Analysis
-
max time kernel
43s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
20/07/2022, 07:51
Behavioral task
behavioral1
Sample
508832B628AD47FB6B2467BF99E5E6B9109969E81AA6F9C2704361DF6ED36FA4.exe
Resource
win7-20220718-en
7 signatures
300 seconds
General
-
Target
508832B628AD47FB6B2467BF99E5E6B9109969E81AA6F9C2704361DF6ED36FA4.exe
-
Size
4.0MB
-
MD5
a336f951fa34705404249a142a8e28f2
-
SHA1
66f6f2b6275d6df8832e78005ad88c7ea14cfe55
-
SHA256
508832b628ad47fb6b2467bf99e5e6b9109969e81aa6f9c2704361df6ed36fa4
-
SHA512
2c30071ed655cb0c7eff4bfb654c21ac892a84848f1ded0984ae5e46da3eb0c6bd886857e33cbc76eb99f7a62d902c39941f8fee389bcb6e455eb9b9955125c2
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral1/memory/1396-54-0x0000000000110000-0x0000000000ED9000-memory.dmp family_ytstealer behavioral1/memory/1396-56-0x0000000000110000-0x0000000000ED9000-memory.dmp family_ytstealer -
resource yara_rule behavioral1/memory/1396-54-0x0000000000110000-0x0000000000ED9000-memory.dmp upx behavioral1/memory/1396-56-0x0000000000110000-0x0000000000ED9000-memory.dmp upx -
Deletes itself 1 IoCs
pid Process 1720 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1396 508832B628AD47FB6B2467BF99E5E6B9109969E81AA6F9C2704361DF6ED36FA4.exe 1396 508832B628AD47FB6B2467BF99E5E6B9109969E81AA6F9C2704361DF6ED36FA4.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1396 wrote to memory of 1720 1396 508832B628AD47FB6B2467BF99E5E6B9109969E81AA6F9C2704361DF6ED36FA4.exe 28 PID 1396 wrote to memory of 1720 1396 508832B628AD47FB6B2467BF99E5E6B9109969E81AA6F9C2704361DF6ED36FA4.exe 28 PID 1396 wrote to memory of 1720 1396 508832B628AD47FB6B2467BF99E5E6B9109969E81AA6F9C2704361DF6ED36FA4.exe 28 PID 1720 wrote to memory of 596 1720 cmd.exe 30 PID 1720 wrote to memory of 596 1720 cmd.exe 30 PID 1720 wrote to memory of 596 1720 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\508832B628AD47FB6B2467BF99E5E6B9109969E81AA6F9C2704361DF6ED36FA4.exe"C:\Users\Admin\AppData\Local\Temp\508832B628AD47FB6B2467BF99E5E6B9109969E81AA6F9C2704361DF6ED36FA4.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\508832B628AD47FB6B2467BF99E5E6B9109969E81AA6F9C2704361DF6ED36FA4.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:596
-
-