Analysis
-
max time kernel
37s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
05/08/2022, 22:19
Behavioral task
behavioral1
Sample
92245780525c0fec0ea8e8a9a6476a203854add640c090e2d66df35c0b4047c9.exe
Resource
win7-20220715-en
6 signatures
300 seconds
General
-
Target
92245780525c0fec0ea8e8a9a6476a203854add640c090e2d66df35c0b4047c9.exe
-
Size
4.0MB
-
MD5
ea2b810e41d2cf01faed23007e21dc1c
-
SHA1
f47c68304448f81dd59a5641f26a2affbd5d1bb8
-
SHA256
92245780525c0fec0ea8e8a9a6476a203854add640c090e2d66df35c0b4047c9
-
SHA512
da50d6afb203cc22022c7feb7314f6ee94587aeccbd0780514bf33b263afdd37fe94e711c860dfbbe27648b1c09bc3da33150276616d7c85b0fbb10d495184df
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral1/memory/1752-54-0x0000000000E10000-0x0000000001BE9000-memory.dmp family_ytstealer behavioral1/memory/1752-57-0x0000000000E10000-0x0000000001BE9000-memory.dmp family_ytstealer -
resource yara_rule behavioral1/memory/1752-54-0x0000000000E10000-0x0000000001BE9000-memory.dmp upx behavioral1/memory/1752-57-0x0000000000E10000-0x0000000001BE9000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1752 92245780525c0fec0ea8e8a9a6476a203854add640c090e2d66df35c0b4047c9.exe 1752 92245780525c0fec0ea8e8a9a6476a203854add640c090e2d66df35c0b4047c9.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1752 wrote to memory of 1760 1752 92245780525c0fec0ea8e8a9a6476a203854add640c090e2d66df35c0b4047c9.exe 27 PID 1752 wrote to memory of 1760 1752 92245780525c0fec0ea8e8a9a6476a203854add640c090e2d66df35c0b4047c9.exe 27 PID 1752 wrote to memory of 1760 1752 92245780525c0fec0ea8e8a9a6476a203854add640c090e2d66df35c0b4047c9.exe 27 PID 1760 wrote to memory of 2028 1760 cmd.exe 29 PID 1760 wrote to memory of 2028 1760 cmd.exe 29 PID 1760 wrote to memory of 2028 1760 cmd.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\92245780525c0fec0ea8e8a9a6476a203854add640c090e2d66df35c0b4047c9.exe"C:\Users\Admin\AppData\Local\Temp\92245780525c0fec0ea8e8a9a6476a203854add640c090e2d66df35c0b4047c9.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\92245780525c0fec0ea8e8a9a6476a203854add640c090e2d66df35c0b4047c9.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:2028
-
-