Analysis
-
max time kernel
44s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
27/07/2022, 06:33
Behavioral task
behavioral1
Sample
A63477EAB4E8D0E0EF10B4A80D94B65C4B7C1BF2208C5086BE8823516F6BE2E4.exe
Resource
win7-20220715-en
6 signatures
300 seconds
General
-
Target
A63477EAB4E8D0E0EF10B4A80D94B65C4B7C1BF2208C5086BE8823516F6BE2E4.exe
-
Size
4.0MB
-
MD5
33dfe38c80eb29ee4cf9171c23cafe91
-
SHA1
16281d88e77d0f47d0f3e4fca9e66b678ef7b5c4
-
SHA256
a63477eab4e8d0e0ef10b4a80d94b65c4b7c1bf2208c5086be8823516f6be2e4
-
SHA512
c9a12f6e41734f0d647168d237b82a9fae239bc5485d00a5ed2d706285ad680737f405da9aaf21569d47b37bec08d461376401f35d25d71131362ed090a8cd12
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral1/memory/2012-54-0x0000000001260000-0x0000000002038000-memory.dmp family_ytstealer behavioral1/memory/2012-57-0x0000000001260000-0x0000000002038000-memory.dmp family_ytstealer -
resource yara_rule behavioral1/memory/2012-54-0x0000000001260000-0x0000000002038000-memory.dmp upx behavioral1/memory/2012-57-0x0000000001260000-0x0000000002038000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2012 A63477EAB4E8D0E0EF10B4A80D94B65C4B7C1BF2208C5086BE8823516F6BE2E4.exe 2012 A63477EAB4E8D0E0EF10B4A80D94B65C4B7C1BF2208C5086BE8823516F6BE2E4.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2012 wrote to memory of 1636 2012 A63477EAB4E8D0E0EF10B4A80D94B65C4B7C1BF2208C5086BE8823516F6BE2E4.exe 28 PID 2012 wrote to memory of 1636 2012 A63477EAB4E8D0E0EF10B4A80D94B65C4B7C1BF2208C5086BE8823516F6BE2E4.exe 28 PID 2012 wrote to memory of 1636 2012 A63477EAB4E8D0E0EF10B4A80D94B65C4B7C1BF2208C5086BE8823516F6BE2E4.exe 28 PID 1636 wrote to memory of 1288 1636 cmd.exe 30 PID 1636 wrote to memory of 1288 1636 cmd.exe 30 PID 1636 wrote to memory of 1288 1636 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\A63477EAB4E8D0E0EF10B4A80D94B65C4B7C1BF2208C5086BE8823516F6BE2E4.exe"C:\Users\Admin\AppData\Local\Temp\A63477EAB4E8D0E0EF10B4A80D94B65C4B7C1BF2208C5086BE8823516F6BE2E4.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\A63477EAB4E8D0E0EF10B4A80D94B65C4B7C1BF2208C5086BE8823516F6BE2E4.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:1288
-
-