Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
20/07/2022, 07:35
Behavioral task
behavioral1
Sample
28AA7376A0FAAF6BC069D5A6B112BBDB4D5E580F9C8D075DF7811F444B97D8F5.exe
Resource
win7-20220718-en
6 signatures
300 seconds
General
-
Target
28AA7376A0FAAF6BC069D5A6B112BBDB4D5E580F9C8D075DF7811F444B97D8F5.exe
-
Size
4.0MB
-
MD5
36ad65689efdd1cbc9bfbb0741e0bf0c
-
SHA1
a67710c5e20f34a8d3f222168991ad68d1e9c63e
-
SHA256
28aa7376a0faaf6bc069d5a6b112bbdb4d5e580f9c8d075df7811f444b97d8f5
-
SHA512
4323fe32be08dbab6b9ba981a1e3ca8a7d97ffe90f0b5ea72f78350868fe103570c960753e035927758e72bba7cee712997193d198dbfd04ef6ba374acd5fe0d
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral1/memory/1756-54-0x0000000001230000-0x0000000001FF9000-memory.dmp family_ytstealer behavioral1/memory/1756-57-0x0000000001230000-0x0000000001FF9000-memory.dmp family_ytstealer -
resource yara_rule behavioral1/memory/1756-54-0x0000000001230000-0x0000000001FF9000-memory.dmp upx behavioral1/memory/1756-57-0x0000000001230000-0x0000000001FF9000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1756 28AA7376A0FAAF6BC069D5A6B112BBDB4D5E580F9C8D075DF7811F444B97D8F5.exe 1756 28AA7376A0FAAF6BC069D5A6B112BBDB4D5E580F9C8D075DF7811F444B97D8F5.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1756 wrote to memory of 528 1756 28AA7376A0FAAF6BC069D5A6B112BBDB4D5E580F9C8D075DF7811F444B97D8F5.exe 28 PID 1756 wrote to memory of 528 1756 28AA7376A0FAAF6BC069D5A6B112BBDB4D5E580F9C8D075DF7811F444B97D8F5.exe 28 PID 1756 wrote to memory of 528 1756 28AA7376A0FAAF6BC069D5A6B112BBDB4D5E580F9C8D075DF7811F444B97D8F5.exe 28 PID 528 wrote to memory of 1720 528 cmd.exe 30 PID 528 wrote to memory of 1720 528 cmd.exe 30 PID 528 wrote to memory of 1720 528 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\28AA7376A0FAAF6BC069D5A6B112BBDB4D5E580F9C8D075DF7811F444B97D8F5.exe"C:\Users\Admin\AppData\Local\Temp\28AA7376A0FAAF6BC069D5A6B112BBDB4D5E580F9C8D075DF7811F444B97D8F5.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\28AA7376A0FAAF6BC069D5A6B112BBDB4D5E580F9C8D075DF7811F444B97D8F5.exe2⤵
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:1720
-
-