Analysis
-
max time kernel
41s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
20/07/2022, 08:18
Behavioral task
behavioral1
Sample
E31E725909B115601EFEA63FDECD2CA3C283657CB752FB7C9C46B19FFB23BED9.exe
Resource
win7-20220718-en
7 signatures
300 seconds
General
-
Target
E31E725909B115601EFEA63FDECD2CA3C283657CB752FB7C9C46B19FFB23BED9.exe
-
Size
4.0MB
-
MD5
8ce9e5d7d30ab124b69bc3ff0c1d9d4c
-
SHA1
65aa51dc471515d16e4350fc0fbd8b302f468ec0
-
SHA256
e31e725909b115601efea63fdecd2ca3c283657cb752fb7c9c46b19ffb23bed9
-
SHA512
724757de3f0f4228c373cbff27f6375998a988ea7d2f5bbec89504f5e438a3e9ee621a2cb229122d8e2934b4d0910a5317d7e09d890a3aeb0724c54655910f27
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral1/memory/2024-54-0x0000000000AF0000-0x00000000018B8000-memory.dmp family_ytstealer behavioral1/memory/2024-57-0x0000000000AF0000-0x00000000018B8000-memory.dmp family_ytstealer -
resource yara_rule behavioral1/memory/2024-54-0x0000000000AF0000-0x00000000018B8000-memory.dmp upx behavioral1/memory/2024-57-0x0000000000AF0000-0x00000000018B8000-memory.dmp upx -
Deletes itself 1 IoCs
pid Process 1888 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2024 E31E725909B115601EFEA63FDECD2CA3C283657CB752FB7C9C46B19FFB23BED9.exe 2024 E31E725909B115601EFEA63FDECD2CA3C283657CB752FB7C9C46B19FFB23BED9.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2024 wrote to memory of 1888 2024 E31E725909B115601EFEA63FDECD2CA3C283657CB752FB7C9C46B19FFB23BED9.exe 29 PID 2024 wrote to memory of 1888 2024 E31E725909B115601EFEA63FDECD2CA3C283657CB752FB7C9C46B19FFB23BED9.exe 29 PID 2024 wrote to memory of 1888 2024 E31E725909B115601EFEA63FDECD2CA3C283657CB752FB7C9C46B19FFB23BED9.exe 29 PID 1888 wrote to memory of 1148 1888 cmd.exe 31 PID 1888 wrote to memory of 1148 1888 cmd.exe 31 PID 1888 wrote to memory of 1148 1888 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\E31E725909B115601EFEA63FDECD2CA3C283657CB752FB7C9C46B19FFB23BED9.exe"C:\Users\Admin\AppData\Local\Temp\E31E725909B115601EFEA63FDECD2CA3C283657CB752FB7C9C46B19FFB23BED9.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\E31E725909B115601EFEA63FDECD2CA3C283657CB752FB7C9C46B19FFB23BED9.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:1148
-
-