Analysis
-
max time kernel
45s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
20/07/2022, 08:22
Behavioral task
behavioral1
Sample
F16394A45ABD07B0B55567433611E4ABEB3521E4870C9BD117E60A4038C86D8C.exe
Resource
win7-20220718-en
6 signatures
300 seconds
General
-
Target
F16394A45ABD07B0B55567433611E4ABEB3521E4870C9BD117E60A4038C86D8C.exe
-
Size
4.0MB
-
MD5
934c2936029b64ab1aaf6234924ef34f
-
SHA1
3b44adb55a34a07eee4bb75d011828b1132ac600
-
SHA256
f16394a45abd07b0b55567433611e4abeb3521e4870c9bd117e60a4038c86d8c
-
SHA512
b252918cc3e661c9fa86ab8878ebe296e516a2613f2ec272298b19a0e3cdb9d8acf596c5bafca4c03635d4bbf5edbf910899d21ac36fa93d1d3d3403e4cbf0db
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral1/memory/908-54-0x00000000012C0000-0x0000000002088000-memory.dmp family_ytstealer behavioral1/memory/908-57-0x00000000012C0000-0x0000000002088000-memory.dmp family_ytstealer -
resource yara_rule behavioral1/memory/908-54-0x00000000012C0000-0x0000000002088000-memory.dmp upx behavioral1/memory/908-57-0x00000000012C0000-0x0000000002088000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 908 F16394A45ABD07B0B55567433611E4ABEB3521E4870C9BD117E60A4038C86D8C.exe 908 F16394A45ABD07B0B55567433611E4ABEB3521E4870C9BD117E60A4038C86D8C.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 908 wrote to memory of 1068 908 F16394A45ABD07B0B55567433611E4ABEB3521E4870C9BD117E60A4038C86D8C.exe 30 PID 908 wrote to memory of 1068 908 F16394A45ABD07B0B55567433611E4ABEB3521E4870C9BD117E60A4038C86D8C.exe 30 PID 908 wrote to memory of 1068 908 F16394A45ABD07B0B55567433611E4ABEB3521E4870C9BD117E60A4038C86D8C.exe 30 PID 1068 wrote to memory of 468 1068 cmd.exe 28 PID 1068 wrote to memory of 468 1068 cmd.exe 28 PID 1068 wrote to memory of 468 1068 cmd.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\F16394A45ABD07B0B55567433611E4ABEB3521E4870C9BD117E60A4038C86D8C.exe"C:\Users\Admin\AppData\Local\Temp\F16394A45ABD07B0B55567433611E4ABEB3521E4870C9BD117E60A4038C86D8C.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\F16394A45ABD07B0B55567433611E4ABEB3521E4870C9BD117E60A4038C86D8C.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1068
-
-
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 01⤵PID:468