Analysis
-
max time kernel
40s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
12-08-2022 07:13
Behavioral task
behavioral1
Sample
D5298736DB894BC5D7E738968C2268C6D198D0B3A8C041EED08C992E8B83B5E2.exe
Resource
win7-20220715-en
windows7-x64
7 signatures
300 seconds
General
-
Target
D5298736DB894BC5D7E738968C2268C6D198D0B3A8C041EED08C992E8B83B5E2.exe
-
Size
4.0MB
-
MD5
8dab082eb8ef87f7afd0c474a89d63d2
-
SHA1
15f907543badc28772cea3b322a9145258d2eddf
-
SHA256
d5298736db894bc5d7e738968c2268c6d198d0b3a8c041eed08c992e8b83b5e2
-
SHA512
ddbd0066c181f3b82fefac12d5e9764cf995c7dea7ea18a159926b1bdfb3f9e285e8e0fefac19951a4790c30b7bfdf2ec3e5deb55a519047688aee51d3f94445
Malware Config
Signatures
-
YTStealer payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1364-54-0x0000000001180000-0x0000000001F59000-memory.dmp family_ytstealer behavioral1/memory/1364-57-0x0000000001180000-0x0000000001F59000-memory.dmp family_ytstealer -
Processes:
resource yara_rule behavioral1/memory/1364-54-0x0000000001180000-0x0000000001F59000-memory.dmp upx behavioral1/memory/1364-57-0x0000000001180000-0x0000000001F59000-memory.dmp upx -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1732 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
D5298736DB894BC5D7E738968C2268C6D198D0B3A8C041EED08C992E8B83B5E2.exepid process 1364 D5298736DB894BC5D7E738968C2268C6D198D0B3A8C041EED08C992E8B83B5E2.exe 1364 D5298736DB894BC5D7E738968C2268C6D198D0B3A8C041EED08C992E8B83B5E2.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
D5298736DB894BC5D7E738968C2268C6D198D0B3A8C041EED08C992E8B83B5E2.execmd.exedescription pid process target process PID 1364 wrote to memory of 1732 1364 D5298736DB894BC5D7E738968C2268C6D198D0B3A8C041EED08C992E8B83B5E2.exe cmd.exe PID 1364 wrote to memory of 1732 1364 D5298736DB894BC5D7E738968C2268C6D198D0B3A8C041EED08C992E8B83B5E2.exe cmd.exe PID 1364 wrote to memory of 1732 1364 D5298736DB894BC5D7E738968C2268C6D198D0B3A8C041EED08C992E8B83B5E2.exe cmd.exe PID 1732 wrote to memory of 1556 1732 cmd.exe choice.exe PID 1732 wrote to memory of 1556 1732 cmd.exe choice.exe PID 1732 wrote to memory of 1556 1732 cmd.exe choice.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\D5298736DB894BC5D7E738968C2268C6D198D0B3A8C041EED08C992E8B83B5E2.exe"C:\Users\Admin\AppData\Local\Temp\D5298736DB894BC5D7E738968C2268C6D198D0B3A8C041EED08C992E8B83B5E2.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\D5298736DB894BC5D7E738968C2268C6D198D0B3A8C041EED08C992E8B83B5E2.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:1556