Analysis

  • max time kernel
    146s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-07-2024 12:02

General

  • Target

    18a919efd1cbc2d3b39bd623827b4bc5fa719dffa538fc53a47e085818a75826.exe

  • Size

    38.0MB

  • MD5

    5fa44c522a683d3ab4a9eec76aa01500

  • SHA1

    f5e3b957d3765e539271f88493de4810fc0f75c5

  • SHA256

    18a919efd1cbc2d3b39bd623827b4bc5fa719dffa538fc53a47e085818a75826

  • SHA512

    d812fada01cf5897f99d67f4a54d7f5f33e0979011c7ddbe91f4f7431cdaf8c17b8a8b628a6b8d1420ca08e27ecf7aa2af2db27f9d503096a402b15a31c2c84a

  • SSDEEP

    786432:/uOx/4eAIyk43cMd58nyccoADx7hPcO4AVEBuruGBn33+tliyyriq:/uOxAed54MS5eyccoADx7JcFAVEEtJ3F

Malware Config

Signatures

  • Zloader, Terdot, DELoader, ZeusSphinx

    Zloader is a malware strain that was initially discovered back in August 2015.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 25 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\18a919efd1cbc2d3b39bd623827b4bc5fa719dffa538fc53a47e085818a75826.exe
    "C:\Users\Admin\AppData\Local\Temp\18a919efd1cbc2d3b39bd623827b4bc5fa719dffa538fc53a47e085818a75826.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3008
  • C:\Users\Admin\AppData\Local\Programs\YTMonster\YTMonster.exe
    "C:\Users\Admin\AppData\Local\Programs\YTMonster\YTMonster.exe"
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3396
    • C:\Users\Admin\AppData\Local\Programs\YTMonster\YTMonster.exe
      "C:\Users\Admin\AppData\Local\Programs\YTMonster\YTMonster.exe" --type=gpu-process --no-sandbox --gpu-preferences=KAAAAAAAAACAAwCAAQAAAAAAAAAAAGAAEAAAAAAAAAAAAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAKAAAAEAAAAAAAAAAAAAAACwAAABAAAAAAAAAAAQAAAAoAAAAQAAAAAAAAAAEAAAALAAAA --service-request-channel-token=A3D683F14551B8D659A1B92148045994 --mojo-platform-channel-handle=1412 /prefetch:2
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies registry class
      PID:2196
    • C:\Users\Admin\AppData\Local\Programs\YTMonster\YTMonster.exe
      "C:\Users\Admin\AppData\Local\Programs\YTMonster\YTMonster.exe" --type=renderer --no-sandbox --service-pipe-token=F6BA440A2680260E816D7E4909121E3C --lang=en-US --app-user-model-id=com.ytmonster.desktop --app-path="C:\Users\Admin\AppData\Local\Programs\YTMonster\resources\app.asar" --node-integration=true --webview-tag=true --no-sandbox --background-color=#131313 --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-compositor-image-animations --service-request-channel-token=F6BA440A2680260E816D7E4909121E3C --renderer-client-id=5 --mojo-platform-channel-handle=1896 /prefetch:1
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:2484
    • C:\Users\Admin\AppData\Local\Programs\YTMonster\YTMonster.exe
      "C:\Users\Admin\AppData\Local\Programs\YTMonster\YTMonster.exe" --type=gpu-process --no-sandbox --gpu-preferences=KAAAAAAAAACAAwCAAQAAAAAAAAAAAGAAEAAAAAAAAAAAAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAKAAAAEAAAAAAAAAAAAAAACwAAABAAAAAAAAAAAQAAAAoAAAAQAAAAAAAAAAEAAAALAAAA --use-gl=swiftshader-webgl --service-request-channel-token=D33815A67C82273F45DCE84753470D5D --mojo-platform-channel-handle=2272 /prefetch:2
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies registry class
      PID:1548

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Programs\YTMonster\blink_image_resources_200_percent.pak

    Filesize

    4KB

    MD5

    9224336777238d8e7280611d30996f10

    SHA1

    8abe74c0ded180a42144efa1d32e2686f133f47a

    SHA256

    0ae299034fef86349a5b379d8c3c9db84bba725487e665102791701b24ba855d

    SHA512

    266eb89253786678ca0f66cfd84b81d54b81847e5064313dacdde4b62d8deb6a2d56c391cfd776aaa21de81dbdd024b7bbbd86883ac17389fae3467e5558c139

  • C:\Users\Admin\AppData\Local\Programs\YTMonster\content_resources_200_percent.pak

