Analysis
-
max time kernel
44s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
20/07/2022, 07:30
Behavioral task
behavioral1
Sample
1E87D6A13D918342AE11D94311CD5A7B7F264E0FB89651248042B4ED43108035.exe
Resource
win7-20220715-en
6 signatures
300 seconds
General
-
Target
1E87D6A13D918342AE11D94311CD5A7B7F264E0FB89651248042B4ED43108035.exe
-
Size
4.0MB
-
MD5
654ace6fadd20c5c5edfab4db827636f
-
SHA1
583e60516e831966f91f6553b16af781e76f3b4c
-
SHA256
1e87d6a13d918342ae11d94311cd5a7b7f264e0fb89651248042b4ed43108035
-
SHA512
5f0c1d2a77c13063f23395cf08befb98b2d0e17c71e8292c88f484de7720b975f55442babce2a48d15d4547e848c4e7cb06948970bfda6a78161347227130e50
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral1/memory/860-54-0x0000000000C50000-0x0000000001A29000-memory.dmp family_ytstealer behavioral1/memory/860-57-0x0000000000C50000-0x0000000001A29000-memory.dmp family_ytstealer -
resource yara_rule behavioral1/memory/860-54-0x0000000000C50000-0x0000000001A29000-memory.dmp upx behavioral1/memory/860-57-0x0000000000C50000-0x0000000001A29000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 860 1E87D6A13D918342AE11D94311CD5A7B7F264E0FB89651248042B4ED43108035.exe 860 1E87D6A13D918342AE11D94311CD5A7B7F264E0FB89651248042B4ED43108035.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 860 wrote to memory of 680 860 1E87D6A13D918342AE11D94311CD5A7B7F264E0FB89651248042B4ED43108035.exe 28 PID 860 wrote to memory of 680 860 1E87D6A13D918342AE11D94311CD5A7B7F264E0FB89651248042B4ED43108035.exe 28 PID 860 wrote to memory of 680 860 1E87D6A13D918342AE11D94311CD5A7B7F264E0FB89651248042B4ED43108035.exe 28 PID 680 wrote to memory of 1708 680 cmd.exe 30 PID 680 wrote to memory of 1708 680 cmd.exe 30 PID 680 wrote to memory of 1708 680 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\1E87D6A13D918342AE11D94311CD5A7B7F264E0FB89651248042B4ED43108035.exe"C:\Users\Admin\AppData\Local\Temp\1E87D6A13D918342AE11D94311CD5A7B7F264E0FB89651248042B4ED43108035.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\1E87D6A13D918342AE11D94311CD5A7B7F264E0FB89651248042B4ED43108035.exe2⤵
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:1708
-
-