7272fc81f1962e16
SHA256e7c7ce629ba31b0855d7f0a2aa480a832123152b1320be9102be3d2b9ba78dcb
SHA51240dd1a398cc527b07c119cf9b7298907f155dd7a9c32847cac2fa06a70dd464ed3fccaf448fd0a96cf9bfc8978c0fcd4a721837c92decfa0a8dc1572d563716b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b