Analysis
-
max time kernel
43s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
20/07/2022, 07:55
Behavioral task
behavioral1
Sample
5E028E14942BE8EF54DDC86CD528E28D203F85A16C0C0719AC0CD94CA51D0569.exe
Resource
win7-20220718-en
6 signatures
300 seconds
General
-
Target
5E028E14942BE8EF54DDC86CD528E28D203F85A16C0C0719AC0CD94CA51D0569.exe
-
Size
4.0MB
-
MD5
730943986dd5ea5044f18ae854e5f5fb
-
SHA1
762efb34221cef11f113b7451d9495a69f3f9a9a
-
SHA256
5e028e14942be8ef54ddc86cd528e28d203f85a16c0c0719ac0cd94ca51d0569
-
SHA512
d45d78e120e2ae937893a720d70801e0b545f439c12e7c917279d77ca4c58350ce9e74ce8cc9af84173ed1247b348d2794ec86c22006b45ae065989c52dfbba1
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral1/memory/1412-54-0x00000000003B0000-0x0000000001179000-memory.dmp family_ytstealer behavioral1/memory/1412-57-0x00000000003B0000-0x0000000001179000-memory.dmp family_ytstealer -
resource yara_rule behavioral1/memory/1412-54-0x00000000003B0000-0x0000000001179000-memory.dmp upx behavioral1/memory/1412-57-0x00000000003B0000-0x0000000001179000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1412 5E028E14942BE8EF54DDC86CD528E28D203F85A16C0C0719AC0CD94CA51D0569.exe 1412 5E028E14942BE8EF54DDC86CD528E28D203F85A16C0C0719AC0CD94CA51D0569.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1412 wrote to memory of 1736 1412 5E028E14942BE8EF54DDC86CD528E28D203F85A16C0C0719AC0CD94CA51D0569.exe 28 PID 1412 wrote to memory of 1736 1412 5E028E14942BE8EF54DDC86CD528E28D203F85A16C0C0719AC0CD94CA51D0569.exe 28 PID 1412 wrote to memory of 1736 1412 5E028E14942BE8EF54DDC86CD528E28D203F85A16C0C0719AC0CD94CA51D0569.exe 28 PID 1736 wrote to memory of 1804 1736 cmd.exe 30 PID 1736 wrote to memory of 1804 1736 cmd.exe 30 PID 1736 wrote to memory of 1804 1736 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\5E028E14942BE8EF54DDC86CD528E28D203F85A16C0C0719AC0CD94CA51D0569.exe"C:\Users\Admin\AppData\Local\Temp\5E028E14942BE8EF54DDC86CD528E28D203F85A16C0C0719AC0CD94CA51D0569.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\5E028E14942BE8EF54DDC86CD528E28D203F85A16C0C0719AC0CD94CA51D0569.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:1804
-
-