Analysis

  • max time kernel
    141s
  • max time network
    166s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-07-2024 12:02

General

  • Target

    YTMonster.exe

  • Size

    67.8MB

  • MD5

    3fdb08e49c7b01e875ab9b4ba0e46b7b

  • SHA1

    fa03f357c262d40ab02c14809fbb08eed121fb61

  • SHA256

    5159761d844f5802bc9192767eae06d8eed503473c9ecbe0f949d1069a28572d

  • SHA512

    6aac18ae56b929699663f7e44898402d16b6de23100b6e2a09d3bc24e67954b6ded04014a0feb6e03558e9cda7db096e4ace93937df3aeefcaee3ccc69b876eb

  • SSDEEP

    393216:QQbSg4mED8QQakiC3+LJRSxhhhlevntJ7XhN6NT5+bRL1ozWc8bu8esBKpVGsFMj:POLJiwrFjO/B6ZwJc9Ga5OBgePTPMsXo

Score
10/10

Malware Config

Signatures

  • Zloader, Terdot, DELoader, ZeusSphinx

    Zloader is a malware strain that was initially discovered back in August 2015.

  • Modifies registry class 9 IoCs
  • Modifies system certificate store 2 TTPs 9 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\YTMonster.exe
    "C:\Users\Admin\AppData\Local\Temp\YTMonster.exe"
    1⤵
    • Modifies registry class
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2060
    • C:\Users\Admin\AppData\Local\Temp\YTMonster.exe
      "C:\Users\Admin\AppData\Local\Temp\YTMonster.exe" --type=gpu-process --no-sandbox --gpu-preferences=KAAAAAAAAACAAwCAAQAAAAAAAAAAAGAAEAAAAAAAAAAAAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAKAAAAEAAAAAAAAAAAAAAACwAAABAAAAAAAAAAAQAAAAoAAAAQAAAAAAAAAAEAAAALAAAA --service-request-channel-token=8F459E678CA59114E984863B143E257D --mojo-platform-channel-handle=1340 /prefetch:2
      2⤵
      • Modifies registry class
      PID:3484
    • C:\Users\Admin\AppData\Local\Temp\YTMonster.exe
      "C:\Users\Admin\AppData\Local\Temp\YTMonster.exe" --type=renderer --no-sandbox --service-pipe-token=A6DE95BD8BE6542BDF58F695258CE980 --lang=en-US --app-user-model-id=com.ytmonster.desktop --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --node-integration=true --webview-tag=true --no-sandbox --background-color=#131313 --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-compositor-image-animations --service-request-channel-token=A6DE95BD8BE6542BDF58F695258CE980 --renderer-client-id=5 --mojo-platform-channel-handle=1884 /prefetch:1
      2⤵
        PID:4972
      • C:\Users\Admin\AppData\Local\Temp\YTMonster.exe
        "C:\Users\Admin\AppData\Local\Temp\YTMonster.exe" --type=gpu-process --no-sandbox --gpu-preferences=KAAAAAAAAACAAwCAAQAAAAAAAAAAAGAAEAAAAAAAAAAAAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAKAAAAEAAAAAAAAAAAAAAACwAAABAAAAAAAAAAAQAAAAoAAAAQAAAAAAAAAAEAAAALAAAA --use-gl=swiftshader-webgl --service-request-channel-token=89E5294EBAFD4A330A353A977D96CF5F --mojo-platform-channel-handle=2268 /prefetch:2
        2⤵
        • Modifies registry class
        PID:4452

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2060-0-0x0000000140000000-0x0000000144439000-memory.dmp

      Filesize

      68.2MB

    • memory/3484-1-0x0000000140000000-0x0000000144439000-memory.dmp

      Filesize

      68.2MB

    • memory/4452-10-0x0000000140000000-0x0000000144439000-memory.dmp

      Filesize

      68.2MB

    • memory/4972-7-0x0000000140000000-0x0000000144439000-memory.dmp

      Filesize

      68.2MB