Analysis
-
max time kernel
37s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
05-08-2022 22:19
Behavioral task
behavioral1
Sample
92245780525c0fec0ea8e8a9a6476a203854add640c090e2d66df35c0b4047c9.exe
Resource
win7-20220715-en
windows7-x64
6 signatures
300 seconds
General
-
Target
92245780525c0fec0ea8e8a9a6476a203854add640c090e2d66df35c0b4047c9.exe
-
Size
4.0MB
-
MD5
ea2b810e41d2cf01faed23007e21dc1c
-
SHA1
f47c68304448f81dd59a5641f26a2affbd5d1bb8
-
SHA256
92245780525c0fec0ea8e8a9a6476a203854add640c090e2d66df35c0b4047c9
-
SHA512
da50d6afb203cc22022c7feb7314f6ee94587aeccbd0780514bf33b263afdd37fe94e711c860dfbbe27648b1c09bc3da33150276616d7c85b0fbb10d495184df
Malware Config
Signatures
-
YTStealer payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1752-54-0x0000000000E10000-0x0000000001BE9000-memory.dmp family_ytstealer behavioral1/memory/1752-57-0x0000000000E10000-0x0000000001BE9000-memory.dmp family_ytstealer -
Processes:
resource yara_rule behavioral1/memory/1752-54-0x0000000000E10000-0x0000000001BE9000-memory.dmp upx behavioral1/memory/1752-57-0x0000000000E10000-0x0000000001BE9000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
92245780525c0fec0ea8e8a9a6476a203854add640c090e2d66df35c0b4047c9.exepid process 1752 92245780525c0fec0ea8e8a9a6476a203854add640c090e2d66df35c0b4047c9.exe 1752 92245780525c0fec0ea8e8a9a6476a203854add640c090e2d66df35c0b4047c9.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
92245780525c0fec0ea8e8a9a6476a203854add640c090e2d66df35c0b4047c9.execmd.exedescription pid process target process PID 1752 wrote to memory of 1760 1752 92245780525c0fec0ea8e8a9a6476a203854add640c090e2d66df35c0b4047c9.exe cmd.exe PID 1752 wrote to memory of 1760 1752 92245780525c0fec0ea8e8a9a6476a203854add640c090e2d66df35c0b4047c9.exe cmd.exe PID 1752 wrote to memory of 1760 1752 92245780525c0fec0ea8e8a9a6476a203854add640c090e2d66df35c0b4047c9.exe cmd.exe PID 1760 wrote to memory of 2028 1760 cmd.exe choice.exe PID 1760 wrote to memory of 2028 1760 cmd.exe choice.exe PID 1760 wrote to memory of 2028 1760 cmd.exe choice.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\92245780525c0fec0ea8e8a9a6476a203854add640c090e2d66df35c0b4047c9.exe"C:\Users\Admin\AppData\Local\Temp\92245780525c0fec0ea8e8a9a6476a203854add640c090e2d66df35c0b4047c9.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\92245780525c0fec0ea8e8a9a6476a203854add640c090e2d66df35c0b4047c9.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:2028
-
-