Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
20/07/2022, 07:27
Behavioral task
behavioral1
Sample
1750FF8A73019BE5BBC775A85881FBD6EFD6BD626B60D86CB82447BEA260696C.exe
Resource
win7-20220718-en
6 signatures
300 seconds
General
-
Target
1750FF8A73019BE5BBC775A85881FBD6EFD6BD626B60D86CB82447BEA260696C.exe
-
Size
4.0MB
-
MD5
48ad6b7adf6f55d721909c1bf63a6039
-
SHA1
97593a0fd93a528f99c1597be743c45a7726582b
-
SHA256
1750ff8a73019be5bbc775a85881fbd6efd6bd626b60d86cb82447bea260696c
-
SHA512
f1703f1d08859828b483e25f5413303cca1ee5578919bb41446dc4585fd64fec21630f65be3ba3979a64dfdb1a6b904cab337cdda75c811ea77b49b72534de86
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral1/memory/2000-54-0x0000000000910000-0x00000000016D8000-memory.dmp family_ytstealer behavioral1/memory/2000-57-0x0000000000910000-0x00000000016D8000-memory.dmp family_ytstealer -
resource yara_rule behavioral1/memory/2000-54-0x0000000000910000-0x00000000016D8000-memory.dmp upx behavioral1/memory/2000-57-0x0000000000910000-0x00000000016D8000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2000 1750FF8A73019BE5BBC775A85881FBD6EFD6BD626B60D86CB82447BEA260696C.exe 2000 1750FF8A73019BE5BBC775A85881FBD6EFD6BD626B60D86CB82447BEA260696C.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2000 wrote to memory of 2036 2000 1750FF8A73019BE5BBC775A85881FBD6EFD6BD626B60D86CB82447BEA260696C.exe 29 PID 2000 wrote to memory of 2036 2000 1750FF8A73019BE5BBC775A85881FBD6EFD6BD626B60D86CB82447BEA260696C.exe 29 PID 2000 wrote to memory of 2036 2000 1750FF8A73019BE5BBC775A85881FBD6EFD6BD626B60D86CB82447BEA260696C.exe 29 PID 2036 wrote to memory of 1764 2036 cmd.exe 31 PID 2036 wrote to memory of 1764 2036 cmd.exe 31 PID 2036 wrote to memory of 1764 2036 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\1750FF8A73019BE5BBC775A85881FBD6EFD6BD626B60D86CB82447BEA260696C.exe"C:\Users\Admin\AppData\Local\Temp\1750FF8A73019BE5BBC775A85881FBD6EFD6BD626B60D86CB82447BEA260696C.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\1750FF8A73019BE5BBC775A85881FBD6EFD6BD626B60D86CB82447BEA260696C.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:1764
-
-