Analysis
-
max time kernel
38s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
27/07/2022, 06:32
Behavioral task
behavioral1
Sample
A3C93F6F564C4BF90C0234024898E2FE4C3C1F3F9F225EE871CB4D773FDDAEC2.exe
Resource
win7-20220715-en
7 signatures
300 seconds
General
-
Target
A3C93F6F564C4BF90C0234024898E2FE4C3C1F3F9F225EE871CB4D773FDDAEC2.exe
-
Size
4.0MB
-
MD5
f9ba1595223c69e435b806610d43186d
-
SHA1
f6b0c20667eb38f140c18b717be6698a90574ddc
-
SHA256
a3c93f6f564c4bf90c0234024898e2fe4c3c1f3f9f225ee871cb4d773fddaec2
-
SHA512
3244867074190342a52ec96971ad622a525c46bd90564c500966e7fa4e02747db9693a69047dda8355127a8423261498c7dbc126bcc3307d9b08bed9df6d0ea4
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral1/memory/2040-54-0x0000000000A40000-0x0000000001819000-memory.dmp family_ytstealer behavioral1/memory/2040-56-0x0000000000A40000-0x0000000001819000-memory.dmp family_ytstealer -
resource yara_rule behavioral1/memory/2040-54-0x0000000000A40000-0x0000000001819000-memory.dmp upx behavioral1/memory/2040-56-0x0000000000A40000-0x0000000001819000-memory.dmp upx -
Deletes itself 1 IoCs
pid Process 672 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2040 A3C93F6F564C4BF90C0234024898E2FE4C3C1F3F9F225EE871CB4D773FDDAEC2.exe 2040 A3C93F6F564C4BF90C0234024898E2FE4C3C1F3F9F225EE871CB4D773FDDAEC2.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2040 wrote to memory of 672 2040 A3C93F6F564C4BF90C0234024898E2FE4C3C1F3F9F225EE871CB4D773FDDAEC2.exe 28 PID 2040 wrote to memory of 672 2040 A3C93F6F564C4BF90C0234024898E2FE4C3C1F3F9F225EE871CB4D773FDDAEC2.exe 28 PID 2040 wrote to memory of 672 2040 A3C93F6F564C4BF90C0234024898E2FE4C3C1F3F9F225EE871CB4D773FDDAEC2.exe 28 PID 672 wrote to memory of 968 672 cmd.exe 30 PID 672 wrote to memory of 968 672 cmd.exe 30 PID 672 wrote to memory of 968 672 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\A3C93F6F564C4BF90C0234024898E2FE4C3C1F3F9F225EE871CB4D773FDDAEC2.exe"C:\Users\Admin\AppData\Local\Temp\A3C93F6F564C4BF90C0234024898E2FE4C3C1F3F9F225EE871CB4D773FDDAEC2.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\A3C93F6F564C4BF90C0234024898E2FE4C3C1F3F9F225EE871CB4D773FDDAEC2.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:968
-
-