Analysis
-
max time kernel
31s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
31-07-2022 03:50
Behavioral task
behavioral1
Sample
d92069309254d809dd0928e5dbf2b31f52b9bfde5557bf5ca1548749a3ac6e10.exe
Resource
win7-20220718-en
windows7-x64
6 signatures
300 seconds
General
-
Target
d92069309254d809dd0928e5dbf2b31f52b9bfde5557bf5ca1548749a3ac6e10.exe
-
Size
4.0MB
-
MD5
35bd0f45b2597660d7895609fbd4bf11
-
SHA1
6e47c6ddccb7fab8ced9a8753ef27f5aa4a9e177
-
SHA256
d92069309254d809dd0928e5dbf2b31f52b9bfde5557bf5ca1548749a3ac6e10
-
SHA512
4353b165fe803069e34f9679c5302ec46c91323414b7444cf132b63e6bbf1cb5246165cbec4f56f7848621198955957a2dd2d939908c5db74f16755138cc691b
Malware Config
Signatures
-
YTStealer payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1328-54-0x0000000000F00000-0x0000000001CD9000-memory.dmp family_ytstealer behavioral1/memory/1328-57-0x0000000000F00000-0x0000000001CD9000-memory.dmp family_ytstealer -
Processes:
resource yara_rule behavioral1/memory/1328-54-0x0000000000F00000-0x0000000001CD9000-memory.dmp upx behavioral1/memory/1328-57-0x0000000000F00000-0x0000000001CD9000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
d92069309254d809dd0928e5dbf2b31f52b9bfde5557bf5ca1548749a3ac6e10.exepid process 1328 d92069309254d809dd0928e5dbf2b31f52b9bfde5557bf5ca1548749a3ac6e10.exe 1328 d92069309254d809dd0928e5dbf2b31f52b9bfde5557bf5ca1548749a3ac6e10.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
d92069309254d809dd0928e5dbf2b31f52b9bfde5557bf5ca1548749a3ac6e10.execmd.exedescription pid process target process PID 1328 wrote to memory of 1704 1328 d92069309254d809dd0928e5dbf2b31f52b9bfde5557bf5ca1548749a3ac6e10.exe cmd.exe PID 1328 wrote to memory of 1704 1328 d92069309254d809dd0928e5dbf2b31f52b9bfde5557bf5ca1548749a3ac6e10.exe cmd.exe PID 1328 wrote to memory of 1704 1328 d92069309254d809dd0928e5dbf2b31f52b9bfde5557bf5ca1548749a3ac6e10.exe cmd.exe PID 1704 wrote to memory of 1832 1704 cmd.exe choice.exe PID 1704 wrote to memory of 1832 1704 cmd.exe choice.exe PID 1704 wrote to memory of 1832 1704 cmd.exe choice.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d92069309254d809dd0928e5dbf2b31f52b9bfde5557bf5ca1548749a3ac6e10.exe"C:\Users\Admin\AppData\Local\Temp\d92069309254d809dd0928e5dbf2b31f52b9bfde5557bf5ca1548749a3ac6e10.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\d92069309254d809dd0928e5dbf2b31f52b9bfde5557bf5ca1548749a3ac6e10.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1704
-
-
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 01⤵PID:1832