Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
20/07/2022, 08:04
Behavioral task
behavioral1
Sample
6D2496735DC831B335C0E4440EF1FF2CA468E4115C1EEC18DD6719A1FC18C3BD.exe
Resource
win7-20220718-en
6 signatures
300 seconds
General
-
Target
6D2496735DC831B335C0E4440EF1FF2CA468E4115C1EEC18DD6719A1FC18C3BD.exe
-
Size
4.0MB
-
MD5
ce3e307c0152742b3c2a20060a9053e7
-
SHA1
0eea6a1295e9f2eb2abc0bcf3aa34fc8a8764244
-
SHA256
6d2496735dc831b335c0e4440ef1ff2ca468e4115c1eec18dd6719a1fc18c3bd
-
SHA512
b93f05bdcf098d3e18909980a436abb724dfdfb99eba3a9c08e72c3882f192373a740cd2570458d376bccc19559a6de322f4f9be8482695a7d5a6e410acc7486
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral1/memory/1332-54-0x0000000000370000-0x0000000001138000-memory.dmp family_ytstealer behavioral1/memory/1332-57-0x0000000000370000-0x0000000001138000-memory.dmp family_ytstealer -
resource yara_rule behavioral1/memory/1332-54-0x0000000000370000-0x0000000001138000-memory.dmp upx behavioral1/memory/1332-57-0x0000000000370000-0x0000000001138000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1332 6D2496735DC831B335C0E4440EF1FF2CA468E4115C1EEC18DD6719A1FC18C3BD.exe 1332 6D2496735DC831B335C0E4440EF1FF2CA468E4115C1EEC18DD6719A1FC18C3BD.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1332 wrote to memory of 1676 1332 6D2496735DC831B335C0E4440EF1FF2CA468E4115C1EEC18DD6719A1FC18C3BD.exe 31 PID 1332 wrote to memory of 1676 1332 6D2496735DC831B335C0E4440EF1FF2CA468E4115C1EEC18DD6719A1FC18C3BD.exe 31 PID 1332 wrote to memory of 1676 1332 6D2496735DC831B335C0E4440EF1FF2CA468E4115C1EEC18DD6719A1FC18C3BD.exe 31 PID 1676 wrote to memory of 572 1676 cmd.exe 30 PID 1676 wrote to memory of 572 1676 cmd.exe 30 PID 1676 wrote to memory of 572 1676 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\6D2496735DC831B335C0E4440EF1FF2CA468E4115C1EEC18DD6719A1FC18C3BD.exe"C:\Users\Admin\AppData\Local\Temp\6D2496735DC831B335C0E4440EF1FF2CA468E4115C1EEC18DD6719A1FC18C3BD.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\6D2496735DC831B335C0E4440EF1FF2CA468E4115C1EEC18DD6719A1FC18C3BD.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1676
-
-
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 01⤵PID:572