Analysis
-
max time kernel
45s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
20/07/2022, 07:29
Behavioral task
behavioral1
Sample
1D28708D2A4BFAE897E091D1B99884F5CBEA9DA23C69646862B4CDBED5E9DA78.exe
Resource
win7-20220715-en
6 signatures
300 seconds
General
-
Target
1D28708D2A4BFAE897E091D1B99884F5CBEA9DA23C69646862B4CDBED5E9DA78.exe
-
Size
4.0MB
-
MD5
7a7301636b1d9ceba27b4b02d1922653
-
SHA1
13cf3dfde36ecc616c8ce7afe2b740c909c29782
-
SHA256
1d28708d2a4bfae897e091d1b99884f5cbea9da23c69646862b4cdbed5e9da78
-
SHA512
76758d666dff1c6c9fea27a1aa6399ce0fd2c2b2615842d2637d0fa7444b042f16fd9178f5882289faac70824fc08caeba410d28fbad6595da046da8acd29943
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral1/memory/1752-54-0x0000000000F70000-0x0000000001D39000-memory.dmp family_ytstealer behavioral1/memory/1752-57-0x0000000000F70000-0x0000000001D39000-memory.dmp family_ytstealer -
resource yara_rule behavioral1/memory/1752-54-0x0000000000F70000-0x0000000001D39000-memory.dmp upx behavioral1/memory/1752-57-0x0000000000F70000-0x0000000001D39000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1752 1D28708D2A4BFAE897E091D1B99884F5CBEA9DA23C69646862B4CDBED5E9DA78.exe 1752 1D28708D2A4BFAE897E091D1B99884F5CBEA9DA23C69646862B4CDBED5E9DA78.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1752 wrote to memory of 1568 1752 1D28708D2A4BFAE897E091D1B99884F5CBEA9DA23C69646862B4CDBED5E9DA78.exe 28 PID 1752 wrote to memory of 1568 1752 1D28708D2A4BFAE897E091D1B99884F5CBEA9DA23C69646862B4CDBED5E9DA78.exe 28 PID 1752 wrote to memory of 1568 1752 1D28708D2A4BFAE897E091D1B99884F5CBEA9DA23C69646862B4CDBED5E9DA78.exe 28 PID 1568 wrote to memory of 1712 1568 cmd.exe 30 PID 1568 wrote to memory of 1712 1568 cmd.exe 30 PID 1568 wrote to memory of 1712 1568 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\1D28708D2A4BFAE897E091D1B99884F5CBEA9DA23C69646862B4CDBED5E9DA78.exe"C:\Users\Admin\AppData\Local\Temp\1D28708D2A4BFAE897E091D1B99884F5CBEA9DA23C69646862B4CDBED5E9DA78.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\1D28708D2A4BFAE897E091D1B99884F5CBEA9DA23C69646862B4CDBED5E9DA78.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:1712
-
-