Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
20/07/2022, 08:07
Behavioral task
behavioral1
Sample
C0F8296C3117EBD81FC8E23E46DD515DE17758B80A8D2BF0F3AA0CD7DC29DA8A.exe
Resource
win7-20220718-en
7 signatures
300 seconds
General
-
Target
C0F8296C3117EBD81FC8E23E46DD515DE17758B80A8D2BF0F3AA0CD7DC29DA8A.exe
-
Size
4.0MB
-
MD5
1abd245ccbf9c8862a43503b76ca4f84
-
SHA1
724ec77b362d050b3461abf79b1ad0c026453d2c
-
SHA256
c0f8296c3117ebd81fc8e23e46dd515de17758b80a8d2bf0f3aa0cd7dc29da8a
-
SHA512
13f6daa23842dda9209fc3022fa6e7a7e878b67e26c305999279d80d0abfe31db0af76a529b04eeffc19564827f561880a60b4b808c9b4da843c3c5da00300f6
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral1/memory/1940-54-0x00000000001E0000-0x0000000000FA9000-memory.dmp family_ytstealer behavioral1/memory/1940-57-0x00000000001E0000-0x0000000000FA9000-memory.dmp family_ytstealer -
resource yara_rule behavioral1/memory/1940-54-0x00000000001E0000-0x0000000000FA9000-memory.dmp upx behavioral1/memory/1940-57-0x00000000001E0000-0x0000000000FA9000-memory.dmp upx -
Deletes itself 1 IoCs
pid Process 1804 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1940 C0F8296C3117EBD81FC8E23E46DD515DE17758B80A8D2BF0F3AA0CD7DC29DA8A.exe 1940 C0F8296C3117EBD81FC8E23E46DD515DE17758B80A8D2BF0F3AA0CD7DC29DA8A.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1940 wrote to memory of 1804 1940 C0F8296C3117EBD81FC8E23E46DD515DE17758B80A8D2BF0F3AA0CD7DC29DA8A.exe 28 PID 1940 wrote to memory of 1804 1940 C0F8296C3117EBD81FC8E23E46DD515DE17758B80A8D2BF0F3AA0CD7DC29DA8A.exe 28 PID 1940 wrote to memory of 1804 1940 C0F8296C3117EBD81FC8E23E46DD515DE17758B80A8D2BF0F3AA0CD7DC29DA8A.exe 28 PID 1804 wrote to memory of 668 1804 cmd.exe 30 PID 1804 wrote to memory of 668 1804 cmd.exe 30 PID 1804 wrote to memory of 668 1804 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\C0F8296C3117EBD81FC8E23E46DD515DE17758B80A8D2BF0F3AA0CD7DC29DA8A.exe"C:\Users\Admin\AppData\Local\Temp\C0F8296C3117EBD81FC8E23E46DD515DE17758B80A8D2BF0F3AA0CD7DC29DA8A.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\C0F8296C3117EBD81FC8E23E46DD515DE17758B80A8D2BF0F3AA0CD7DC29DA8A.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:668
-
-