Analysis
-
max time kernel
39s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
02-08-2022 05:21
Behavioral task
behavioral1
Sample
c3681da8cdbba19041d36bb0fbec162ddaae98a2ba9fe2b29d252e26f64a4ec8.exe
Resource
win7-20220718-en
windows7-x64
6 signatures
300 seconds
General
-
Target
c3681da8cdbba19041d36bb0fbec162ddaae98a2ba9fe2b29d252e26f64a4ec8.exe
-
Size
4.0MB
-
MD5
27167814efa448fec2bbcf35991f5eca
-
SHA1
85a1aae8faa4fbd0985fa357586b3c5bc4f4e3ab
-
SHA256
c3681da8cdbba19041d36bb0fbec162ddaae98a2ba9fe2b29d252e26f64a4ec8
-
SHA512
3832c84b76db5404fb67b5d2c90c59a012dff4631bf9fa276879d11f65ecd14ed0b1b00af6d01eb3854279a874aca5e2d763ff6d316505e67276adc92232a85b
Malware Config
Signatures
-
YTStealer payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2032-54-0x0000000000120000-0x0000000000EF8000-memory.dmp family_ytstealer behavioral1/memory/2032-57-0x0000000000120000-0x0000000000EF8000-memory.dmp family_ytstealer -
Processes:
resource yara_rule behavioral1/memory/2032-54-0x0000000000120000-0x0000000000EF8000-memory.dmp upx behavioral1/memory/2032-57-0x0000000000120000-0x0000000000EF8000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
c3681da8cdbba19041d36bb0fbec162ddaae98a2ba9fe2b29d252e26f64a4ec8.exepid process 2032 c3681da8cdbba19041d36bb0fbec162ddaae98a2ba9fe2b29d252e26f64a4ec8.exe 2032 c3681da8cdbba19041d36bb0fbec162ddaae98a2ba9fe2b29d252e26f64a4ec8.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
c3681da8cdbba19041d36bb0fbec162ddaae98a2ba9fe2b29d252e26f64a4ec8.execmd.exedescription pid process target process PID 2032 wrote to memory of 268 2032 c3681da8cdbba19041d36bb0fbec162ddaae98a2ba9fe2b29d252e26f64a4ec8.exe cmd.exe PID 2032 wrote to memory of 268 2032 c3681da8cdbba19041d36bb0fbec162ddaae98a2ba9fe2b29d252e26f64a4ec8.exe cmd.exe PID 2032 wrote to memory of 268 2032 c3681da8cdbba19041d36bb0fbec162ddaae98a2ba9fe2b29d252e26f64a4ec8.exe cmd.exe PID 268 wrote to memory of 1712 268 cmd.exe choice.exe PID 268 wrote to memory of 1712 268 cmd.exe choice.exe PID 268 wrote to memory of 1712 268 cmd.exe choice.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c3681da8cdbba19041d36bb0fbec162ddaae98a2ba9fe2b29d252e26f64a4ec8.exe"C:\Users\Admin\AppData\Local\Temp\c3681da8cdbba19041d36bb0fbec162ddaae98a2ba9fe2b29d252e26f64a4ec8.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\c3681da8cdbba19041d36bb0fbec162ddaae98a2ba9fe2b29d252e26f64a4ec8.exe2⤵
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:1712
-
-