Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
5Static
static
3YT Saver 8...et.rar
windows11-21h2-x64
3Setup.exe
windows11-21h2-x64
5YT Saver ....ma.rar
windows11-21h2-x64
3Hijack Pat...re.rar
windows11-21h2-x64
3YAMA 1.jpg
windows11-21h2-x64
3YAMA 2.jpg
windows11-21h2-x64
3YAMA 3.jpg
windows11-21h2-x64
3YAMA 4.jpg
windows11-21h2-x64
3PYG64.dll
windows11-21h2-x64
5YAMA INFO.txt
windows11-21h2-x64
3winmm.dll
windows11-21h2-x64
1ytsaverw H...64.exe
windows11-21h2-x64
3Analysis
-
max time kernel
213s -
max time network
214s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
07/08/2024, 05:50
Static task
static1
Behavioral task
behavioral1
Sample
YT Saver 8.0.0 - HaxPC.net.rar
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
Setup.exe
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
YT Saver .dll Yama.rar
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
Hijack Patch Picture.rar
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
YAMA 1.jpg
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
YAMA 2.jpg
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
YAMA 3.jpg
Resource
win11-20240802-en
Behavioral task
behavioral8
Sample
YAMA 4.jpg
Resource
win11-20240802-en
Behavioral task
behavioral9
Sample
PYG64.dll
Resource
win11-20240802-en
Behavioral task
behavioral10
Sample
YAMA INFO.txt
Resource
win11-20240802-en
Behavioral task
behavioral11
Sample
winmm.dll
Resource
win11-20240802-en
Behavioral task
behavioral12
Sample
ytsaverw Hijack Patch64.exe
Resource
win11-20240802-en
General
-
Target
ytsaverw Hijack Patch64.exe
-
Size
2.3MB
-
MD5
aefe350e31b4c82c75533401e4592ced
-
SHA1
2222f9a3292a8073931b992deaf79d0a7acf1e5a
-
SHA256
3f6978502a17d859f35727a3bf955d44407cb88ffe821cedc522236025642c3c
-
SHA512
134f091b1c526f607bc16e231f71345939cb75c2876f81320857d8d4c863d127e89d0022e8fcf639c7d0616707655e0b7e0778b5a5ec54daca9837c0d51dde19
-
SSDEEP
49152:p94SoRH2HQTXGVoyJ3C7xjTGtqYVYkXPlTaW9T03m:340qyk7hTGtjVYktl
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 40 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-242286936-336880687-2152680090-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 820074001c0043465346160031000000000002593279120041707044617461000000741a595e96dfd3488d671733bcee28bac5cdfadf9f6756418947c5c76bc0b67f400009000400efbe025932790759972e2e0000006e570200000001000000000000000000000000000000ff4e85004100700070004400610074006100000042000000 ytsaverw Hijack Patch64.exe Set value (data) \REGISTRY\USER\S-1-5-21-242286936-336880687-2152680090-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff ytsaverw Hijack Patch64.exe Set value (str) \REGISTRY\USER\S-1-5-21-242286936-336880687-2152680090-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" ytsaverw Hijack Patch64.exe Set value (int) \REGISTRY\USER\S-1-5-21-242286936-336880687-2152680090-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" ytsaverw Hijack Patch64.exe Key created \REGISTRY\USER\S-1-5-21-242286936-336880687-2152680090-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 ytsaverw Hijack Patch64.exe Set value (data) \REGISTRY\USER\S-1-5-21-242286936-336880687-2152680090-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff ytsaverw Hijack Patch64.exe Set value (data) \REGISTRY\USER\S-1-5-21-242286936-336880687-2152680090-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f44471a0359723fa74489c55595fe6b30ee0000 ytsaverw Hijack Patch64.exe Key created \REGISTRY\USER\S-1-5-21-242286936-336880687-2152680090-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg ytsaverw Hijack Patch64.exe Set value (int) \REGISTRY\USER\S-1-5-21-242286936-336880687-2152680090-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" ytsaverw Hijack Patch64.exe Set value (data) \REGISTRY\USER\S-1-5-21-242286936-336880687-2152680090-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 ytsaverw Hijack Patch64.exe Key created \REGISTRY\USER\S-1-5-21-242286936-336880687-2152680090-1000_Classes\Local Settings ytsaverw Hijack Patch64.exe Set value (data) \REGISTRY\USER\S-1-5-21-242286936-336880687-2152680090-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 50003100000000000259247b10004c6f63616c003c0009000400efbe025932790759972e2e00000082570200000001000000000000000000000000000000fa1054004c006f00630061006c00000014000000 ytsaverw Hijack Patch64.exe Set value (data) \REGISTRY\USER\S-1-5-21-242286936-336880687-2152680090-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 