Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
27-07-2022 06:35
Behavioral task
behavioral1
Sample
D65F2C7C9949718C152BE861AD2370D3CD570E07EBA358D625F5E60EC02B955E.exe
Resource
win7-20220718-en
windows7-x64
7 signatures
300 seconds
General
-
Target
D65F2C7C9949718C152BE861AD2370D3CD570E07EBA358D625F5E60EC02B955E.exe
-
Size
4.0MB
-
MD5
996716611d933f252a6a95630cbede27
-
SHA1
b8559f028a0873a0764aab3566475153dde931f1
-
SHA256
d65f2c7c9949718c152be861ad2370d3cd570e07eba358d625f5e60ec02b955e
-
SHA512
5e1790b1d89f62bacc6087fed8bc69ee0f247d715e84efde531c425b80308759c8770dd4b6cf321cce2b8026cde4eaecbba7573ca4bab0ad4385f8a564cbc38b
Malware Config
Signatures
-
YTStealer payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1304-54-0x0000000001230000-0x0000000002009000-memory.dmp family_ytstealer behavioral1/memory/1304-57-0x0000000001230000-0x0000000002009000-memory.dmp family_ytstealer -
Processes:
resource yara_rule behavioral1/memory/1304-54-0x0000000001230000-0x0000000002009000-memory.dmp upx behavioral1/memory/1304-57-0x0000000001230000-0x0000000002009000-memory.dmp upx -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1784 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
D65F2C7C9949718C152BE861AD2370D3CD570E07EBA358D625F5E60EC02B955E.exepid process 1304 D65F2C7C9949718C152BE861AD2370D3CD570E07EBA358D625F5E60EC02B955E.exe 1304 D65F2C7C9949718C152BE861AD2370D3CD570E07EBA358D625F5E60EC02B955E.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
D65F2C7C9949718C152BE861AD2370D3CD570E07EBA358D625F5E60EC02B955E.execmd.exedescription pid process target process PID 1304 wrote to memory of 1784 1304 D65F2C7C9949718C152BE861AD2370D3CD570E07EBA358D625F5E60EC02B955E.exe cmd.exe PID 1304 wrote to memory of 1784 1304 D65F2C7C9949718C152BE861AD2370D3CD570E07EBA358D625F5E60EC02B955E.exe cmd.exe PID 1304 wrote to memory of 1784 1304 D65F2C7C9949718C152BE861AD2370D3CD570E07EBA358D625F5E60EC02B955E.exe cmd.exe PID 1784 wrote to memory of 524 1784 cmd.exe choice.exe PID 1784 wrote to memory of 524 1784 cmd.exe choice.exe PID 1784 wrote to memory of 524 1784 cmd.exe choice.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\D65F2C7C9949718C152BE861AD2370D3CD570E07EBA358D625F5E60EC02B955E.exe"C:\Users\Admin\AppData\Local\Temp\D65F2C7C9949718C152BE861AD2370D3CD570E07EBA358D625F5E60EC02B955E.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\D65F2C7C9949718C152BE861AD2370D3CD570E07EBA358D625F5E60EC02B955E.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:524
-
-