Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
20/07/2022, 08:12
Behavioral task
behavioral1
Sample
CEB347EB751265CF60634B7D017FEEA6665A78AE17EC1E51DDECEE791662DD71.exe
Resource
win7-20220718-en
6 signatures
300 seconds
General
-
Target
CEB347EB751265CF60634B7D017FEEA6665A78AE17EC1E51DDECEE791662DD71.exe
-
Size
4.0MB
-
MD5
23e195e5f5a1d168b084c5ba124dfb47
-
SHA1
302ebac608b9ca82f2780f354e70c4628e325190
-
SHA256
ceb347eb751265cf60634b7d017feea6665a78ae17ec1e51ddecee791662dd71
-
SHA512
d5c46958033ccdf063abc354e5b6b513ea1520ed6bf1b0550d53854ddfc86d3954a2b0290284fc55acb412be4151ba72caf172677a9892d14999d633dacad6a3
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral1/memory/1584-54-0x00000000009E0000-0x00000000017A9000-memory.dmp family_ytstealer behavioral1/memory/1584-57-0x00000000009E0000-0x00000000017A9000-memory.dmp family_ytstealer -
resource yara_rule behavioral1/memory/1584-54-0x00000000009E0000-0x00000000017A9000-memory.dmp upx behavioral1/memory/1584-57-0x00000000009E0000-0x00000000017A9000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1584 CEB347EB751265CF60634B7D017FEEA6665A78AE17EC1E51DDECEE791662DD71.exe 1584 CEB347EB751265CF60634B7D017FEEA6665A78AE17EC1E51DDECEE791662DD71.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1584 wrote to memory of 1676 1584 CEB347EB751265CF60634B7D017FEEA6665A78AE17EC1E51DDECEE791662DD71.exe 29 PID 1584 wrote to memory of 1676 1584 CEB347EB751265CF60634B7D017FEEA6665A78AE17EC1E51DDECEE791662DD71.exe 29 PID 1584 wrote to memory of 1676 1584 CEB347EB751265CF60634B7D017FEEA6665A78AE17EC1E51DDECEE791662DD71.exe 29 PID 1676 wrote to memory of 572 1676 cmd.exe 31 PID 1676 wrote to memory of 572 1676 cmd.exe 31 PID 1676 wrote to memory of 572 1676 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\CEB347EB751265CF60634B7D017FEEA6665A78AE17EC1E51DDECEE791662DD71.exe"C:\Users\Admin\AppData\Local\Temp\CEB347EB751265CF60634B7D017FEEA6665A78AE17EC1E51DDECEE791662DD71.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\CEB347EB751265CF60634B7D017FEEA6665A78AE17EC1E51DDECEE791662DD71.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:572
-
-