Analysis
-
max time kernel
44s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
20/07/2022, 08:22
Behavioral task
behavioral1
Sample
F8D8AF9B56352051817A7EEC3D9D5796DD2415752C8761585F4E6C18E3588D57.exe
Resource
win7-20220715-en
6 signatures
300 seconds
General
-
Target
F8D8AF9B56352051817A7EEC3D9D5796DD2415752C8761585F4E6C18E3588D57.exe
-
Size
4.0MB
-
MD5
f06fd38d0378b33350dc4f7219e5d620
-
SHA1
6d7a2b0d832c154ecf8a21d7eaea39b478ed90f5
-
SHA256
f8d8af9b56352051817a7eec3d9d5796dd2415752c8761585f4e6c18e3588d57
-
SHA512
454042ee93dcc154fb530eab67d229372ee1d9b8e44de4c537917899c762f6132cf0aa357849d7e7df7d46680e8bc35eb3a111b8d55df91dff7c4faff392080e
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral1/memory/908-54-0x0000000000AC0000-0x0000000001889000-memory.dmp family_ytstealer behavioral1/memory/908-57-0x0000000000AC0000-0x0000000001889000-memory.dmp family_ytstealer -
resource yara_rule behavioral1/memory/908-54-0x0000000000AC0000-0x0000000001889000-memory.dmp upx behavioral1/memory/908-57-0x0000000000AC0000-0x0000000001889000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 908 F8D8AF9B56352051817A7EEC3D9D5796DD2415752C8761585F4E6C18E3588D57.exe 908 F8D8AF9B56352051817A7EEC3D9D5796DD2415752C8761585F4E6C18E3588D57.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 908 wrote to memory of 1248 908 F8D8AF9B56352051817A7EEC3D9D5796DD2415752C8761585F4E6C18E3588D57.exe 28 PID 908 wrote to memory of 1248 908 F8D8AF9B56352051817A7EEC3D9D5796DD2415752C8761585F4E6C18E3588D57.exe 28 PID 908 wrote to memory of 1248 908 F8D8AF9B56352051817A7EEC3D9D5796DD2415752C8761585F4E6C18E3588D57.exe 28 PID 1248 wrote to memory of 1336 1248 cmd.exe 30 PID 1248 wrote to memory of 1336 1248 cmd.exe 30 PID 1248 wrote to memory of 1336 1248 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\F8D8AF9B56352051817A7EEC3D9D5796DD2415752C8761585F4E6C18E3588D57.exe"C:\Users\Admin\AppData\Local\Temp\F8D8AF9B56352051817A7EEC3D9D5796DD2415752C8761585F4E6C18E3588D57.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\F8D8AF9B56352051817A7EEC3D9D5796DD2415752C8761585F4E6C18E3588D57.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:1336
-
-