Analysis
-
max time kernel
43s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
20/07/2022, 08:25
Behavioral task
behavioral1
Sample
FFF0E26AAE680838B8EA5DBC1AABD471263414D605860B84D22B2EB6DE7568B6.exe
Resource
win7-20220718-en
6 signatures
300 seconds
General
-
Target
FFF0E26AAE680838B8EA5DBC1AABD471263414D605860B84D22B2EB6DE7568B6.exe
-
Size
4.0MB
-
MD5
83603028d9dd3d4401a1460220df722b
-
SHA1
b87cc0c7caa28a70e2fb51501e6f8d42c3fd20f4
-
SHA256
fff0e26aae680838b8ea5dbc1aabd471263414d605860b84d22b2eb6de7568b6
-
SHA512
7d60f41996fa2315a56be42a0662339b293504efb77d06dbd518718070716481fb1f413b1b54b8a26f0a4fb2bfe3275e0659a59ab5c4c892af17a73766ac1153
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral1/memory/752-54-0x0000000000D90000-0x0000000001B59000-memory.dmp family_ytstealer behavioral1/memory/752-57-0x0000000000D90000-0x0000000001B59000-memory.dmp family_ytstealer -
resource yara_rule behavioral1/memory/752-54-0x0000000000D90000-0x0000000001B59000-memory.dmp upx behavioral1/memory/752-57-0x0000000000D90000-0x0000000001B59000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 752 FFF0E26AAE680838B8EA5DBC1AABD471263414D605860B84D22B2EB6DE7568B6.exe 752 FFF0E26AAE680838B8EA5DBC1AABD471263414D605860B84D22B2EB6DE7568B6.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 752 wrote to memory of 1500 752 FFF0E26AAE680838B8EA5DBC1AABD471263414D605860B84D22B2EB6DE7568B6.exe 30 PID 752 wrote to memory of 1500 752 FFF0E26AAE680838B8EA5DBC1AABD471263414D605860B84D22B2EB6DE7568B6.exe 30 PID 752 wrote to memory of 1500 752 FFF0E26AAE680838B8EA5DBC1AABD471263414D605860B84D22B2EB6DE7568B6.exe 30 PID 1500 wrote to memory of 684 1500 cmd.exe 31 PID 1500 wrote to memory of 684 1500 cmd.exe 31 PID 1500 wrote to memory of 684 1500 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\FFF0E26AAE680838B8EA5DBC1AABD471263414D605860B84D22B2EB6DE7568B6.exe"C:\Users\Admin\AppData\Local\Temp\FFF0E26AAE680838B8EA5DBC1AABD471263414D605860B84D22B2EB6DE7568B6.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\FFF0E26AAE680838B8EA5DBC1AABD471263414D605860B84D22B2EB6DE7568B6.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:684
-
-