ytsaverw Hijack Patch64.exe Key created \REGISTRY\USER\S-1-5-21-242286936-336880687-2152680090-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell ytsaverw Hijack Patch64.exe Set value (int) \REGISTRY\USER\S-1-5-21-242286936-336880687-2152680090-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" ytsaverw Hijack Patch64.exe Set value (int) \REGISTRY\USER\S-1-5-21-242286936-336880687-2152680090-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" ytsaverw Hijack Patch64.exe Key created \REGISTRY\USER\S-1-5-21-242286936-336880687-2152680090-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU ytsaverw Hijack Patch64.exe Set value (data) \REGISTRY\USER\S-1-5-21-242286936-336880687-2152680090-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff ytsaverw Hijack Patch64.exe Key created \REGISTRY\USER\S-1-5-21-242286936-336880687-2152680090-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 ytsaverw Hijack Patch64.exe Set value (data) \REGISTRY\USER\S-1-5-21-242286936-336880687-2152680090-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff ytsaverw Hijack Patch64.exe Set value (int) \REGISTRY\USER\S-1-5-21-242286936-336880687-2152680090-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\NodeSlot = "1" ytsaverw Hijack Patch64.exe Set value (int) \REGISTRY\USER\S-1-5-21-242286936-336880687-2152680090-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" ytsaverw Hijack Patch64.exe Set value (str) \REGISTRY\USER\S-1-5-21-242286936-336880687-2152680090-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" ytsaverw Hijack Patch64.exe Set value (int) \REGISTRY\USER\S-1-5-21-242286936-336880687-2152680090-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" ytsaverw Hijack Patch64.exe Set value (data) \REGISTRY\USER\S-1-5-21-242286936-336880687-2152680090-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots ytsaverw Hijack Patch64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ ytsaverw Hijack Patch64.exe Key created \REGISTRY\USER\S-1-5-21-242286936-336880687-2152680090-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ ytsaverw Hijack Patch64.exe Set value (data) \REGISTRY\USER\S-1-5-21-242286936-336880687-2152680090-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 ytsaverw Hijack Patch64.exe Key created \REGISTRY\USER\S-1-5-21-242286936-336880687-2152680090-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 ytsaverw Hijack Patch64.exe Set value (data) \REGISTRY\USER\S-1-5-21-242286936-336880687-2152680090-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 4e0031000000000002594d7e100054656d7000003a0009000400efbe0259327902594d7e2e00000083570200000001000000000000000000000000000000db708300540065006d007000000014000000 ytsaverw Hijack Patch64.exe Set value (data) \REGISTRY\USER\S-1-5-21-242286936-336880687-2152680090-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff ytsaverw Hijack Patch64.exe Set value (int) \REGISTRY\USER\S-1-5-21-242286936-336880687-2152680090-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" ytsaverw Hijack Patch64.exe Key created \REGISTRY\USER\S-1-5-21-242286936-336880687-2152680090-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell ytsaverw Hijack Patch64.exe Set value (data) \REGISTRY\USER\S-1-5-21-242286936-336880687-2152680090-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = ffffffff ytsaverw Hijack Patch64.exe Key created \REGISTRY\USER\S-1-5-21-242286936-336880687-2152680090-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags ytsaverw Hijack Patch64.exe Key created \REGISTRY\USER\S-1-5-21-242286936-336880687-2152680090-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 ytsaverw Hijack Patch64.exe Key created \Registry\User\S-1-5-21-242286936-336880687-2152680090-1000_Classes\NotificationData ytsaverw Hijack Patch64.exe Key created \REGISTRY\USER\S-1-5-21-242286936-336880687-2152680090-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} ytsaverw Hijack Patch64.exe Set value (int) \REGISTRY\USER\S-1-5-21-242286936-336880687-2152680090-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" ytsaverw Hijack Patch64.exe Key created \REGISTRY\USER\S-1-5-21-242286936-336880687-2152680090-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 ytsaverw Hijack Patch64.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2608 ytsaverw Hijack Patch64.exe 2608 ytsaverw Hijack Patch64.exe 2608 ytsaverw Hijack Patch64.exe