Analysis
-
max time kernel
45s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
27-07-2022 06:36
Behavioral task
behavioral1
Sample
F0750D55D92EE592CF11D0FC6D1A62D21095406A5BCDFD8EAB0C50D0831C7AD1.exe
Resource
win7-20220715-en
windows7-x64
6 signatures
300 seconds
General
-
Target
F0750D55D92EE592CF11D0FC6D1A62D21095406A5BCDFD8EAB0C50D0831C7AD1.exe
-
Size
4.0MB
-
MD5
da98d6c84c0348af0211b8c0f22b2233
-
SHA1
7e4d1d2f4c213fb668b28532d6181c146f68e585
-
SHA256
f0750d55d92ee592cf11d0fc6d1a62d21095406a5bcdfd8eab0c50d0831c7ad1
-
SHA512
192517d3140284def632feb3ba8f4b37c71c51d9a12231311b5c9d82c4c30cd3db83814cf414018858df0818c57332a69be401a5520365f6d7d3c3d63615f07b
Malware Config
Signatures
-
YTStealer payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1668-54-0x0000000000950000-0x0000000001728000-memory.dmp family_ytstealer behavioral1/memory/1668-57-0x0000000000950000-0x0000000001728000-memory.dmp family_ytstealer -
Processes:
resource yara_rule behavioral1/memory/1668-54-0x0000000000950000-0x0000000001728000-memory.dmp upx behavioral1/memory/1668-57-0x0000000000950000-0x0000000001728000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
F0750D55D92EE592CF11D0FC6D1A62D21095406A5BCDFD8EAB0C50D0831C7AD1.exepid process 1668 F0750D55D92EE592CF11D0FC6D1A62D21095406A5BCDFD8EAB0C50D0831C7AD1.exe 1668 F0750D55D92EE592CF11D0FC6D1A62D21095406A5BCDFD8EAB0C50D0831C7AD1.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
F0750D55D92EE592CF11D0FC6D1A62D21095406A5BCDFD8EAB0C50D0831C7AD1.execmd.exedescription pid process target process PID 1668 wrote to memory of 608 1668 F0750D55D92EE592CF11D0FC6D1A62D21095406A5BCDFD8EAB0C50D0831C7AD1.exe cmd.exe PID 1668 wrote to memory of 608 1668 F0750D55D92EE592CF11D0FC6D1A62D21095406A5BCDFD8EAB0C50D0831C7AD1.exe cmd.exe PID 1668 wrote to memory of 608 1668 F0750D55D92EE592CF11D0FC6D1A62D21095406A5BCDFD8EAB0C50D0831C7AD1.exe cmd.exe PID 608 wrote to memory of 524 608 cmd.exe choice.exe PID 608 wrote to memory of 524 608 cmd.exe choice.exe PID 608 wrote to memory of 524 608 cmd.exe choice.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\F0750D55D92EE592CF11D0FC6D1A62D21095406A5BCDFD8EAB0C50D0831C7AD1.exe"C:\Users\Admin\AppData\Local\Temp\F0750D55D92EE592CF11D0FC6D1A62D21095406A5BCDFD8EAB0C50D0831C7AD1.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\F0750D55D92EE592CF11D0FC6D1A62D21095406A5BCDFD8EAB0C50D0831C7AD1.exe2⤵
- Suspicious use of WriteProcessMemory
PID:608 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:524
-
-