Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
20/07/2022, 08:15
Behavioral task
behavioral1
Sample
D779813711126484668391068C6845DB71E7983D5B4C01A192D1208C8777E14F.exe
Resource
win7-20220718-en
6 signatures
300 seconds
General
-
Target
D779813711126484668391068C6845DB71E7983D5B4C01A192D1208C8777E14F.exe
-
Size
4.0MB
-
MD5
407d43e4d1bd53450b265e75cac1c7ee
-
SHA1
67057def6a4cc0f0ec5979c066ebd855af7dd7eb
-
SHA256
d779813711126484668391068c6845db71e7983d5b4c01a192d1208c8777e14f
-
SHA512
22e43c38130fbb5f9b312f89d060bb763fa3dbf538019123c407e9fccabb6f00df354956a67a6bac486d0b4db453e8b656162d93e620034c32b28737e8355142
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral1/memory/364-54-0x00000000012E0000-0x00000000020A8000-memory.dmp family_ytstealer behavioral1/memory/364-57-0x00000000012E0000-0x00000000020A8000-memory.dmp family_ytstealer -
resource yara_rule behavioral1/memory/364-54-0x00000000012E0000-0x00000000020A8000-memory.dmp upx behavioral1/memory/364-57-0x00000000012E0000-0x00000000020A8000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 364 D779813711126484668391068C6845DB71E7983D5B4C01A192D1208C8777E14F.exe 364 D779813711126484668391068C6845DB71E7983D5B4C01A192D1208C8777E14F.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 364 wrote to memory of 332 364 D779813711126484668391068C6845DB71E7983D5B4C01A192D1208C8777E14F.exe 29 PID 364 wrote to memory of 332 364 D779813711126484668391068C6845DB71E7983D5B4C01A192D1208C8777E14F.exe 29 PID 364 wrote to memory of 332 364 D779813711126484668391068C6845DB71E7983D5B4C01A192D1208C8777E14F.exe 29 PID 332 wrote to memory of 464 332 cmd.exe 31 PID 332 wrote to memory of 464 332 cmd.exe 31 PID 332 wrote to memory of 464 332 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\D779813711126484668391068C6845DB71E7983D5B4C01A192D1208C8777E14F.exe"C:\Users\Admin\AppData\Local\Temp\D779813711126484668391068C6845DB71E7983D5B4C01A192D1208C8777E14F.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:364 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\D779813711126484668391068C6845DB71E7983D5B4C01A192D1208C8777E14F.exe2⤵
- Suspicious use of WriteProcessMemory
PID:332 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:464
-
-