Analysis
-
max time kernel
53s -
max time network
181s -
platform
windows10-1703_x64 -
resource
win10-20220718-en -
resource tags
arch:x64arch:x86image:win10-20220718-enlocale:en-usos:windows10-1703-x64system -
submitted
20/07/2022, 07:30
Behavioral task
behavioral1
Sample
1E87D6A13D918342AE11D94311CD5A7B7F264E0FB89651248042B4ED43108035.exe
Resource
win7-20220715-en
6 signatures
300 seconds
General
-
Target
1E87D6A13D918342AE11D94311CD5A7B7F264E0FB89651248042B4ED43108035.exe
-
Size
4.0MB
-
MD5
654ace6fadd20c5c5edfab4db827636f
-
SHA1
583e60516e831966f91f6553b16af781e76f3b4c
-
SHA256
1e87d6a13d918342ae11d94311cd5a7b7f264e0fb89651248042b4ed43108035
-
SHA512
5f0c1d2a77c13063f23395cf08befb98b2d0e17c71e8292c88f484de7720b975f55442babce2a48d15d4547e848c4e7cb06948970bfda6a78161347227130e50
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral2/memory/2144-114-0x0000000000110000-0x0000000000EE9000-memory.dmp family_ytstealer behavioral2/memory/2144-116-0x0000000000110000-0x0000000000EE9000-memory.dmp family_ytstealer -
resource yara_rule behavioral2/memory/2144-114-0x0000000000110000-0x0000000000EE9000-memory.dmp upx behavioral2/memory/2144-116-0x0000000000110000-0x0000000000EE9000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2144 1E87D6A13D918342AE11D94311CD5A7B7F264E0FB89651248042B4ED43108035.exe 2144 1E87D6A13D918342AE11D94311CD5A7B7F264E0FB89651248042B4ED43108035.exe 2144 1E87D6A13D918342AE11D94311CD5A7B7F264E0FB89651248042B4ED43108035.exe 2144 1E87D6A13D918342AE11D94311CD5A7B7F264E0FB89651248042B4ED43108035.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2144 wrote to memory of 4576 2144 1E87D6A13D918342AE11D94311CD5A7B7F264E0FB89651248042B4ED43108035.exe 67 PID 2144 wrote to memory of 4576 2144 1E87D6A13D918342AE11D94311CD5A7B7F264E0FB89651248042B4ED43108035.exe 67 PID 4576 wrote to memory of 4180 4576 cmd.exe 69 PID 4576 wrote to memory of 4180 4576 cmd.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\1E87D6A13D918342AE11D94311CD5A7B7F264E0FB89651248042B4ED43108035.exe"C:\Users\Admin\AppData\Local\Temp\1E87D6A13D918342AE11D94311CD5A7B7F264E0FB89651248042B4ED43108035.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\1E87D6A13D918342AE11D94311CD5A7B7F264E0FB89651248042B4ED43108035.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:4180
-
-