Analysis
-
max time kernel
41s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
20/07/2022, 07:37
Behavioral task
behavioral1
Sample
2D79DB60D7D4CE0C74D1B66C542803847DFFABB9F6B3BE95D0A220F2BD5E5349.exe
Resource
win7-20220718-en
6 signatures
300 seconds
General
-
Target
2D79DB60D7D4CE0C74D1B66C542803847DFFABB9F6B3BE95D0A220F2BD5E5349.exe
-
Size
4.0MB
-
MD5
ee22554a6e785e724d7e6a1679eb2247
-
SHA1
1194a27805b1e88c060681ed1b167cf90cda8872
-
SHA256
2d79db60d7d4ce0c74d1b66c542803847dffabb9f6b3be95d0a220f2bd5e5349
-
SHA512
1ece90a9c64ed939afa214bbed02069472b88265e14ee80895f19fa8544cd6961158e698622e8ac3560b404ad2e8e37824bd86a83a1112c93e57c4b9da2ae971
Malware Config
Signatures
-
YTStealer payload 1 IoCs
resource yara_rule behavioral1/memory/2040-57-0x00000000008E0000-0x00000000016A8000-memory.dmp family_ytstealer -
resource yara_rule behavioral1/memory/2040-54-0x00000000008E0000-0x00000000016A8000-memory.dmp upx behavioral1/memory/2040-57-0x00000000008E0000-0x00000000016A8000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2040 2D79DB60D7D4CE0C74D1B66C542803847DFFABB9F6B3BE95D0A220F2BD5E5349.exe 2040 2D79DB60D7D4CE0C74D1B66C542803847DFFABB9F6B3BE95D0A220F2BD5E5349.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2040 wrote to memory of 1272 2040 2D79DB60D7D4CE0C74D1B66C542803847DFFABB9F6B3BE95D0A220F2BD5E5349.exe 29 PID 2040 wrote to memory of 1272 2040 2D79DB60D7D4CE0C74D1B66C542803847DFFABB9F6B3BE95D0A220F2BD5E5349.exe 29 PID 2040 wrote to memory of 1272 2040 2D79DB60D7D4CE0C74D1B66C542803847DFFABB9F6B3BE95D0A220F2BD5E5349.exe 29 PID 1272 wrote to memory of 560 1272 cmd.exe 31 PID 1272 wrote to memory of 560 1272 cmd.exe 31 PID 1272 wrote to memory of 560 1272 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2D79DB60D7D4CE0C74D1B66C542803847DFFABB9F6B3BE95D0A220F2BD5E5349.exe"C:\Users\Admin\AppData\Local\Temp\2D79DB60D7D4CE0C74D1B66C542803847DFFABB9F6B3BE95D0A220F2BD5E5349.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\2D79DB60D7D4CE0C74D1B66C542803847DFFABB9F6B3BE95D0A220F2BD5E5349.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:560
-
-