Analysis
-
max time kernel
43s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
20/07/2022, 08:00
Behavioral task
behavioral1
Sample
6779505E5FE0F26ABE9D451E197C0ACA5BF798ACFD7CBBC3D682C98809FDEB71.exe
Resource
win7-20220718-en
6 signatures
300 seconds
General
-
Target
6779505E5FE0F26ABE9D451E197C0ACA5BF798ACFD7CBBC3D682C98809FDEB71.exe
-
Size
4.0MB
-
MD5
67c33e3168d559fed82c57a8786f5792
-
SHA1
11aaa598f0acd9afc923e29ef20f50754a0c44f3
-
SHA256
6779505e5fe0f26abe9d451e197c0aca5bf798acfd7cbbc3d682c98809fdeb71
-
SHA512
a9a6c9a9ef17eeb71a9169e8bd8798ccf4842e51ee95ea8cf2c63a26835e5095418a790207d4f0d11951b511c26976e16908849348612f2da078b8db8c9d9112
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral1/memory/892-54-0x00000000003F0000-0x00000000011B9000-memory.dmp family_ytstealer behavioral1/memory/892-57-0x00000000003F0000-0x00000000011B9000-memory.dmp family_ytstealer -
resource yara_rule behavioral1/memory/892-54-0x00000000003F0000-0x00000000011B9000-memory.dmp upx behavioral1/memory/892-57-0x00000000003F0000-0x00000000011B9000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 892 6779505E5FE0F26ABE9D451E197C0ACA5BF798ACFD7CBBC3D682C98809FDEB71.exe 892 6779505E5FE0F26ABE9D451E197C0ACA5BF798ACFD7CBBC3D682C98809FDEB71.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 892 wrote to memory of 288 892 6779505E5FE0F26ABE9D451E197C0ACA5BF798ACFD7CBBC3D682C98809FDEB71.exe 29 PID 892 wrote to memory of 288 892 6779505E5FE0F26ABE9D451E197C0ACA5BF798ACFD7CBBC3D682C98809FDEB71.exe 29 PID 892 wrote to memory of 288 892 6779505E5FE0F26ABE9D451E197C0ACA5BF798ACFD7CBBC3D682C98809FDEB71.exe 29 PID 288 wrote to memory of 1920 288 cmd.exe 30 PID 288 wrote to memory of 1920 288 cmd.exe 30 PID 288 wrote to memory of 1920 288 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\6779505E5FE0F26ABE9D451E197C0ACA5BF798ACFD7CBBC3D682C98809FDEB71.exe"C:\Users\Admin\AppData\Local\Temp\6779505E5FE0F26ABE9D451E197C0ACA5BF798ACFD7CBBC3D682C98809FDEB71.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\6779505E5FE0F26ABE9D451E197C0ACA5BF798ACFD7CBBC3D682C98809FDEB71.exe2⤵
- Suspicious use of WriteProcessMemory
PID:288 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:1920
-
-