    Filesize

    18B

    MD5

    65f69bd2d8b6458d3ecf77d84d70dc1c

    SHA1

    679bdfb03cbaa594ace5af4340a061ddc514309d

    SHA256

    ca73097bd968b363b7145e86b64f3c595e533808b0763dc8863a27fc363cfa51

    SHA512

    39f2728a1898bc9406516fa737c58c349e3bd7f779276a2f6679b3e3f0db43f956e03ad25e5d9bf4b07b19909febcc6c0560f71ab4f4fa6b5dd1f021ef742c60

  • C:\Users\Admin\AppData\Local\Programs\YTMonster\content_shell.pak

    Filesize

    7.1MB

    MD5

    ab9992f3bef24d6ffd8e76ce56f96de5

    SHA1

    531cc9767c3d3b4a342516e97326b859b3b3ea5a

    SHA256

    8818e8af6a3475e6bb6ebbd9d69bbac67fc156eca73840125987c1e9f9f2c92a

    SHA512

    3570882596b5ffef77da8758287a997504664a07926bd639cf01b2ad35e8fbd0ab00de669cf87269a241e073a2038f9f369e8f76d04282c7fe894956b57eb888

  • C:\Users\Admin\AppData\Local\Programs\YTMonster\d3dcompiler_47.dll

    Filesize

    4.0MB

    MD5

    b0ae3aa9dd1ebd60bdf51cb94834cd04

    SHA1

    ee2f5726ac140fb42d17aba033d678afaf8c39c1

    SHA256

    e994847e01a6f1e4cbdc5a864616ac262f67ee4f14db194984661a8d927ab7f4

    SHA512

    756ebf4fa49029d4343d1bdb86ea71b2d49e20ada6370fd7582515455635c73d37ad0dbdeef456a10ab353a12412ba827ca4d70080743c86c3b42fa0a3152aa3

  • C:\Users\Admin\AppData\Local\Programs\YTMonster\ffmpeg.dll

    Filesize

    1.7MB

    MD5

    33975f1c1cefb80adf0357c2bbc6375b

    SHA1

    583dd47246056431c907860ca5de14aca228d29b

    SHA256

    500830b43caaeaf5b49208579f6e675955c7a26ddf3e93d1e7af047e385a6fe7

    SHA512

    b305181c17cc524a4aec211984b3e394935bfcc554945200c6cca3d5de137c7391c076fc5d75f2b2f495d41da465cc891cacd0b94cf806e988b3eac2ed2ff90e

  • C:\Users\Admin\AppData\Local\Programs\YTMonster\icudtl.dat

    Filesize

    9.7MB

    MD5

    62ce282dfe0ab8f2a35a529faeb61ac2

    SHA1

    c35d6e4db540518263214697f589c54faac87533

    SHA256

    c3b6588446b4a48e36dc135f9920ad246f5c84fe59c634b4225b009dd1dace13

    SHA512

    a773bf66fcb9a12c1d8f3a760724c8438c7f240617b8099e4e2af979b84676892dbcaa866ca2fad59d2e56493ec3f96f0874e4e6e7fe7ca25e22ea2606e9a853

  • C:\Users\Admin\AppData\Local\Programs\YTMonster\locales\en-US.pak

    Filesize

    3KB

    MD5

    538cc1045845fdbca65a588834b81429

    SHA1

    fa00b84700d909cc60360fb4e86656b478de7285

    SHA256

    a7a88ba80019f84745d9daab0d35b0c2a8d8c1c2d4b019393eb0c2fed25bb1e7

    SHA512

    b06549b9b2f6fa7d00f0a367ff6929ba2f2e1e9cdee3f66fde64f38721433794ad638fb93520e9645d3675c5f9bb19c2f5fce91f6c26a1dce43a7517870f7379

  • C:\Users\Admin\AppData\Local\Programs\YTMonster\msvcp140.dll

    Filesize

    626KB

    MD5

    d396985225d85caa7d743d67c7da6316

    SHA1

    915d5829ed02171684c2a9e8b3b57f7a35bc1e2c

    SHA256

    be2ef4f6d540d0ac5fddd556dcb6bfaf6cb6288679e4d64882d625ff35f173aa

    SHA512

    d7b0df2865bf491c9caf34cbabefb7b7f04b35b85276a59fef0499d02b09651d8f6d0db9e87df4a9a1417f07784a8e5625e9805bc434b87d64e442ab98e24075

  • C:\Users\Admin\AppData\Local\Programs\YTMonster\natives_blob.bin

    Filesize

    170KB

    MD5

    7f20917d39abdc8ccac48f8cce93bf09

    SHA1

    93c804ac74ce32c17538f04d175f775550946826

    SHA256

    a23d9b8422322157c7900b2cc35bf9a8129c08e4b9807dae26f412981b9c1b78

    SHA512

    183c4d606af1bc57a5d958d4ff34d9633a23493d18317544e8dd4b05dff010fce249d4ceee646b8f14c9367f509890292df1cd85957a0d2a0ea9f82045559f34

