Analysis
-
max time kernel
45s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
02-08-2022 22:17
Behavioral task
behavioral1
Sample
21c2f78a2ba5891c4dbdc1b50283844c7720ecd3f1187fb9269015524cad2da2.exe
Resource
win7-20220718-en
windows7-x64
6 signatures
300 seconds
General
-
Target
21c2f78a2ba5891c4dbdc1b50283844c7720ecd3f1187fb9269015524cad2da2.exe
-
Size
4.0MB
-
MD5
b09ec6718a34a70a182f3412b89f6777
-
SHA1
e730645db18339897aeddb4f21ce662911e03444
-
SHA256
21c2f78a2ba5891c4dbdc1b50283844c7720ecd3f1187fb9269015524cad2da2
-
SHA512
5d0f9eb9fcfe8a5d6c42db552d35411116ec0b405e747537a75fd50fb6e9f1d1fc1bf95c169c5ef7c2d217b7cc5d647a6ed36f130e0382a71f919c5e09ec7881
Malware Config
Signatures
-
YTStealer payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1668-54-0x0000000000270000-0x0000000001049000-memory.dmp family_ytstealer behavioral1/memory/1668-57-0x0000000000270000-0x0000000001049000-memory.dmp family_ytstealer -
Processes:
resource yara_rule behavioral1/memory/1668-54-0x0000000000270000-0x0000000001049000-memory.dmp upx behavioral1/memory/1668-57-0x0000000000270000-0x0000000001049000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
21c2f78a2ba5891c4dbdc1b50283844c7720ecd3f1187fb9269015524cad2da2.exepid process 1668 21c2f78a2ba5891c4dbdc1b50283844c7720ecd3f1187fb9269015524cad2da2.exe 1668 21c2f78a2ba5891c4dbdc1b50283844c7720ecd3f1187fb9269015524cad2da2.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
21c2f78a2ba5891c4dbdc1b50283844c7720ecd3f1187fb9269015524cad2da2.execmd.exedescription pid process target process PID 1668 wrote to memory of 1564 1668 21c2f78a2ba5891c4dbdc1b50283844c7720ecd3f1187fb9269015524cad2da2.exe cmd.exe PID 1668 wrote to memory of 1564 1668 21c2f78a2ba5891c4dbdc1b50283844c7720ecd3f1187fb9269015524cad2da2.exe cmd.exe PID 1668 wrote to memory of 1564 1668 21c2f78a2ba5891c4dbdc1b50283844c7720ecd3f1187fb9269015524cad2da2.exe cmd.exe PID 1564 wrote to memory of 1056 1564 cmd.exe choice.exe PID 1564 wrote to memory of 1056 1564 cmd.exe choice.exe PID 1564 wrote to memory of 1056 1564 cmd.exe choice.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\21c2f78a2ba5891c4dbdc1b50283844c7720ecd3f1187fb9269015524cad2da2.exe"C:\Users\Admin\AppData\Local\Temp\21c2f78a2ba5891c4dbdc1b50283844c7720ecd3f1187fb9269015524cad2da2.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\21c2f78a2ba5891c4dbdc1b50283844c7720ecd3f1187fb9269015524cad2da2.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:1056
-
-