Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
20/07/2022, 08:02
Behavioral task
behavioral1
Sample
69291E517EDBE12D321AB35261E4E9799C16C7C7AEB27AA088F8821E6FB06577.exe
Resource
win7-20220718-en
6 signatures
300 seconds
General
-
Target
69291E517EDBE12D321AB35261E4E9799C16C7C7AEB27AA088F8821E6FB06577.exe
-
Size
4.0MB
-
MD5
735298ff31f287b9f40e501816bb76ca
-
SHA1
a9597d09115a4fb953ed7e6f96b2e1cc4679eb93
-
SHA256
69291e517edbe12d321ab35261e4e9799c16c7c7aeb27aa088f8821e6fb06577
-
SHA512
d9f8304fb86b3901d3bec6a49c3a680a692afeb134f4be7dd69b65f82173706140a41da20021b222d0330e0546c77c65c8363d8a22941278a2b33b4d6fcfca47
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral1/memory/1884-54-0x0000000000D40000-0x0000000001B09000-memory.dmp family_ytstealer behavioral1/memory/1884-57-0x0000000000D40000-0x0000000001B09000-memory.dmp family_ytstealer -
resource yara_rule behavioral1/memory/1884-54-0x0000000000D40000-0x0000000001B09000-memory.dmp upx behavioral1/memory/1884-57-0x0000000000D40000-0x0000000001B09000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1884 69291E517EDBE12D321AB35261E4E9799C16C7C7AEB27AA088F8821E6FB06577.exe 1884 69291E517EDBE12D321AB35261E4E9799C16C7C7AEB27AA088F8821E6FB06577.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1884 wrote to memory of 1316 1884 69291E517EDBE12D321AB35261E4E9799C16C7C7AEB27AA088F8821E6FB06577.exe 29 PID 1884 wrote to memory of 1316 1884 69291E517EDBE12D321AB35261E4E9799C16C7C7AEB27AA088F8821E6FB06577.exe 29 PID 1884 wrote to memory of 1316 1884 69291E517EDBE12D321AB35261E4E9799C16C7C7AEB27AA088F8821E6FB06577.exe 29 PID 1316 wrote to memory of 576 1316 cmd.exe 31 PID 1316 wrote to memory of 576 1316 cmd.exe 31 PID 1316 wrote to memory of 576 1316 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\69291E517EDBE12D321AB35261E4E9799C16C7C7AEB27AA088F8821E6FB06577.exe"C:\Users\Admin\AppData\Local\Temp\69291E517EDBE12D321AB35261E4E9799C16C7C7AEB27AA088F8821E6FB06577.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\69291E517EDBE12D321AB35261E4E9799C16C7C7AEB27AA088F8821E6FB06577.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:576
-
-