  • C:\Users\Admin\AppData\Local\Programs\YTMonster\node.dll

    Filesize

    17.7MB

    MD5

    8e9031ccfd8e12753bd99e82c9f140dc

    SHA1

    227404035620218fbd969eb622a6afb69cfd6259

    SHA256

    242bab387b53c3ff4a071547d8bde84a1a6ba71cecc8d999618a041fc24d867d

    SHA512

    f589fee28d225d72a5f565412513bd4444211aed9e292b264e51da660532d489c7ddd8771a360cb80a4e4bae150f136a6287d407fbfd54257667a1d23d284677

  • C:\Users\Admin\AppData\Local\Programs\YTMonster\resources\app-update.yml

    Filesize

    153B

    MD5

    d73e8c84cea94bade26ae2cef5a9a7d3

    SHA1

    6c14f9a2f97eb1a38cda05f17d43e93363bc06f1

    SHA256

    0581fc51139363739ad2f9f9f6ed3568987a5e67df5a8e8eab6fc99b43212a25

    SHA512

    50ea3a823343b5eb479df99df7348aad6bf571d0d05dfbeb7ba112915463a16a7a544b928e30ec31d02cf98c279df1e9bc440ea8406e07c49a46e4aa7683d925

  • C:\Users\Admin\AppData\Local\Programs\YTMonster\resources\app.asar

    Filesize

    12.2MB

    MD5

    02ed590582b37a229b3a8d28e72c5e6f

    SHA1

    c7350c4dff3041a931fa270f1af57457011b3bb4

    SHA256

    66e36546e4a6ff89826bd53a2b41f89258f9504c6afcba6df86bc4f5d189b01b

    SHA512

    4ffff25ed70f5a85348bd3789852efd10368b625e0c8e54a2a6a4b72f09a93bcd1e38df776714b5ab9322ce8ca19307a46cf194acb66c6402a185a6d27c9a0dc

  • C:\Users\Admin\AppData\Local\Programs\YTMonster\resources\electron.asar

    Filesize

    254KB

    MD5

    c840ae0e1ab54fe60d98f37ef25ad7d6

    SHA1

    17e1261e644222397ddd69501a38cb344cff92e4

    SHA256

    7095358444d7b969185c56019a847b819b4a8004632238de56cd99d8a6c8906c

    SHA512

    229fc6a8b24dc07f47755e053b6e190e302d56a110cbd87012d209e9e61146a046f08f5406a057542b42ae488b93fb2687aeb9d3f808116d25cb68efa9c86770

  • C:\Users\Admin\AppData\Local\Programs\YTMonster\ui_resources_200_percent.pak

    Filesize

    109KB

    MD5

    4ae9c0016707a23548f9b55cb770ddc9

    SHA1

    323bbf97ba222d185eaa3a72c05d1b9b9c2da35d

    SHA256

    7242e4d5b41d3811c8ed068eb186ddac85a725555f841fbef8a82c13bd8c451c

    SHA512

    ae844b46150dec8a35fbc2e2463cc591f00c0e8ffba19efac0e89ab3693b430f9989ec62a19c70c1188657a58def4ea94b509451e79876c415dd1157b583e355

  • C:\Users\Admin\AppData\Local\Programs\YTMonster\v8_context_snapshot.bin

    Filesize

    1.7MB

    MD5

    6fefb49e92668e6f939d76f1f034fd9d

    SHA1

    7a94c8d21281f399738b1a1f58d014ffadaf649a

    SHA256

    234b720e68ddb1acc3fd58e4a820859ff49b349928e508d2f47cab245a0d51f0

    SHA512

    c3051020c330ad10287d89ebde9802bab1f6ab1a97bfa89997583b2f928e8a089d6c02dcd44a20482d4fc22d43a1fe626b3360b328eef5ebcc5dbe291e738cb6

  • C:\Users\Admin\AppData\Local\Programs\YTMonster\vcruntime140.dll

    Filesize

    85KB

    MD5

    9a53905892d9c9f3bf9d295c8b32e446

    SHA1

    2c5c56ff86fb1e827b2e0d479c529baea13eb561

    SHA256

    d58e3ff10fd96a22a8e6d2fd76146a282cc45ccfaf2301257e76e7c2771cbd41

    SHA512

    2dde975e15f95aa9310820cae009f2b04e26b7bafebb42d5822e3917017e4a37e17b0a71825f8f79f075abc1507d7d4d9202550fdd7a53ab54ac0fde4349fe2f

  • C:\Users\Admin\AppData\Local\Programs\YTMonster\views_resources_200_percent.pak

