Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
20/07/2022, 07:32
Behavioral task
behavioral1
Sample
20E7976E0375EDA4DD1796AD3DD475C3BDDB21DB05FF5A2C5FD81A45D4A74C67.exe
Resource
win7-20220718-en
6 signatures
300 seconds
General
-
Target
20E7976E0375EDA4DD1796AD3DD475C3BDDB21DB05FF5A2C5FD81A45D4A74C67.exe
-
Size
4.0MB
-
MD5
8fa321838211901a4683db1390156dd0
-
SHA1
24ab436044684514666f0acbf56040cd51dece9e
-
SHA256
20e7976e0375eda4dd1796ad3dd475c3bddb21db05ff5a2c5fd81a45d4a74c67
-
SHA512
826bd13eae01f89e2c852241f5d7b7be1b7c1666b119050b0b00cc2126e70cc4bb5af5cafbeb7c917c0735f9a7a7b96cf31b42e3010b816e346e9c73dbbe8ef0
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral1/memory/860-54-0x00000000002C0000-0x0000000001088000-memory.dmp family_ytstealer behavioral1/memory/860-57-0x00000000002C0000-0x0000000001088000-memory.dmp family_ytstealer -
resource yara_rule behavioral1/memory/860-54-0x00000000002C0000-0x0000000001088000-memory.dmp upx behavioral1/memory/860-57-0x00000000002C0000-0x0000000001088000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 860 20E7976E0375EDA4DD1796AD3DD475C3BDDB21DB05FF5A2C5FD81A45D4A74C67.exe 860 20E7976E0375EDA4DD1796AD3DD475C3BDDB21DB05FF5A2C5FD81A45D4A74C67.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 860 wrote to memory of 2036 860 20E7976E0375EDA4DD1796AD3DD475C3BDDB21DB05FF5A2C5FD81A45D4A74C67.exe 29 PID 860 wrote to memory of 2036 860 20E7976E0375EDA4DD1796AD3DD475C3BDDB21DB05FF5A2C5FD81A45D4A74C67.exe 29 PID 860 wrote to memory of 2036 860 20E7976E0375EDA4DD1796AD3DD475C3BDDB21DB05FF5A2C5FD81A45D4A74C67.exe 29 PID 2036 wrote to memory of 268 2036 cmd.exe 31 PID 2036 wrote to memory of 268 2036 cmd.exe 31 PID 2036 wrote to memory of 268 2036 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\20E7976E0375EDA4DD1796AD3DD475C3BDDB21DB05FF5A2C5FD81A45D4A74C67.exe"C:\Users\Admin\AppData\Local\Temp\20E7976E0375EDA4DD1796AD3DD475C3BDDB21DB05FF5A2C5FD81A45D4A74C67.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\20E7976E0375EDA4DD1796AD3DD475C3BDDB21DB05FF5A2C5FD81A45D4A74C67.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:268
-
-