Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
20/07/2022, 08:03
Behavioral task
behavioral1
Sample
6BF7BEF9DE2DCF0A7DF5BD49BA7E6B96303BDE5EBFDA923B9B2CB04798BE9472.exe
Resource
win7-20220718-en
7 signatures
300 seconds
General
-
Target
6BF7BEF9DE2DCF0A7DF5BD49BA7E6B96303BDE5EBFDA923B9B2CB04798BE9472.exe
-
Size
4.0MB
-
MD5
e548a5db7e04a8627fa928f0cfba8a74
-
SHA1
976591f972e588bee67825fb5dfcaca345c338ba
-
SHA256
6bf7bef9de2dcf0a7df5bd49ba7e6b96303bde5ebfda923b9b2cb04798be9472
-
SHA512
7ddd5fa359007f0085d55f7c6c9b990fd58b00718f2cf7c4b68d63a591a1565281493acf9a35e6e5011b684f49ad665d3c7be0626fa5c55d88b0c3e2c219fc12
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral1/memory/1392-54-0x0000000000EF0000-0x0000000001CB9000-memory.dmp family_ytstealer behavioral1/memory/1392-56-0x0000000000EF0000-0x0000000001CB9000-memory.dmp family_ytstealer -
resource yara_rule behavioral1/memory/1392-54-0x0000000000EF0000-0x0000000001CB9000-memory.dmp upx behavioral1/memory/1392-56-0x0000000000EF0000-0x0000000001CB9000-memory.dmp upx -
Deletes itself 1 IoCs
pid Process 376 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1392 6BF7BEF9DE2DCF0A7DF5BD49BA7E6B96303BDE5EBFDA923B9B2CB04798BE9472.exe 1392 6BF7BEF9DE2DCF0A7DF5BD49BA7E6B96303BDE5EBFDA923B9B2CB04798BE9472.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1392 wrote to memory of 376 1392 6BF7BEF9DE2DCF0A7DF5BD49BA7E6B96303BDE5EBFDA923B9B2CB04798BE9472.exe 28 PID 1392 wrote to memory of 376 1392 6BF7BEF9DE2DCF0A7DF5BD49BA7E6B96303BDE5EBFDA923B9B2CB04798BE9472.exe 28 PID 1392 wrote to memory of 376 1392 6BF7BEF9DE2DCF0A7DF5BD49BA7E6B96303BDE5EBFDA923B9B2CB04798BE9472.exe 28 PID 376 wrote to memory of 1328 376 cmd.exe 30 PID 376 wrote to memory of 1328 376 cmd.exe 30 PID 376 wrote to memory of 1328 376 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\6BF7BEF9DE2DCF0A7DF5BD49BA7E6B96303BDE5EBFDA923B9B2CB04798BE9472.exe"C:\Users\Admin\AppData\Local\Temp\6BF7BEF9DE2DCF0A7DF5BD49BA7E6B96303BDE5EBFDA923B9B2CB04798BE9472.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\6BF7BEF9DE2DCF0A7DF5BD49BA7E6B96303BDE5EBFDA923B9B2CB04798BE9472.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:1328
-
-