Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
5Static
static
3YT Saver 8...et.rar
windows11-21h2-x64
3Setup.exe
windows11-21h2-x64
5YT Saver ....ma.rar
windows11-21h2-x64
3Hijack Pat...re.rar
windows11-21h2-x64
3YAMA 1.jpg
windows11-21h2-x64
3YAMA 2.jpg
windows11-21h2-x64
3YAMA 3.jpg
windows11-21h2-x64
3YAMA 4.jpg
windows11-21h2-x64
3PYG64.dll
windows11-21h2-x64
5YAMA INFO.txt
windows11-21h2-x64
3winmm.dll
windows11-21h2-x64
1ytsaverw H...64.exe
windows11-21h2-x64
3Analysis
-
max time kernel
1462s -
max time network
1485s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
07/08/2024, 05:50
Static task
static1
Behavioral task
behavioral1
Sample
YT Saver 8.0.0 - HaxPC.net.rar
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
Setup.exe
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
YT Saver .dll Yama.rar
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
Hijack Patch Picture.rar
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
YAMA 1.jpg
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
YAMA 2.jpg
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
YAMA 3.jpg
Resource
win11-20240802-en
Behavioral task
behavioral8
Sample
YAMA 4.jpg
Resource
win11-20240802-en
Behavioral task
behavioral9
Sample
PYG64.dll
Resource
win11-20240802-en
Behavioral task
behavioral10
Sample
YAMA INFO.txt
Resource
win11-20240802-en
Behavioral task
behavioral11
Sample
winmm.dll
Resource
win11-20240802-en
Behavioral task
behavioral12
Sample
ytsaverw Hijack Patch64.exe
Resource
win11-20240802-en
General
-
Target
YAMA INFO.txt
-
Size
585B
-
MD5
58578753ce753f9614220fd04e603090
-
SHA1
7b49aed462b45d7090f4a2f5d3fa2d7424f9a6f2
-
SHA256
9d26a8d7bda3484632b45b3cc3e0840383f0eaea98edeef0eca6dc70f4cc3677
-
SHA512
601024b69a1dda7211b9c9d80f0e5973f84730c1677608d60267422b5d812e977a80c50e5e06642e5a787a970613dec45b3984391c02394e758a0d07a944d5c6
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000_Classes\Local Settings cmd.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4332 wrote to memory of 3564 4332 cmd.exe 79 PID 4332 wrote to memory of 3564 4332 cmd.exe 79