Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
27-07-2024 15:10
Static task
static1
Behavioral task
behavioral1
Sample
YouTubeDownloader-x64.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
YouTubeDownloader-x64.exe
Resource
win10v2004-20240709-en
General
-
Target
YouTubeDownloader-x64.exe
-
Size
64.2MB
-
MD5
38e76ae7de40b8bd7b08c89b820e2b4e
-
SHA1
254a9b73eab4b9c8099ad925042065fb8605c8cd
-
SHA256
dec9fb38b6f7c29b3c2eaa05c00fae48309a00d25ce185867c095c010327c9bc
-
SHA512
402b5c1ed7ace784720de082d894dead5e8f4670b7d9473d1791565e0fbfe7ee87402d82c305b30399a73c2ec9f62ea45762062f27227b97b74dc9db572d457c
-
SSDEEP
1572864:9Olu4gYePepqStz5YizIBsdnQKl9y2FlGezc6ZvAG9I8fOrygw/KJB:9OloO2rm5fFYN2IZ8fLIB
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 340 YouTubeDownloader-x64.tmp -
Loads dropped DLL 1 IoCs
pid Process 2648 YouTubeDownloader-x64.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language YouTubeDownloader-x64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language YouTubeDownloader-x64.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2648 wrote to memory of 340 2648 YouTubeDownloader-x64.exe 30 PID 2648 wrote to memory of 340 2648 YouTubeDownloader-x64.exe 30 PID 2648 wrote to memory of 340 2648 YouTubeDownloader-x64.exe 30 PID 2648 wrote to memory of 340 2648 YouTubeDownloader-x64.exe 30 PID 2648 wrote to memory of 340 2648 YouTubeDownloader-x64.exe 30 PID 2648 wrote to memory of 340 2648 YouTubeDownloader-x64.exe 30 PID 2648 wrote to memory of 340 2648 YouTubeDownloader-x64.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\YouTubeDownloader-x64.exe"C:\Users\Admin\AppData\Local\Temp\YouTubeDownloader-x64.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\is-BF11J.tmp\YouTubeDownloader-x64.tmp"C:\Users\Admin\AppData\Local\Temp\is-BF11J.tmp\YouTubeDownloader-x64.tmp" /SL5="$4010A,66819794,121344,C:\Users\Admin\AppData\Local\Temp\YouTubeDownloader-x64.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD52ca9bc60aafb486e963b10c91cc01df5
SHA11133df3eb0d6256be1497ffb45d085fc1175f8c3
SHA256c6807e2afebb9d3ebb7d91ad4528e97d041ba02b0e57f6932bc27d17bf74b10f
SHA512a875906b0dc4119b2815bc79003aae355ad8d3a8b08b8b3155e680014a6f6b1d7a0775969af3e452dbabedb3c2dd4ba3f2716f29efdce2c6c597ad53dd2a364c