Analysis
-
max time kernel
43s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
20/07/2022, 08:19
Behavioral task
behavioral1
Sample
EA50C625D8C9A7CB3B771C4320C122C86A2FC2A59552C88EAC44FB56F84F9EE0.exe
Resource
win7-20220718-en
7 signatures
300 seconds
General
-
Target
EA50C625D8C9A7CB3B771C4320C122C86A2FC2A59552C88EAC44FB56F84F9EE0.exe
-
Size
4.0MB
-
MD5
50a5c8876a7aa8f179ce2a6e9275ab26
-
SHA1
b09cd1faac3c23468d10cc9952c34f4615bace8d
-
SHA256
ea50c625d8c9a7cb3b771c4320c122c86a2fc2a59552c88eac44fb56f84f9ee0
-
SHA512
0b72c1f12637d4a84d891fa7f70c228385e7e6fa14a85081c3c45006b1c1625bb6067b021187fc16d08981949c36da7e648743da5b3950a92e27c1347e63633c
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral1/memory/1936-54-0x0000000000D40000-0x0000000001B08000-memory.dmp family_ytstealer behavioral1/memory/1936-57-0x0000000000D40000-0x0000000001B08000-memory.dmp family_ytstealer -
resource yara_rule behavioral1/memory/1936-54-0x0000000000D40000-0x0000000001B08000-memory.dmp upx behavioral1/memory/1936-57-0x0000000000D40000-0x0000000001B08000-memory.dmp upx -
Deletes itself 1 IoCs
pid Process 596 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1936 EA50C625D8C9A7CB3B771C4320C122C86A2FC2A59552C88EAC44FB56F84F9EE0.exe 1936 EA50C625D8C9A7CB3B771C4320C122C86A2FC2A59552C88EAC44FB56F84F9EE0.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1936 wrote to memory of 596 1936 EA50C625D8C9A7CB3B771C4320C122C86A2FC2A59552C88EAC44FB56F84F9EE0.exe 29 PID 1936 wrote to memory of 596 1936 EA50C625D8C9A7CB3B771C4320C122C86A2FC2A59552C88EAC44FB56F84F9EE0.exe 29 PID 1936 wrote to memory of 596 1936 EA50C625D8C9A7CB3B771C4320C122C86A2FC2A59552C88EAC44FB56F84F9EE0.exe 29 PID 596 wrote to memory of 916 596 cmd.exe 31 PID 596 wrote to memory of 916 596 cmd.exe 31 PID 596 wrote to memory of 916 596 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\EA50C625D8C9A7CB3B771C4320C122C86A2FC2A59552C88EAC44FB56F84F9EE0.exe"C:\Users\Admin\AppData\Local\Temp\EA50C625D8C9A7CB3B771C4320C122C86A2FC2A59552C88EAC44FB56F84F9EE0.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\EA50C625D8C9A7CB3B771C4320C122C86A2FC2A59552C88EAC44FB56F84F9EE0.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:596 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:916
-
-