Analysis

  • max time kernel
    119s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    07-07-2024 11:45

General

  • Target

    YTMonster.exe

  • Size

    67.8MB

  • MD5

    3fdb08e49c7b01e875ab9b4ba0e46b7b

  • SHA1

    fa03f357c262d40ab02c14809fbb08eed121fb61

  • SHA256

    5159761d844f5802bc9192767eae06d8eed503473c9ecbe0f949d1069a28572d

  • SHA512

    6aac18ae56b929699663f7e44898402d16b6de23100b6e2a09d3bc24e67954b6ded04014a0feb6e03558e9cda7db096e4ace93937df3aeefcaee3ccc69b876eb

  • SSDEEP

    393216:QQbSg4mED8QQakiC3+LJRSxhhhlevntJ7XhN6NT5+bRL1ozWc8bu8esBKpVGsFMj:POLJiwrFjO/B6ZwJc9Ga5OBgePTPMsXo

Score
10/10

Malware Config

Signatures

  • Zloader, Terdot, DELoader, ZeusSphinx

    Zloader is a malware strain that was initially discovered back in August 2015.

  • Modifies registry class 7 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\YTMonster.exe
    "C:\Users\Admin\AppData\Local\Temp\YTMonster.exe"
    1⤵
    • Modifies registry class
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2376
    • C:\Users\Admin\AppData\Local\Temp\YTMonster.exe
      "C:\Users\Admin\AppData\Local\Temp\YTMonster.exe" --type=gpu-process --no-sandbox --gpu-preferences=KAAAAAAAAACAAwCAAQAAAAAAAAAAAGAAEAAAAAAAAAAAAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAKAAAAEAAAAAAAAAAAAAAACwAAABAAAAAAAAAAAQAAAAoAAAAQAAAAAAAAAAEAAAALAAAA --service-request-channel-token=E1A927E9168E43FDA2E3B24995323F16 --mojo-platform-channel-handle=1044 /prefetch:2
      2⤵
        PID:2652
      • C:\Users\Admin\AppData\Local\Temp\YTMonster.exe
        "C:\Users\Admin\AppData\Local\Temp\YTMonster.exe" --type=renderer --no-sandbox --service-pipe-token=109AAC8979A095DAE474B78A3914A77F --lang=en-US --app-user-model-id=com.ytmonster.desktop --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --node-integration=true --webview-tag=true --no-sandbox --background-color=#131313 --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-compositor-image-animations --service-request-channel-token=109AAC8979A095DAE474B78A3914A77F --renderer-client-id=5 --mojo-platform-channel-handle=1176 /prefetch:1
        2⤵
          PID:2708
        • C:\Users\Admin\AppData\Local\Temp\YTMonster.exe
          "C:\Users\Admin\AppData\Local\Temp\YTMonster.exe" --type=gpu-process --no-sandbox --gpu-preferences=KAAAAAAAAACAAwCAAQAAAAAAAAAAAGAAEAAAAAAAAAAAAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAKAAAAEAAAAAAAAAAAAAAACwAAABAAAAAAAAAAAQAAAAoAAAAQAAAAAAAAAAEAAAALAAAA --use-gl=swiftshader-webgl --service-request-channel-token=A645E378298E36B99A386BD62BD25682 --mojo-platform-channel-handle=1492 /prefetch:2
          2⤵
            PID:2512

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          ece21868cb19229d39ef826632caa2c9

          SHA1

          a4130b651b00836655d13ba83a28c872deab242a

          SHA256

          38e0df99d706d9c57c68052905b5ce24a5e4a1cec2a3ebe98c092d30559737c3

          SHA512

          ba2d0b5b9959db4e61b4873fd30cafa221b4ae189525d511bb8c0f70efa53914ad102e495ddfb94882916b0d0f2d48b14c5fafcb968f8b02658737519411c60e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          1d9068fa024088279c88a17a2da32bc8

          SHA1

          dead668eabde113166e466f115caf4f6ec8a6308

          SHA256

          577906d0596c02c2aa92da7e7524739d44336210ba535280b76d23e46168477f

          SHA512

          0a82d1e71f27d439208bcfdad87ff637d1c587838aa97e3b3f225197d05332ec978cd5f411d301476dcff50715cfbdbe1fb82b901d547514e325eace9141c8c2

        • C:\Users\Admin\AppData\Local\Temp\Cab56E8.tmp

          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\Local\Temp\Tar57E9.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

        • memory/2376-0-0x0000000140000000-0x0000000144439000-memory.dmp

          Filesize

          68.2MB