Analysis
-
max time kernel
44s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
20/07/2022, 08:15
Behavioral task
behavioral1
Sample
D97841D8F4D129FDD2C57C8F9BA1721117C821A8002BE2174A4B8843879A1A2B.exe
Resource
win7-20220715-en
6 signatures
300 seconds
General
-
Target
D97841D8F4D129FDD2C57C8F9BA1721117C821A8002BE2174A4B8843879A1A2B.exe
-
Size
4.0MB
-
MD5
9501c4983d063c52071cb9ddb2e99912
-
SHA1
1d0f67662bf0bcac6cd75f7132ac810dff828c6b
-
SHA256
d97841d8f4d129fdd2c57c8f9ba1721117c821a8002be2174a4b8843879a1a2b
-
SHA512
dc02561bad6dded1e006f06b7ffca3fff3eba7cbfdf84da5805807a1f8c829e6a385e6a6ddb909e15de1eb84b5a30d270622d48b579326f118fc384e0b338a55
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral1/memory/1672-54-0x0000000000100000-0x0000000000EC8000-memory.dmp family_ytstealer behavioral1/memory/1672-57-0x0000000000100000-0x0000000000EC8000-memory.dmp family_ytstealer -
resource yara_rule behavioral1/memory/1672-54-0x0000000000100000-0x0000000000EC8000-memory.dmp upx behavioral1/memory/1672-57-0x0000000000100000-0x0000000000EC8000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1672 D97841D8F4D129FDD2C57C8F9BA1721117C821A8002BE2174A4B8843879A1A2B.exe 1672 D97841D8F4D129FDD2C57C8F9BA1721117C821A8002BE2174A4B8843879A1A2B.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1672 wrote to memory of 884 1672 D97841D8F4D129FDD2C57C8F9BA1721117C821A8002BE2174A4B8843879A1A2B.exe 28 PID 1672 wrote to memory of 884 1672 D97841D8F4D129FDD2C57C8F9BA1721117C821A8002BE2174A4B8843879A1A2B.exe 28 PID 1672 wrote to memory of 884 1672 D97841D8F4D129FDD2C57C8F9BA1721117C821A8002BE2174A4B8843879A1A2B.exe 28 PID 884 wrote to memory of 1168 884 cmd.exe 30 PID 884 wrote to memory of 1168 884 cmd.exe 30 PID 884 wrote to memory of 1168 884 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\D97841D8F4D129FDD2C57C8F9BA1721117C821A8002BE2174A4B8843879A1A2B.exe"C:\Users\Admin\AppData\Local\Temp\D97841D8F4D129FDD2C57C8F9BA1721117C821A8002BE2174A4B8843879A1A2B.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\D97841D8F4D129FDD2C57C8F9BA1721117C821A8002BE2174A4B8843879A1A2B.exe2⤵
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:1168
-
-