Analysis
-
max time kernel
43s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
20/07/2022, 08:19
Behavioral task
behavioral1
Sample
EB5DB0C99ABA3BBAC6A03EA74B76D0A3B61A970F780F6122671AC13A1D10B4BA.exe
Resource
win7-20220718-en
7 signatures
300 seconds
General
-
Target
EB5DB0C99ABA3BBAC6A03EA74B76D0A3B61A970F780F6122671AC13A1D10B4BA.exe
-
Size
4.0MB
-
MD5
a3c197e6f6023c153fe8de14f21e85f4
-
SHA1
07d844b53f66c680e92e7bc65a01259151dabbfb
-
SHA256
eb5db0c99aba3bbac6a03ea74b76d0a3b61a970f780f6122671ac13a1d10b4ba
-
SHA512
56e6a824a4a11abe496b055759b903f6fdbec53c25552a945a355167938dcae7dbb46f9f2232271ce7b13ef6260e3b35ee9664edd8c0f2c7751166de990a6dd2
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral1/memory/1140-54-0x00000000001F0000-0x0000000000FB8000-memory.dmp family_ytstealer behavioral1/memory/1140-56-0x00000000001F0000-0x0000000000FB8000-memory.dmp family_ytstealer -
resource yara_rule behavioral1/memory/1140-54-0x00000000001F0000-0x0000000000FB8000-memory.dmp upx behavioral1/memory/1140-56-0x00000000001F0000-0x0000000000FB8000-memory.dmp upx -
Deletes itself 1 IoCs
pid Process 560 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1140 EB5DB0C99ABA3BBAC6A03EA74B76D0A3B61A970F780F6122671AC13A1D10B4BA.exe 1140 EB5DB0C99ABA3BBAC6A03EA74B76D0A3B61A970F780F6122671AC13A1D10B4BA.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1140 wrote to memory of 560 1140 EB5DB0C99ABA3BBAC6A03EA74B76D0A3B61A970F780F6122671AC13A1D10B4BA.exe 29 PID 1140 wrote to memory of 560 1140 EB5DB0C99ABA3BBAC6A03EA74B76D0A3B61A970F780F6122671AC13A1D10B4BA.exe 29 PID 1140 wrote to memory of 560 1140 EB5DB0C99ABA3BBAC6A03EA74B76D0A3B61A970F780F6122671AC13A1D10B4BA.exe 29 PID 560 wrote to memory of 1316 560 cmd.exe 31 PID 560 wrote to memory of 1316 560 cmd.exe 31 PID 560 wrote to memory of 1316 560 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\EB5DB0C99ABA3BBAC6A03EA74B76D0A3B61A970F780F6122671AC13A1D10B4BA.exe"C:\Users\Admin\AppData\Local\Temp\EB5DB0C99ABA3BBAC6A03EA74B76D0A3B61A970F780F6122671AC13A1D10B4BA.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\EB5DB0C99ABA3BBAC6A03EA74B76D0A3B61A970F780F6122671AC13A1D10B4BA.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:1316
-
-