Analysis
-
max time kernel
45s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
20/07/2022, 07:32
Behavioral task
behavioral1
Sample
2039DEA342AA1E589203CBFBCDA1BB56B8DC9CAAC73D512AD1BE8E61B0BB8398.exe
Resource
win7-20220718-en
6 signatures
300 seconds
General
-
Target
2039DEA342AA1E589203CBFBCDA1BB56B8DC9CAAC73D512AD1BE8E61B0BB8398.exe
-
Size
4.0MB
-
MD5
471f775c761f5b6dd31fedc8e3a1350b
-
SHA1
0f9e6515e9364279b63b86b5978c845240f51e9c
-
SHA256
2039dea342aa1e589203cbfbcda1bb56b8dc9caac73d512ad1be8e61b0bb8398
-
SHA512
a63e4219d20cc92197bace9849895ff96e78f85840a1f9c059de12d8797a641801d1b4ed362be83c719259c5dc65b998f77ee4632718454de5d095c74e2112f9
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral1/memory/1288-54-0x00000000001D0000-0x0000000000FA9000-memory.dmp family_ytstealer behavioral1/memory/1288-57-0x00000000001D0000-0x0000000000FA9000-memory.dmp family_ytstealer -
resource yara_rule behavioral1/memory/1288-54-0x00000000001D0000-0x0000000000FA9000-memory.dmp upx behavioral1/memory/1288-57-0x00000000001D0000-0x0000000000FA9000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1288 2039DEA342AA1E589203CBFBCDA1BB56B8DC9CAAC73D512AD1BE8E61B0BB8398.exe 1288 2039DEA342AA1E589203CBFBCDA1BB56B8DC9CAAC73D512AD1BE8E61B0BB8398.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1288 wrote to memory of 1696 1288 2039DEA342AA1E589203CBFBCDA1BB56B8DC9CAAC73D512AD1BE8E61B0BB8398.exe 28 PID 1288 wrote to memory of 1696 1288 2039DEA342AA1E589203CBFBCDA1BB56B8DC9CAAC73D512AD1BE8E61B0BB8398.exe 28 PID 1288 wrote to memory of 1696 1288 2039DEA342AA1E589203CBFBCDA1BB56B8DC9CAAC73D512AD1BE8E61B0BB8398.exe 28 PID 1696 wrote to memory of 784 1696 cmd.exe 30 PID 1696 wrote to memory of 784 1696 cmd.exe 30 PID 1696 wrote to memory of 784 1696 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2039DEA342AA1E589203CBFBCDA1BB56B8DC9CAAC73D512AD1BE8E61B0BB8398.exe"C:\Users\Admin\AppData\Local\Temp\2039DEA342AA1E589203CBFBCDA1BB56B8DC9CAAC73D512AD1BE8E61B0BB8398.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\2039DEA342AA1E589203CBFBCDA1BB56B8DC9CAAC73D512AD1BE8E61B0BB8398.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:784
-
-