Analysis
-
max time kernel
44s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
20/07/2022, 07:57
Behavioral task
behavioral1
Sample
6410DC559D1015DF969EBE04CE0A6FF1FC066F4810B64A7333467672102A0CE5.exe
Resource
win7-20220715-en
6 signatures
300 seconds
General
-
Target
6410DC559D1015DF969EBE04CE0A6FF1FC066F4810B64A7333467672102A0CE5.exe
-
Size
4.0MB
-
MD5
8453cfb603798633aadbf24de5d4d9cf
-
SHA1
3a71343036fb408dfa96be4cad0ab05c00a95d60
-
SHA256
6410dc559d1015df969ebe04ce0a6ff1fc066f4810b64a7333467672102a0ce5
-
SHA512
45e72e8c38132ccf327aae6d560ba7d153b25fc3170e454de2e7f081631fcecfb7f276a68f56990446eebd9a6329d64018182d00bb1a37b1a07c6fae11caafc3
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral1/memory/2008-54-0x0000000000160000-0x0000000000F29000-memory.dmp family_ytstealer behavioral1/memory/2008-57-0x0000000000160000-0x0000000000F29000-memory.dmp family_ytstealer -
resource yara_rule behavioral1/memory/2008-54-0x0000000000160000-0x0000000000F29000-memory.dmp upx behavioral1/memory/2008-57-0x0000000000160000-0x0000000000F29000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2008 6410DC559D1015DF969EBE04CE0A6FF1FC066F4810B64A7333467672102A0CE5.exe 2008 6410DC559D1015DF969EBE04CE0A6FF1FC066F4810B64A7333467672102A0CE5.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2008 wrote to memory of 1756 2008 6410DC559D1015DF969EBE04CE0A6FF1FC066F4810B64A7333467672102A0CE5.exe 28 PID 2008 wrote to memory of 1756 2008 6410DC559D1015DF969EBE04CE0A6FF1FC066F4810B64A7333467672102A0CE5.exe 28 PID 2008 wrote to memory of 1756 2008 6410DC559D1015DF969EBE04CE0A6FF1FC066F4810B64A7333467672102A0CE5.exe 28 PID 1756 wrote to memory of 1692 1756 cmd.exe 30 PID 1756 wrote to memory of 1692 1756 cmd.exe 30 PID 1756 wrote to memory of 1692 1756 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\6410DC559D1015DF969EBE04CE0A6FF1FC066F4810B64A7333467672102A0CE5.exe"C:\Users\Admin\AppData\Local\Temp\6410DC559D1015DF969EBE04CE0A6FF1FC066F4810B64A7333467672102A0CE5.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\6410DC559D1015DF969EBE04CE0A6FF1FC066F4810B64A7333467672102A0CE5.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:1692
-
-