Analysis
-
max time kernel
44s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
20/07/2022, 07:31
Behavioral task
behavioral1
Sample
1F24697EF5F8F626AA8D0C01AFFE9E5D565AF7661210531294F9938B81B2A66D.exe
Resource
win7-20220715-en
6 signatures
300 seconds
General
-
Target
1F24697EF5F8F626AA8D0C01AFFE9E5D565AF7661210531294F9938B81B2A66D.exe
-
Size
4.0MB
-
MD5
45bddbe5d7b0ae024bd6496b9e8a20b7
-
SHA1
addab7c1ef23757fca2c7614b1b5243344c9ecd3
-
SHA256
1f24697ef5f8f626aa8d0c01affe9e5d565af7661210531294f9938b81b2a66d
-
SHA512
1f52977078a021fa342c2e1e4d5eb55c573c2256b5f4368c607130372a9e0be044bbc777e5d39e14d637ecf5d1bf837585a3fe020e00e30fb19e49ca5f38c57b
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral1/memory/1676-54-0x00000000003A0000-0x0000000001169000-memory.dmp family_ytstealer behavioral1/memory/1676-57-0x00000000003A0000-0x0000000001169000-memory.dmp family_ytstealer -
resource yara_rule behavioral1/memory/1676-54-0x00000000003A0000-0x0000000001169000-memory.dmp upx behavioral1/memory/1676-57-0x00000000003A0000-0x0000000001169000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1676 1F24697EF5F8F626AA8D0C01AFFE9E5D565AF7661210531294F9938B81B2A66D.exe 1676 1F24697EF5F8F626AA8D0C01AFFE9E5D565AF7661210531294F9938B81B2A66D.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1676 wrote to memory of 520 1676 1F24697EF5F8F626AA8D0C01AFFE9E5D565AF7661210531294F9938B81B2A66D.exe 28 PID 1676 wrote to memory of 520 1676 1F24697EF5F8F626AA8D0C01AFFE9E5D565AF7661210531294F9938B81B2A66D.exe 28 PID 1676 wrote to memory of 520 1676 1F24697EF5F8F626AA8D0C01AFFE9E5D565AF7661210531294F9938B81B2A66D.exe 28 PID 520 wrote to memory of 2020 520 cmd.exe 30 PID 520 wrote to memory of 2020 520 cmd.exe 30 PID 520 wrote to memory of 2020 520 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\1F24697EF5F8F626AA8D0C01AFFE9E5D565AF7661210531294F9938B81B2A66D.exe"C:\Users\Admin\AppData\Local\Temp\1F24697EF5F8F626AA8D0C01AFFE9E5D565AF7661210531294F9938B81B2A66D.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\1F24697EF5F8F626AA8D0C01AFFE9E5D565AF7661210531294F9938B81B2A66D.exe2⤵
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:2020
-
-