Analysis
-
max time kernel
43s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
20/07/2022, 07:39
Behavioral task
behavioral1
Sample
32A9A7BB455B7D103AEEA00B9A85AED4A3A774E9C3230FAF3F6E88624695CAB7.exe
Resource
win7-20220718-en
6 signatures
300 seconds
General
-
Target
32A9A7BB455B7D103AEEA00B9A85AED4A3A774E9C3230FAF3F6E88624695CAB7.exe
-
Size
4.0MB
-
MD5
103a39db9949364eaa87450808934f28
-
SHA1
83fd797c5844bc14e86295965ab6dbe284468c82
-
SHA256
32a9a7bb455b7d103aeea00b9a85aed4a3a774e9c3230faf3f6e88624695cab7
-
SHA512
cf60d7571a0f1f00070023b5044a4dddcc908852914fcebbbb3d95934f02ed09d5ae84cfda6dfd0928ba24d0a890112b66db9ffdd83d1f2e0241798959320148
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral1/memory/976-54-0x0000000000160000-0x0000000000F28000-memory.dmp family_ytstealer behavioral1/memory/976-57-0x0000000000160000-0x0000000000F28000-memory.dmp family_ytstealer -
resource yara_rule behavioral1/memory/976-54-0x0000000000160000-0x0000000000F28000-memory.dmp upx behavioral1/memory/976-57-0x0000000000160000-0x0000000000F28000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 976 32A9A7BB455B7D103AEEA00B9A85AED4A3A774E9C3230FAF3F6E88624695CAB7.exe 976 32A9A7BB455B7D103AEEA00B9A85AED4A3A774E9C3230FAF3F6E88624695CAB7.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 976 wrote to memory of 1704 976 32A9A7BB455B7D103AEEA00B9A85AED4A3A774E9C3230FAF3F6E88624695CAB7.exe 28 PID 976 wrote to memory of 1704 976 32A9A7BB455B7D103AEEA00B9A85AED4A3A774E9C3230FAF3F6E88624695CAB7.exe 28 PID 976 wrote to memory of 1704 976 32A9A7BB455B7D103AEEA00B9A85AED4A3A774E9C3230FAF3F6E88624695CAB7.exe 28 PID 1704 wrote to memory of 432 1704 cmd.exe 30 PID 1704 wrote to memory of 432 1704 cmd.exe 30 PID 1704 wrote to memory of 432 1704 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\32A9A7BB455B7D103AEEA00B9A85AED4A3A774E9C3230FAF3F6E88624695CAB7.exe"C:\Users\Admin\AppData\Local\Temp\32A9A7BB455B7D103AEEA00B9A85AED4A3A774E9C3230FAF3F6E88624695CAB7.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\32A9A7BB455B7D103AEEA00B9A85AED4A3A774E9C3230FAF3F6E88624695CAB7.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:432
-
-