Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
27/07/2022, 06:35
Behavioral task
behavioral1
Sample
D65F2C7C9949718C152BE861AD2370D3CD570E07EBA358D625F5E60EC02B955E.exe
Resource
win7-20220718-en
7 signatures
300 seconds
General
-
Target
D65F2C7C9949718C152BE861AD2370D3CD570E07EBA358D625F5E60EC02B955E.exe
-
Size
4.0MB
-
MD5
996716611d933f252a6a95630cbede27
-
SHA1
b8559f028a0873a0764aab3566475153dde931f1
-
SHA256
d65f2c7c9949718c152be861ad2370d3cd570e07eba358d625f5e60ec02b955e
-
SHA512
5e1790b1d89f62bacc6087fed8bc69ee0f247d715e84efde531c425b80308759c8770dd4b6cf321cce2b8026cde4eaecbba7573ca4bab0ad4385f8a564cbc38b
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral1/memory/1304-54-0x0000000001230000-0x0000000002009000-memory.dmp family_ytstealer behavioral1/memory/1304-57-0x0000000001230000-0x0000000002009000-memory.dmp family_ytstealer -
resource yara_rule behavioral1/memory/1304-54-0x0000000001230000-0x0000000002009000-memory.dmp upx behavioral1/memory/1304-57-0x0000000001230000-0x0000000002009000-memory.dmp upx -
Deletes itself 1 IoCs
pid Process 1784 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1304 D65F2C7C9949718C152BE861AD2370D3CD570E07EBA358D625F5E60EC02B955E.exe 1304 D65F2C7C9949718C152BE861AD2370D3CD570E07EBA358D625F5E60EC02B955E.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1304 wrote to memory of 1784 1304 D65F2C7C9949718C152BE861AD2370D3CD570E07EBA358D625F5E60EC02B955E.exe 28 PID 1304 wrote to memory of 1784 1304 D65F2C7C9949718C152BE861AD2370D3CD570E07EBA358D625F5E60EC02B955E.exe 28 PID 1304 wrote to memory of 1784 1304 D65F2C7C9949718C152BE861AD2370D3CD570E07EBA358D625F5E60EC02B955E.exe 28 PID 1784 wrote to memory of 524 1784 cmd.exe 30 PID 1784 wrote to memory of 524 1784 cmd.exe 30 PID 1784 wrote to memory of 524 1784 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\D65F2C7C9949718C152BE861AD2370D3CD570E07EBA358D625F5E60EC02B955E.exe"C:\Users\Admin\AppData\Local\Temp\D65F2C7C9949718C152BE861AD2370D3CD570E07EBA358D625F5E60EC02B955E.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\D65F2C7C9949718C152BE861AD2370D3CD570E07EBA358D625F5E60EC02B955E.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:524
-
-