    Filesize

    55KB

    MD5

    6246a3e0832895dde8ca8c3bfd798ca6

    SHA1

    14f48351d558d34c2a5f35617e34b772b95dd220

    SHA256

    222d401933e86d30fd5f8bccacf527020b2c395addf9c38e63c0df6f3e1c9ed5

    SHA512

    96627441e3907dda02d629101d327306ecb4ab9d87ad8e2aab6a8a6d5a5a6c5573774f6591c3d7f2a23a050e502b783654512bca764818af0121fe617d4b388e

  • C:\Users\Admin\AppData\Local\Temp\nsz52C4.tmp\SpiderBanner.dll

    Filesize

    9KB

    MD5

    17309e33b596ba3a5693b4d3e85cf8d7

    SHA1

    7d361836cf53df42021c7f2b148aec9458818c01

    SHA256

    996a259e53ca18b89ec36d038c40148957c978c0fd600a268497d4c92f882a93

    SHA512

    1abac3ce4f2d5e4a635162e16cf9125e059ba1539f70086c2d71cd00d41a6e2a54d468e6f37792e55a822d7082fb388b8dfecc79b59226bbb047b7d28d44d298

  • C:\Users\Admin\AppData\Local\Temp\nsz52C4.tmp\StdUtils.dll

    Filesize

    101KB

    MD5

    33b4e69e7835e18b9437623367dd1787

    SHA1

    53afa03edaf931abdc2d828e5a2c89ad573d926c

    SHA256

    72d38ef115e71fc73dc5978987c583fc8c6b50ff12e4a5d30649a4d164a8b6ae

    SHA512

    ca890e785d1a0a7e0b4a748416fba417826ae66b46e600f407d4e795b444612a8b830f579f2cf5b6e051bea800604f34f8801cc3daf05c8d29ad05bcda454a77

  • C:\Users\Admin\AppData\Local\Temp\nsz52C4.tmp\System.dll

    Filesize

    11KB

    MD5

    75ed96254fbf894e42058062b4b4f0d1

    SHA1

    996503f1383b49021eb3427bc28d13b5bbd11977

    SHA256

    a632d74332b3f08f834c732a103dafeb09a540823a2217ca7f49159755e8f1d7

    SHA512

    58174896db81d481947b8745dafe3a02c150f3938bb4543256e8cce1145154e016d481df9fe68dac6d48407c62cbe20753320ebd5fe5e84806d07ce78e0eb0c4

  • C:\Users\Admin\AppData\Local\Temp\nsz52C4.tmp\WinShell.dll

    Filesize

    3KB

    MD5

    1cc7c37b7e0c8cd8bf04b6cc283e1e56

    SHA1

    0b9519763be6625bd5abce175dcc59c96d100d4c

    SHA256

    9be85b986ea66a6997dde658abe82b3147ed2a1a3dcb784bb5176f41d22815a6

    SHA512

    7acf7f8e68aa6066b59ca9f2ae2e67997e6b347bc08eb788d2a119b3295c844b5b9606757168e8d2fbd61c2cda367bf80e9e48c9a52c28d5a7a00464bfd2048f

  • C:\Users\Admin\AppData\Local\Temp\nsz52C4.tmp\nsProcess.dll

    Filesize

    4KB

    MD5

    f0438a894f3a7e01a4aae8d1b5dd0289

    SHA1

    b058e3fcfb7b550041da16bf10d8837024c38bf6

    SHA256

    30c6c3dd3cc7fcea6e6081ce821adc7b2888542dae30bf00e881c0a105eb4d11

    SHA512

    f91fcea19cbddf8086affcb63fe599dc2b36351fc81ac144f58a80a524043ddeaa3943f36c86ebae45dd82e8faf622ea7b7c9b776e74c54b93df2963cfe66cc7

  • C:\Users\Admin\AppData\Local\Temp\nsz52C4.tmp\nsis7z.dll

    Filesize

    391KB

    MD5

    c6a070b3e68b292bb0efc9b26e85e9cc

    SHA1

    5a922b96eda6595a68fd0a9051236162ff2e2ada

    SHA256

    66ac8bd1f273a73e17a3f31d6add739d3cb0330a6417faeda11a9cae00b62d8b

    SHA512

    8eff8fc16f5bb574bd9483e3b217b67a8986e31497368c06fdaa3a1e93a40aee94a5b31729d01905157b0ae1e556a402f43cd29a4d30a0587e1ec334458a44e8

  • memory/1548-344-0x0000000140000000-0x0000000144439000-memory.dmp

    Filesize

    68.2MB

  • memory/2196-320-0x0000000140000000-0x0000000144439000-memory.dmp

    Filesize

    68.2MB

  • memory/2484-334-0x0000000140000000-0x0000000144439000-memory.dmp

    Filesize

    68.2MB

  • memory/3396-288-0x0000000140000000-0x0000000144439000-memory.dmp

    Filesize

    68.2MB