Analysis
-
max time kernel
50s -
max time network
178s -
platform
windows10-1703_x64 -
resource
win10-20220722-en -
resource tags
arch:x64arch:x86image:win10-20220722-enlocale:en-usos:windows10-1703-x64system -
submitted
27/07/2022, 06:32
Behavioral task
behavioral1
Sample
A3C93F6F564C4BF90C0234024898E2FE4C3C1F3F9F225EE871CB4D773FDDAEC2.exe
Resource
win7-20220715-en
7 signatures
300 seconds
General
-
Target
A3C93F6F564C4BF90C0234024898E2FE4C3C1F3F9F225EE871CB4D773FDDAEC2.exe
-
Size
4.0MB
-
MD5
f9ba1595223c69e435b806610d43186d
-
SHA1
f6b0c20667eb38f140c18b717be6698a90574ddc
-
SHA256
a3c93f6f564c4bf90c0234024898e2fe4c3c1f3f9f225ee871cb4d773fddaec2
-
SHA512
3244867074190342a52ec96971ad622a525c46bd90564c500966e7fa4e02747db9693a69047dda8355127a8423261498c7dbc126bcc3307d9b08bed9df6d0ea4
Malware Config
Signatures
-
YTStealer payload 1 IoCs
resource yara_rule behavioral2/memory/68-129-0x0000000000910000-0x00000000016E9000-memory.dmp family_ytstealer -
resource yara_rule behavioral2/memory/68-127-0x0000000000910000-0x00000000016E9000-memory.dmp upx behavioral2/memory/68-129-0x0000000000910000-0x00000000016E9000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 68 A3C93F6F564C4BF90C0234024898E2FE4C3C1F3F9F225EE871CB4D773FDDAEC2.exe 68 A3C93F6F564C4BF90C0234024898E2FE4C3C1F3F9F225EE871CB4D773FDDAEC2.exe 68 A3C93F6F564C4BF90C0234024898E2FE4C3C1F3F9F225EE871CB4D773FDDAEC2.exe 68 A3C93F6F564C4BF90C0234024898E2FE4C3C1F3F9F225EE871CB4D773FDDAEC2.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 68 wrote to memory of 4284 68 A3C93F6F564C4BF90C0234024898E2FE4C3C1F3F9F225EE871CB4D773FDDAEC2.exe 67 PID 68 wrote to memory of 4284 68 A3C93F6F564C4BF90C0234024898E2FE4C3C1F3F9F225EE871CB4D773FDDAEC2.exe 67 PID 4284 wrote to memory of 4560 4284 cmd.exe 69 PID 4284 wrote to memory of 4560 4284 cmd.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\A3C93F6F564C4BF90C0234024898E2FE4C3C1F3F9F225EE871CB4D773FDDAEC2.exe"C:\Users\Admin\AppData\Local\Temp\A3C93F6F564C4BF90C0234024898E2FE4C3C1F3F9F225EE871CB4D773FDDAEC2.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:68 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\A3C93F6F564C4BF90C0234024898E2FE4C3C1F3F9F225EE871CB4D773FDDAEC2.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:4560
-
-