Analysis
-
max time kernel
44s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
27-07-2022 06:34
Behavioral task
behavioral1
Sample
AEDB009107F787D287D8C6D96AEA50F07A1E68D005D4DB4E00701D03F0E99DEC.exe
Resource
win7-20220715-en
windows7-x64
6 signatures
300 seconds
General
-
Target
AEDB009107F787D287D8C6D96AEA50F07A1E68D005D4DB4E00701D03F0E99DEC.exe
-
Size
4.0MB
-
MD5
ff63970655db3949bba30d372ea7732f
-
SHA1
64426330be903de91b043809b5b08301ed361528
-
SHA256
aedb009107f787d287d8c6d96aea50f07a1e68d005d4db4e00701d03f0e99dec
-
SHA512
0c33c25a253980c7f00c548b1d37ded52a379bdae48bfbb8060157dc40e4d42a2209277b38af95445d5549349e1d9cd8bbc301847f0d388c7458aa6803ae72f5
Malware Config
Signatures
-
YTStealer payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1796-54-0x00000000002D0000-0x00000000010A8000-memory.dmp family_ytstealer behavioral1/memory/1796-57-0x00000000002D0000-0x00000000010A8000-memory.dmp family_ytstealer -
Processes:
resource yara_rule behavioral1/memory/1796-54-0x00000000002D0000-0x00000000010A8000-memory.dmp upx behavioral1/memory/1796-57-0x00000000002D0000-0x00000000010A8000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
AEDB009107F787D287D8C6D96AEA50F07A1E68D005D4DB4E00701D03F0E99DEC.exepid process 1796 AEDB009107F787D287D8C6D96AEA50F07A1E68D005D4DB4E00701D03F0E99DEC.exe 1796 AEDB009107F787D287D8C6D96AEA50F07A1E68D005D4DB4E00701D03F0E99DEC.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
AEDB009107F787D287D8C6D96AEA50F07A1E68D005D4DB4E00701D03F0E99DEC.execmd.exedescription pid process target process PID 1796 wrote to memory of 472 1796 AEDB009107F787D287D8C6D96AEA50F07A1E68D005D4DB4E00701D03F0E99DEC.exe cmd.exe PID 1796 wrote to memory of 472 1796 AEDB009107F787D287D8C6D96AEA50F07A1E68D005D4DB4E00701D03F0E99DEC.exe cmd.exe PID 1796 wrote to memory of 472 1796 AEDB009107F787D287D8C6D96AEA50F07A1E68D005D4DB4E00701D03F0E99DEC.exe cmd.exe PID 472 wrote to memory of 1660 472 cmd.exe choice.exe PID 472 wrote to memory of 1660 472 cmd.exe choice.exe PID 472 wrote to memory of 1660 472 cmd.exe choice.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\AEDB009107F787D287D8C6D96AEA50F07A1E68D005D4DB4E00701D03F0E99DEC.exe"C:\Users\Admin\AppData\Local\Temp\AEDB009107F787D287D8C6D96AEA50F07A1E68D005D4DB4E00701D03F0E99DEC.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\AEDB009107F787D287D8C6D96AEA50F07A1E68D005D4DB4E00701D03F0E99DEC.exe2⤵
- Suspicious use of WriteProcessMemory
PID:472 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:1660
-
-