Analysis
-
max time kernel
44s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
20/07/2022, 08:05
Behavioral task
behavioral1
Sample
6DB5EB3D1D261624B6D27741641DEA379653B3A3439DB34858D83447EB88033E.exe
Resource
win7-20220715-en
7 signatures
300 seconds
General
-
Target
6DB5EB3D1D261624B6D27741641DEA379653B3A3439DB34858D83447EB88033E.exe
-
Size
4.0MB
-
MD5
513bf71bf90ad5d2dcb89a45f8fb1751
-
SHA1
2fe88ed7c6d32008a1377cdc6391a41077155d4c
-
SHA256
6db5eb3d1d261624b6d27741641dea379653b3a3439db34858d83447eb88033e
-
SHA512
5035d554b60e85d1ea43f0b21dddceadfcb78927a5ab6872aad2ebb7bf2bb0c90f234fb23209f3575f331fe9cd8af6d69cb0b3ce68132d2b10ff94f6c1ec51fb
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral1/memory/1392-54-0x00000000001A0000-0x0000000000F78000-memory.dmp family_ytstealer behavioral1/memory/1392-57-0x00000000001A0000-0x0000000000F78000-memory.dmp family_ytstealer -
resource yara_rule behavioral1/memory/1392-54-0x00000000001A0000-0x0000000000F78000-memory.dmp upx behavioral1/memory/1392-57-0x00000000001A0000-0x0000000000F78000-memory.dmp upx -
Deletes itself 1 IoCs
pid Process 888 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1392 6DB5EB3D1D261624B6D27741641DEA379653B3A3439DB34858D83447EB88033E.exe 1392 6DB5EB3D1D261624B6D27741641DEA379653B3A3439DB34858D83447EB88033E.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1392 wrote to memory of 888 1392 6DB5EB3D1D261624B6D27741641DEA379653B3A3439DB34858D83447EB88033E.exe 28 PID 1392 wrote to memory of 888 1392 6DB5EB3D1D261624B6D27741641DEA379653B3A3439DB34858D83447EB88033E.exe 28 PID 1392 wrote to memory of 888 1392 6DB5EB3D1D261624B6D27741641DEA379653B3A3439DB34858D83447EB88033E.exe 28 PID 888 wrote to memory of 1720 888 cmd.exe 30 PID 888 wrote to memory of 1720 888 cmd.exe 30 PID 888 wrote to memory of 1720 888 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\6DB5EB3D1D261624B6D27741641DEA379653B3A3439DB34858D83447EB88033E.exe"C:\Users\Admin\AppData\Local\Temp\6DB5EB3D1D261624B6D27741641DEA379653B3A3439DB34858D83447EB88033E.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\6DB5EB3D1D261624B6D27741641DEA379653B3A3439DB34858D83447EB88033E.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:1720
-
-