Analysis
-
max time kernel
41s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
20/07/2022, 08:09
Behavioral task
behavioral1
Sample
C8EB102C1E6C7053FC13CCFBA225967DE93AAD98F6E196CB3D2993A2C2561AB1.exe
Resource
win7-20220718-en
7 signatures
300 seconds
General
-
Target
C8EB102C1E6C7053FC13CCFBA225967DE93AAD98F6E196CB3D2993A2C2561AB1.exe
-
Size
4.0MB
-
MD5
cd9fbd4ff095452f930a81105f2540e2
-
SHA1
690eb532bc2c98ba6634d99dfe35114fdead8f73
-
SHA256
c8eb102c1e6c7053fc13ccfba225967de93aad98f6e196cb3d2993a2c2561ab1
-
SHA512
3c2e0e6aacd0df6d8b170ab1cde6e85e806e3c7fd15831f9f8af2c6378e3e4e6ca4c43bbacbe5b754ebcfc2c224933080f7884a5ec02128502a7112b99de83b1
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral1/memory/1028-54-0x0000000000AA0000-0x0000000001868000-memory.dmp family_ytstealer behavioral1/memory/1028-57-0x0000000000AA0000-0x0000000001868000-memory.dmp family_ytstealer -
resource yara_rule behavioral1/memory/1028-54-0x0000000000AA0000-0x0000000001868000-memory.dmp upx behavioral1/memory/1028-57-0x0000000000AA0000-0x0000000001868000-memory.dmp upx -
Deletes itself 1 IoCs
pid Process 1760 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1028 C8EB102C1E6C7053FC13CCFBA225967DE93AAD98F6E196CB3D2993A2C2561AB1.exe 1028 C8EB102C1E6C7053FC13CCFBA225967DE93AAD98F6E196CB3D2993A2C2561AB1.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1028 wrote to memory of 1760 1028 C8EB102C1E6C7053FC13CCFBA225967DE93AAD98F6E196CB3D2993A2C2561AB1.exe 29 PID 1028 wrote to memory of 1760 1028 C8EB102C1E6C7053FC13CCFBA225967DE93AAD98F6E196CB3D2993A2C2561AB1.exe 29 PID 1028 wrote to memory of 1760 1028 C8EB102C1E6C7053FC13CCFBA225967DE93AAD98F6E196CB3D2993A2C2561AB1.exe 29 PID 1760 wrote to memory of 764 1760 cmd.exe 31 PID 1760 wrote to memory of 764 1760 cmd.exe 31 PID 1760 wrote to memory of 764 1760 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\C8EB102C1E6C7053FC13CCFBA225967DE93AAD98F6E196CB3D2993A2C2561AB1.exe"C:\Users\Admin\AppData\Local\Temp\C8EB102C1E6C7053FC13CCFBA225967DE93AAD98F6E196CB3D2993A2C2561AB1.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\C8EB102C1E6C7053FC13CCFBA225967DE93AAD98F6E196CB3D2993A2C2561AB1.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:764
-
-