Overview
overview
5Static
static
3YT Saver 8...et.rar
windows11-21h2-x64
3Setup.exe
windows11-21h2-x64
5YT Saver ....ma.rar
windows11-21h2-x64
3Hijack Pat...re.rar
windows11-21h2-x64
3YAMA 1.jpg
windows11-21h2-x64
3YAMA 2.jpg
windows11-21h2-x64
3YAMA 3.jpg
windows11-21h2-x64
3YAMA 4.jpg
windows11-21h2-x64
3PYG64.dll
windows11-21h2-x64
5YAMA INFO.txt
windows11-21h2-x64
3winmm.dll
windows11-21h2-x64
1ytsaverw H...64.exe
windows11-21h2-x64
3Analysis
-
max time kernel
1441s -
max time network
1463s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
07-08-2024 05:50
Static task
static1
Behavioral task
behavioral1
Sample
YT Saver 8.0.0 - HaxPC.net.rar
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
Setup.exe
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
YT Saver .dll Yama.rar
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
Hijack Patch Picture.rar
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
YAMA 1.jpg
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
YAMA 2.jpg
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
YAMA 3.jpg
Resource
win11-20240802-en
Behavioral task
behavioral8
Sample
YAMA 4.jpg
Resource
win11-20240802-en
Behavioral task
behavioral9
Sample
PYG64.dll
Resource
win11-20240802-en
Behavioral task
behavioral10
Sample
YAMA INFO.txt
Resource
win11-20240802-en
Behavioral task
behavioral11
Sample
winmm.dll
Resource
win11-20240802-en
Behavioral task
behavioral12
Sample
ytsaverw Hijack Patch64.exe
Resource
win11-20240802-en
General
-
Target
Hijack Patch Picture.rar
-
Size
257KB
-
MD5
087456483a2e4943b9777d4c36b70b1b
-
SHA1
fe70eabfa51ed3200dc14f097c6010dac5a696c5
-
SHA256
75d35b3f58c5d5da388407ae2c44ca82cde13753be5a76d99920c996b9894cc2
-
SHA512
b4767fa60badc980c202e4fead6142ec4b8560024770ce447f29ba4f1a8dcf07076bf004ce1fb032ffcf2ab9bb704ba53ccaec8417ee1e5793aeda35e33cb2df
-
SSDEEP
6144:408NIPkk9DRd5BhcnZetsi+x91J+/j+wyQNS707fLZ:408NI7btankq1J+/Zs47d
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2842058299-443432012-2465494467-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2842058299-443432012-2465494467-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2892 OpenWith.exe