Analysis
-
max time kernel
41s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
20/07/2022, 07:24
Behavioral task
behavioral1
Sample
09D9F55CEFA3DFF5EF3FF5EC3CA7500DB225FD6E56BFE278BA6907C16B6C79CB.exe
Resource
win7-20220715-en
6 signatures
300 seconds
General
-
Target
09D9F55CEFA3DFF5EF3FF5EC3CA7500DB225FD6E56BFE278BA6907C16B6C79CB.exe
-
Size
4.0MB
-
MD5
7bfa990e3d835cd08e29168d6184cd6c
-
SHA1
a37e6a762885a86bcd5d56ed5aca2dab021fde60
-
SHA256
09d9f55cefa3dff5ef3ff5ec3ca7500db225fd6e56bfe278ba6907c16b6c79cb
-
SHA512
206bdcc26c95ca0407c3c922db45ccccda9630126e45b36f1a9ae5a3dece793f18e7fd1279c0f4f097791cfdace74ac75aef937381b229c050ee3841834772a0
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral1/memory/2000-54-0x0000000000BC0000-0x0000000001999000-memory.dmp family_ytstealer behavioral1/memory/2000-57-0x0000000000BC0000-0x0000000001999000-memory.dmp family_ytstealer -
resource yara_rule behavioral1/memory/2000-54-0x0000000000BC0000-0x0000000001999000-memory.dmp upx behavioral1/memory/2000-57-0x0000000000BC0000-0x0000000001999000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2000 09D9F55CEFA3DFF5EF3FF5EC3CA7500DB225FD6E56BFE278BA6907C16B6C79CB.exe 2000 09D9F55CEFA3DFF5EF3FF5EC3CA7500DB225FD6E56BFE278BA6907C16B6C79CB.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2000 wrote to memory of 1764 2000 09D9F55CEFA3DFF5EF3FF5EC3CA7500DB225FD6E56BFE278BA6907C16B6C79CB.exe 28 PID 2000 wrote to memory of 1764 2000 09D9F55CEFA3DFF5EF3FF5EC3CA7500DB225FD6E56BFE278BA6907C16B6C79CB.exe 28 PID 2000 wrote to memory of 1764 2000 09D9F55CEFA3DFF5EF3FF5EC3CA7500DB225FD6E56BFE278BA6907C16B6C79CB.exe 28 PID 1764 wrote to memory of 524 1764 cmd.exe 30 PID 1764 wrote to memory of 524 1764 cmd.exe 30 PID 1764 wrote to memory of 524 1764 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\09D9F55CEFA3DFF5EF3FF5EC3CA7500DB225FD6E56BFE278BA6907C16B6C79CB.exe"C:\Users\Admin\AppData\Local\Temp\09D9F55CEFA3DFF5EF3FF5EC3CA7500DB225FD6E56BFE278BA6907C16B6C79CB.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\09D9F55CEFA3DFF5EF3FF5EC3CA7500DB225FD6E56BFE278BA6907C16B6C79CB.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:524
-
-