Overview
overview
10Static
static
10YTMonster ...ta.exe
windows7-x64
10YTMonster ...ta.exe
windows10-2004-x64
10$PLUGINSDI...er.dll
windows7-x64
1$PLUGINSDI...er.dll
windows10-2004-x64
1$PLUGINSDI...ls.dll
windows7-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows7-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3LICENSES.c...m.html
windows7-x64
1LICENSES.c...m.html
windows10-2004-x64
1YTMonster.exe
windows7-x64
10YTMonster.exe
windows10-2004-x64
10api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-1.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1Analysis
-
max time kernel
119s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07-07-2024 11:45
Behavioral task
behavioral1
Sample
YTMonster Setup 0.3.2-beta.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
YTMonster Setup 0.3.2-beta.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/WinShell.dll
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/WinShell.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral11
Sample
LICENSES.chromium.html
Resource
win7-20240220-en
Behavioral task
behavioral12
Sample
LICENSES.chromium.html
Resource
win10v2004-20240704-en
Behavioral task
behavioral13
Sample
YTMonster.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
YTMonster.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral15
Sample
api-ms-win-core-console-l1-1-0.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral16
Sample
api-ms-win-core-datetime-l1-1-0.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral17
Sample
api-ms-win-core-debug-l1-1-0.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral18
Sample
api-ms-win-core-errorhandling-l1-1-0.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral19
Sample
api-ms-win-core-file-l1-1-0.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral20
Sample
api-ms-win-core-file-l1-2-0.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral21
Sample
api-ms-win-core-file-l2-1-0.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral22
Sample
api-ms-win-core-handle-l1-1-0.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral23
Sample
api-ms-win-core-heap-l1-1-0.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral24
Sample
api-ms-win-core-interlocked-l1-1-0.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral25
Sample
api-ms-win-core-libraryloader-l1-1-0.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral26
Sample
api-ms-win-core-localization-l1-2-0.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
api-ms-win-core-memory-l1-1-0.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral28
Sample
api-ms-win-core-namedpipe-l1-1-0.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
api-ms-win-core-processenvironment-l1-1-0.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral30
Sample
api-ms-win-core-processthreads-l1-1-0.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral31
Sample
api-ms-win-core-processthreads-l1-1-1.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral32
Sample
api-ms-win-core-profile-l1-1-0.dll
Resource
win10v2004-20240704-en
General
-
Target
YTMonster.exe
-
Size
67.8MB
-
MD5
3fdb08e49c7b01e875ab9b4ba0e46b7b
-
SHA1
fa03f357c262d40ab02c14809fbb08eed121fb61
-
SHA256
5159761d844f5802bc9192767eae06d8eed503473c9ecbe0f949d1069a28572d
-
SHA512
6aac18ae56b929699663f7e44898402d16b6de23100b6e2a09d3bc24e67954b6ded04014a0feb6e03558e9cda7db096e4ace93937df3aeefcaee3ccc69b876eb
-
SSDEEP
393216:QQbSg4mED8QQakiC3+LJRSxhhhlevntJ7XhN6NT5+bRL1ozWc8bu8esBKpVGsFMj:POLJiwrFjO/B6ZwJc9Ga5OBgePTPMsXo
Malware Config
Signatures
-
Modifies registry class 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\ytm-desktop\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\YTMonster.exe\" \"%1\"" YTMonster.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\ytm-desktop YTMonster.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\ytm-desktop\URL Protocol YTMonster.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\ytm-desktop\ = "URL:ytm-desktop" YTMonster.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\ytm-desktop\shell\open\command YTMonster.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\ytm-desktop\shell YTMonster.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\ytm-desktop\shell\open YTMonster.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 YTMonster.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 YTMonster.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 YTMonster.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 YTMonster.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2376 wrote to memory of 2652 2376 YTMonster.exe 28 PID 2376 wrote to memory of 2652 2376 YTMonster.exe 28 PID 2376 wrote to memory of 2652 2376 YTMonster.exe 28 PID 2376 wrote to memory of 2708 2376 YTMonster.exe 29 PID 2376 wrote to memory of 2708 2376 YTMonster.exe 29 PID 2376 wrote to memory of 2708 2376 YTMonster.exe 29 PID 2376 wrote to memory of 2512 2376 YTMonster.exe 30 PID 2376 wrote to memory of 2512 2376 YTMonster.exe 30 PID 2376 wrote to memory of 2512 2376 YTMonster.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\YTMonster.exe"C:\Users\Admin\AppData\Local\Temp\YTMonster.exe"1⤵
- Modifies registry class
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\YTMonster.exe"C:\Users\Admin\AppData\Local\Temp\YTMonster.exe" --type=gpu-process --no-sandbox --gpu-preferences=KAAAAAAAAACAAwCAAQAAAAAAAAAAAGAAEAAAAAAAAAAAAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAKAAAAEAAAAAAAAAAAAAAACwAAABAAAAAAAAAAAQAAAAoAAAAQAAAAAAAAAAEAAAALAAAA --service-request-channel-token=E1A927E9168E43FDA2E3B24995323F16 --mojo-platform-channel-handle=1044 /prefetch:22⤵PID:2652
-
-
C:\Users\Admin\AppData\Local\Temp\YTMonster.exe"C:\Users\Admin\AppData\Local\Temp\YTMonster.exe" --type=renderer --no-sandbox --service-pipe-token=109AAC8979A095DAE474B78A3914A77F --lang=en-US --app-user-model-id=com.ytmonster.desktop --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --node-integration=true --webview-tag=true --no-sandbox --background-color=#131313 --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-compositor-image-animations --service-request-channel-token=109AAC8979A095DAE474B78A3914A77F --renderer-client-id=5 --mojo-platform-channel-handle=1176 /prefetch:12⤵PID:2708
-
-
C:\Users\Admin\AppData\Local\Temp\YTMonster.exe"C:\Users\Admin\AppData\Local\Temp\YTMonster.exe" --type=gpu-process --no-sandbox --gpu-preferences=KAAAAAAAAACAAwCAAQAAAAAAAAAAAGAAEAAAAAAAAAAAAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAKAAAAEAAAAAAAAAAAAAAACwAAABAAAAAAAAAAAQAAAAoAAAAQAAAAAAAAAAEAAAALAAAA --use-gl=swiftshader-webgl --service-request-channel-token=A645E378298E36B99A386BD62BD25682 --mojo-platform-channel-handle=1492 /prefetch:22⤵PID:2512
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ece21868cb19229d39ef826632caa2c9
SHA1a4130b651b00836655d13ba83a28c872deab242a
SHA25638e0df99d706d9c57c68052905b5ce24a5e4a1cec2a3ebe98c092d30559737c3
SHA512ba2d0b5b9959db4e61b4873fd30cafa221b4ae189525d511bb8c0f70efa53914ad102e495ddfb94882916b0d0f2d48b14c5fafcb968f8b02658737519411c60e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d9068fa024088279c88a17a2da32bc8
SHA1dead668eabde113166e466f115caf4f6ec8a6308
SHA256577906d0596c02c2aa92da7e7524739d44336210ba535280b76d23e46168477f
SHA5120a82d1e71f27d439208bcfdad87ff637d1c587838aa97e3b3f225197d05332ec978cd5f411d301476dcff50715cfbdbe1fb82b901d547514e325eace9141c8c2
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b