Analysis

  • max time kernel
    147s
  • max time network
    163s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-07-2024 11:45

General

  • Target

    YTMonster.exe

  • Size

    67.8MB

  • MD5

    3fdb08e49c7b01e875ab9b4ba0e46b7b

  • SHA1

    fa03f357c262d40ab02c14809fbb08eed121fb61

  • SHA256

    5159761d844f5802bc9192767eae06d8eed503473c9ecbe0f949d1069a28572d

  • SHA512

    6aac18ae56b929699663f7e44898402d16b6de23100b6e2a09d3bc24e67954b6ded04014a0feb6e03558e9cda7db096e4ace93937df3aeefcaee3ccc69b876eb

  • SSDEEP

    393216:QQbSg4mED8QQakiC3+LJRSxhhhlevntJ7XhN6NT5+bRL1ozWc8bu8esBKpVGsFMj:POLJiwrFjO/B6ZwJc9Ga5OBgePTPMsXo

Score
10/10

Malware Config

Signatures

  • Zloader, Terdot, DELoader, ZeusSphinx

    Zloader is a malware strain that was initially discovered back in August 2015.

  • Modifies registry class 9 IoCs
  • Modifies system certificate store 2 TTPs 9 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\YTMonster.exe
    "C:\Users\Admin\AppData\Local\Temp\YTMonster.exe"
    1⤵
    • Modifies registry class
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:1744
    • C:\Users\Admin\AppData\Local\Temp\YTMonster.exe
      "C:\Users\Admin\AppData\Local\Temp\YTMonster.exe" --type=gpu-process --no-sandbox --gpu-preferences=KAAAAAAAAACAAwCAAQAAAAAAAAAAAGAAEAAAAAAAAAAAAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAKAAAAEAAAAAAAAAAAAAAACwAAABAAAAAAAAAAAQAAAAoAAAAQAAAAAAAAAAEAAAALAAAA --service-request-channel-token=AF394F199F983D4FD5F881AEEECD639B --mojo-platform-channel-handle=1344 /prefetch:2
      2⤵
      • Modifies registry class
      PID:2152
    • C:\Users\Admin\AppData\Local\Temp\YTMonster.exe
      "C:\Users\Admin\AppData\Local\Temp\YTMonster.exe" --type=renderer --no-sandbox --service-pipe-token=7C2348CC760690B8830408D8CA7025B8 --lang=en-US --app-user-model-id=com.ytmonster.desktop --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --node-integration=true --webview-tag=true --no-sandbox --background-color=#131313 --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-compositor-image-animations --service-request-channel-token=7C2348CC760690B8830408D8CA7025B8 --renderer-client-id=5 --mojo-platform-channel-handle=1848 /prefetch:1
      2⤵
        PID:100
      • C:\Users\Admin\AppData\Local\Temp\YTMonster.exe
        "C:\Users\Admin\AppData\Local\Temp\YTMonster.exe" --type=gpu-process --no-sandbox --gpu-preferences=KAAAAAAAAACAAwCAAQAAAAAAAAAAAGAAEAAAAAAAAAAAAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAKAAAAEAAAAAAAAAAAAAAACwAAABAAAAAAAAAAAQAAAAoAAAAQAAAAAAAAAAEAAAALAAAA --use-gl=swiftshader-webgl --service-request-channel-token=1EC8CA0DF521A3818E501AF46532248A --mojo-platform-channel-handle=2272 /prefetch:2
        2⤵
        • Modifies registry class
        PID:2908

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/100-7-0x0000000140000000-0x0000000144439000-memory.dmp

      Filesize

      68.2MB

    • memory/1744-0-0x0000000140000000-0x0000000144439000-memory.dmp

      Filesize

      68.2MB

    • memory/2152-1-0x0000000140000000-0x0000000144439000-memory.dmp

      Filesize

      68.2MB

    • memory/2908-10-0x0000000140000000-0x0000000144439000-memory.dmp

      Filesize

      68.2MB