Analysis
-
max time kernel
40s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
27-07-2022 06:33
Behavioral task
behavioral1
Sample
ABCBC149F7CAAD29D2AA2319824554F5B8862EA4D2B6E9C6DAE718407DA8BD92.exe
Resource
win7-20220718-en
windows7-x64
6 signatures
300 seconds
General
-
Target
ABCBC149F7CAAD29D2AA2319824554F5B8862EA4D2B6E9C6DAE718407DA8BD92.exe
-
Size
4.0MB
-
MD5
eda07d446b4e8f47207e92c0830aece5
-
SHA1
22856a9b19b6de9cdba9c3411e90af3b459553f0
-
SHA256
abcbc149f7caad29d2aa2319824554f5b8862ea4d2b6e9c6dae718407da8bd92
-
SHA512
10e2ff23e6dbd699f851caaad3a3511c4a4500df51f5a1271eced2574f5192441925b6fe78d7907ed82ed0d5a7685d75d24d41ea77df3cdebfe20bf21cbad6b8
Malware Config
Signatures
-
YTStealer payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/884-54-0x0000000000CF0000-0x0000000001AC9000-memory.dmp family_ytstealer behavioral1/memory/884-57-0x0000000000CF0000-0x0000000001AC9000-memory.dmp family_ytstealer -
Processes:
resource yara_rule behavioral1/memory/884-54-0x0000000000CF0000-0x0000000001AC9000-memory.dmp upx behavioral1/memory/884-57-0x0000000000CF0000-0x0000000001AC9000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
ABCBC149F7CAAD29D2AA2319824554F5B8862EA4D2B6E9C6DAE718407DA8BD92.exepid process 884 ABCBC149F7CAAD29D2AA2319824554F5B8862EA4D2B6E9C6DAE718407DA8BD92.exe 884 ABCBC149F7CAAD29D2AA2319824554F5B8862EA4D2B6E9C6DAE718407DA8BD92.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
ABCBC149F7CAAD29D2AA2319824554F5B8862EA4D2B6E9C6DAE718407DA8BD92.execmd.exedescription pid process target process PID 884 wrote to memory of 1804 884 ABCBC149F7CAAD29D2AA2319824554F5B8862EA4D2B6E9C6DAE718407DA8BD92.exe cmd.exe PID 884 wrote to memory of 1804 884 ABCBC149F7CAAD29D2AA2319824554F5B8862EA4D2B6E9C6DAE718407DA8BD92.exe cmd.exe PID 884 wrote to memory of 1804 884 ABCBC149F7CAAD29D2AA2319824554F5B8862EA4D2B6E9C6DAE718407DA8BD92.exe cmd.exe PID 1804 wrote to memory of 668 1804 cmd.exe choice.exe PID 1804 wrote to memory of 668 1804 cmd.exe choice.exe PID 1804 wrote to memory of 668 1804 cmd.exe choice.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ABCBC149F7CAAD29D2AA2319824554F5B8862EA4D2B6E9C6DAE718407DA8BD92.exe"C:\Users\Admin\AppData\Local\Temp\ABCBC149F7CAAD29D2AA2319824554F5B8862EA4D2B6E9C6DAE718407DA8BD92.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\ABCBC149F7CAAD29D2AA2319824554F5B8862EA4D2B6E9C6DAE718407DA8BD92.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:668
-
-