Analysis

  • max time kernel
    122s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    07-07-2024 12:02

General

  • Target

    YTMonster.exe

  • Size

    67.8MB

  • MD5

    3fdb08e49c7b01e875ab9b4ba0e46b7b

  • SHA1

    fa03f357c262d40ab02c14809fbb08eed121fb61

  • SHA256

    5159761d844f5802bc9192767eae06d8eed503473c9ecbe0f949d1069a28572d

  • SHA512

    6aac18ae56b929699663f7e44898402d16b6de23100b6e2a09d3bc24e67954b6ded04014a0feb6e03558e9cda7db096e4ace93937df3aeefcaee3ccc69b876eb

  • SSDEEP

    393216:QQbSg4mED8QQakiC3+LJRSxhhhlevntJ7XhN6NT5+bRL1ozWc8bu8esBKpVGsFMj:POLJiwrFjO/B6ZwJc9Ga5OBgePTPMsXo

Score
10/10

Malware Config

Signatures

  • Zloader, Terdot, DELoader, ZeusSphinx

    Zloader is a malware strain that was initially discovered back in August 2015.

  • Modifies registry class 7 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\YTMonster.exe
    "C:\Users\Admin\AppData\Local\Temp\YTMonster.exe"
    1⤵
    • Modifies registry class
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2492
    • C:\Users\Admin\AppData\Local\Temp\YTMonster.exe
      "C:\Users\Admin\AppData\Local\Temp\YTMonster.exe" --type=gpu-process --no-sandbox --gpu-preferences=KAAAAAAAAACAAwCAAQAAAAAAAAAAAGAAEAAAAAAAAAAAAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAKAAAAEAAAAAAAAAAAAAAACwAAABAAAAAAAAAAAQAAAAoAAAAQAAAAAAAAAAEAAAALAAAA --service-request-channel-token=81CEEA581C912790942175FB7E709687 --mojo-platform-channel-handle=1032 /prefetch:2
      2⤵
        PID:2912
      • C:\Users\Admin\AppData\Local\Temp\YTMonster.exe
        "C:\Users\Admin\AppData\Local\Temp\YTMonster.exe" --type=renderer --no-sandbox --service-pipe-token=682C5CD539B960573B541078D9B803D5 --lang=en-US --app-user-model-id=com.ytmonster.desktop --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --node-integration=true --webview-tag=true --no-sandbox --background-color=#131313 --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-compositor-image-animations --service-request-channel-token=682C5CD539B960573B541078D9B803D5 --renderer-client-id=5 --mojo-platform-channel-handle=1268 /prefetch:1
        2⤵
          PID:2676
        • C:\Users\Admin\AppData\Local\Temp\YTMonster.exe
          "C:\Users\Admin\AppData\Local\Temp\YTMonster.exe" --type=gpu-process --no-sandbox --gpu-preferences=KAAAAAAAAACAAwCAAQAAAAAAAAAAAGAAEAAAAAAAAAAAAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAKAAAAEAAAAAAAAAAAAAAACwAAABAAAAAAAAAAAQAAAAoAAAAQAAAAAAAAAAEAAAALAAAA --use-gl=swiftshader-webgl --service-request-channel-token=82B052A63AC211F56F41ACAA77B64766 --mojo-platform-channel-handle=1524 /prefetch:2
          2⤵
            PID:2748

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          10ac4dccefced7172b3255adbf18e211

          SHA1

          5c7ee0c1a3ff22d0d34dca75b5dda7053d1905bf

          SHA256

          220bdf59712566071ce0f84cde6f6a3774bc0bb64ba37bbfe27bff75414a3515

          SHA512

          b56e25ce4012824c1aada329249fcd4b98ec9da7a2e5717dd0b430eb12d12549f6a6d6495b8cfec817868c65c0094c6646ce83dcd757175f0d68d5ff7fabd4df

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          d46bce9e851e8a7e7bac28d7e38a7114

          SHA1

          9728c95d76a08f628f09159d7272fc81f1962e16

          SHA256

          e7c7ce629ba31b0855d7f0a2aa480a832123152b1320be9102be3d2b9ba78dcb

          SHA512

          40dd1a398cc527b07c119cf9b7298907f155dd7a9c32847cac2fa06a70dd464ed3fccaf448fd0a96cf9bfc8978c0fcd4a721837c92decfa0a8dc1572d563716b

        • C:\Users\Admin\AppData\Local\Temp\CabFDB2.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\TarFE80.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

        • memory/2492-0-0x0000000140000000-0x0000000144439000-memory.dmp

          Filesize

          68.2MB