Analysis
-
max time kernel
52s -
max time network
181s -
platform
windows10_x64 -
resource
win10-20220414-en -
resource tags
arch:x64arch:x86image:win10-20220414-enlocale:en-usos:windows10-1703-x64system -
submitted
20/07/2022, 07:35
Behavioral task
behavioral1
Sample
278FA2801CE607107B5BC8F07B77FC2CCE942C4911A44A702CB6BAA59868CD4F.exe
Resource
win7-20220718-en
6 signatures
300 seconds
General
-
Target
278FA2801CE607107B5BC8F07B77FC2CCE942C4911A44A702CB6BAA59868CD4F.exe
-
Size
4.0MB
-
MD5
d806b9a73a451f7875c0233b501c6b26
-
SHA1
04a45843a37910017c30bbc6486201793c27c50e
-
SHA256
278fa2801ce607107b5bc8f07b77fc2cce942c4911a44a702cb6baa59868cd4f
-
SHA512
b06537545077aa7e93814aa395f2a1a312ae651ba0917c5d25749a8d730b0f4e1e43022fd0fbb538bba5345779a7a020d870b234b88d0eaaae30e0547e48fa96
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral2/memory/804-118-0x0000000000D70000-0x0000000001B38000-memory.dmp family_ytstealer behavioral2/memory/804-121-0x0000000000D70000-0x0000000001B38000-memory.dmp family_ytstealer -
resource yara_rule behavioral2/memory/804-118-0x0000000000D70000-0x0000000001B38000-memory.dmp upx behavioral2/memory/804-121-0x0000000000D70000-0x0000000001B38000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 804 278FA2801CE607107B5BC8F07B77FC2CCE942C4911A44A702CB6BAA59868CD4F.exe 804 278FA2801CE607107B5BC8F07B77FC2CCE942C4911A44A702CB6BAA59868CD4F.exe 804 278FA2801CE607107B5BC8F07B77FC2CCE942C4911A44A702CB6BAA59868CD4F.exe 804 278FA2801CE607107B5BC8F07B77FC2CCE942C4911A44A702CB6BAA59868CD4F.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 804 wrote to memory of 4628 804 278FA2801CE607107B5BC8F07B77FC2CCE942C4911A44A702CB6BAA59868CD4F.exe 68 PID 804 wrote to memory of 4628 804 278FA2801CE607107B5BC8F07B77FC2CCE942C4911A44A702CB6BAA59868CD4F.exe 68 PID 4628 wrote to memory of 4860 4628 cmd.exe 70 PID 4628 wrote to memory of 4860 4628 cmd.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\278FA2801CE607107B5BC8F07B77FC2CCE942C4911A44A702CB6BAA59868CD4F.exe"C:\Users\Admin\AppData\Local\Temp\278FA2801CE607107B5BC8F07B77FC2CCE942C4911A44A702CB6BAA59868CD4F.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\278FA2801CE607107B5BC8F07B77FC2CCE942C4911A44A702CB6BAA59868CD4F.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:4860
-
-