Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
20/07/2022, 08:02
Behavioral task
behavioral1
Sample
68984DDD3AFEC804893C52035D5F76EA4F8246D22729D56C18A6BBADD5180360.exe
Resource
win7-20220718-en
6 signatures
300 seconds
General
-
Target
68984DDD3AFEC804893C52035D5F76EA4F8246D22729D56C18A6BBADD5180360.exe
-
Size
4.0MB
-
MD5
dfc8c02e0635b849facfacd8b6783347
-
SHA1
ae34fcc76e2c220fd046dad8f5aaf4677eeb514d
-
SHA256
68984ddd3afec804893c52035d5f76ea4f8246d22729d56c18a6bbadd5180360
-
SHA512
1f02b3c57f21f568789675d083e1a1447317ee48df2951c6373caa32e0745dc0eb4007212242b139238c9992c29072dd4dff30f082d478e9f3eaa4d776101ce1
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral1/memory/1208-54-0x0000000000100000-0x0000000000EC9000-memory.dmp family_ytstealer behavioral1/memory/1208-57-0x0000000000100000-0x0000000000EC9000-memory.dmp family_ytstealer -
resource yara_rule behavioral1/memory/1208-54-0x0000000000100000-0x0000000000EC9000-memory.dmp upx behavioral1/memory/1208-57-0x0000000000100000-0x0000000000EC9000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1208 68984DDD3AFEC804893C52035D5F76EA4F8246D22729D56C18A6BBADD5180360.exe 1208 68984DDD3AFEC804893C52035D5F76EA4F8246D22729D56C18A6BBADD5180360.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1208 wrote to memory of 1780 1208 68984DDD3AFEC804893C52035D5F76EA4F8246D22729D56C18A6BBADD5180360.exe 29 PID 1208 wrote to memory of 1780 1208 68984DDD3AFEC804893C52035D5F76EA4F8246D22729D56C18A6BBADD5180360.exe 29 PID 1208 wrote to memory of 1780 1208 68984DDD3AFEC804893C52035D5F76EA4F8246D22729D56C18A6BBADD5180360.exe 29 PID 1780 wrote to memory of 472 1780 cmd.exe 31 PID 1780 wrote to memory of 472 1780 cmd.exe 31 PID 1780 wrote to memory of 472 1780 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\68984DDD3AFEC804893C52035D5F76EA4F8246D22729D56C18A6BBADD5180360.exe"C:\Users\Admin\AppData\Local\Temp\68984DDD3AFEC804893C52035D5F76EA4F8246D22729D56C18A6BBADD5180360.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\68984DDD3AFEC804893C52035D5F76EA4F8246D22729D56C18A6BBADD5180360.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:472
-
-