Analysis
-
max time kernel
43s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
12/07/2022, 02:07
Static task
static1
Behavioral task
behavioral1
Sample
1f8e32633f1f438d64e2c74e0b3867d2bdbca53d1aa2ab01735f9c6eec2ff3c0.exe
Resource
win7-20220414-en
0 signatures
0 seconds
General
-
Target
1f8e32633f1f438d64e2c74e0b3867d2bdbca53d1aa2ab01735f9c6eec2ff3c0.exe
-
Size
4.0MB
-
MD5
a376e47a9a7a36ad3d6c3f0bcfac8b7c
-
SHA1
e68b5e93ecffa94af12750f00ab801940c841137
-
SHA256
1f8e32633f1f438d64e2c74e0b3867d2bdbca53d1aa2ab01735f9c6eec2ff3c0
-
SHA512
835fa61bdb643e73c57e44a0bfbe7501a5734c2dd1b0afbcf7a54898b08c7007b9d0ad1cca280552aecd344e0da69461db136ad9afb3d7d3063ebd0dd977c359
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral1/memory/1632-54-0x0000000000010000-0x0000000000DD9000-memory.dmp family_ytstealer behavioral1/memory/1632-57-0x0000000000010000-0x0000000000DD9000-memory.dmp family_ytstealer -
resource yara_rule behavioral1/memory/1632-54-0x0000000000010000-0x0000000000DD9000-memory.dmp upx behavioral1/memory/1632-57-0x0000000000010000-0x0000000000DD9000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1632 1f8e32633f1f438d64e2c74e0b3867d2bdbca53d1aa2ab01735f9c6eec2ff3c0.exe 1632 1f8e32633f1f438d64e2c74e0b3867d2bdbca53d1aa2ab01735f9c6eec2ff3c0.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1632 wrote to memory of 812 1632 1f8e32633f1f438d64e2c74e0b3867d2bdbca53d1aa2ab01735f9c6eec2ff3c0.exe 29 PID 1632 wrote to memory of 812 1632 1f8e32633f1f438d64e2c74e0b3867d2bdbca53d1aa2ab01735f9c6eec2ff3c0.exe 29 PID 1632 wrote to memory of 812 1632 1f8e32633f1f438d64e2c74e0b3867d2bdbca53d1aa2ab01735f9c6eec2ff3c0.exe 29 PID 812 wrote to memory of 432 812 cmd.exe 31 PID 812 wrote to memory of 432 812 cmd.exe 31 PID 812 wrote to memory of 432 812 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f8e32633f1f438d64e2c74e0b3867d2bdbca53d1aa2ab01735f9c6eec2ff3c0.exe"C:\Users\Admin\AppData\Local\Temp\1f8e32633f1f438d64e2c74e0b3867d2bdbca53d1aa2ab01735f9c6eec2ff3c0.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\1f8e32633f1f438d64e2c74e0b3867d2bdbca53d1aa2ab01735f9c6eec2ff3c0.exe2⤵
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:432
-
-