Analysis
-
max time kernel
43s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
20/07/2022, 07:38
Behavioral task
behavioral1
Sample
304587F5823F2C43F9452B47D3B3F1A3CB1D25218EAF62A5C5BCACC2A6AF6FD3.exe
Resource
win7-20220718-en
7 signatures
300 seconds
General
-
Target
304587F5823F2C43F9452B47D3B3F1A3CB1D25218EAF62A5C5BCACC2A6AF6FD3.exe
-
Size
4.0MB
-
MD5
6bd75388a7d8b8b856663769ea263c38
-
SHA1
82a3d0346d1b421013eb7da90949bbec5b0b2dce
-
SHA256
304587f5823f2c43f9452b47d3b3f1a3cb1d25218eaf62a5c5bcacc2a6af6fd3
-
SHA512
bfd16ab321c017a5eaacefdb11a7ee557d6f3fe7bfa4da0aa1b2073d83daa4b8140d1b252996a62c34e8c8a21cdb338e9f03b11c94a4d84fea3236b5f8ef6cd4
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral1/memory/908-54-0x0000000000900000-0x00000000016C9000-memory.dmp family_ytstealer behavioral1/memory/908-56-0x0000000000900000-0x00000000016C9000-memory.dmp family_ytstealer -
resource yara_rule behavioral1/memory/908-54-0x0000000000900000-0x00000000016C9000-memory.dmp upx behavioral1/memory/908-56-0x0000000000900000-0x00000000016C9000-memory.dmp upx -
Deletes itself 1 IoCs
pid Process 1192 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 908 304587F5823F2C43F9452B47D3B3F1A3CB1D25218EAF62A5C5BCACC2A6AF6FD3.exe 908 304587F5823F2C43F9452B47D3B3F1A3CB1D25218EAF62A5C5BCACC2A6AF6FD3.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 908 wrote to memory of 1192 908 304587F5823F2C43F9452B47D3B3F1A3CB1D25218EAF62A5C5BCACC2A6AF6FD3.exe 29 PID 908 wrote to memory of 1192 908 304587F5823F2C43F9452B47D3B3F1A3CB1D25218EAF62A5C5BCACC2A6AF6FD3.exe 29 PID 908 wrote to memory of 1192 908 304587F5823F2C43F9452B47D3B3F1A3CB1D25218EAF62A5C5BCACC2A6AF6FD3.exe 29 PID 1192 wrote to memory of 316 1192 cmd.exe 31 PID 1192 wrote to memory of 316 1192 cmd.exe 31 PID 1192 wrote to memory of 316 1192 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\304587F5823F2C43F9452B47D3B3F1A3CB1D25218EAF62A5C5BCACC2A6AF6FD3.exe"C:\Users\Admin\AppData\Local\Temp\304587F5823F2C43F9452B47D3B3F1A3CB1D25218EAF62A5C5BCACC2A6AF6FD3.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\304587F5823F2C43F9452B47D3B3F1A3CB1D25218EAF62A5C5BCACC2A6AF6FD3.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:316
-
-