Analysis
-
max time kernel
8s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
12-08-2022 07:14
Behavioral task
behavioral1
Sample
D66C835FFCE7413ED28D1252C814787083AAB6FCDC20DF38120B5DA13991F9C3.exe
Resource
win7-20220718-en
windows7-x64
6 signatures
300 seconds
General
-
Target
D66C835FFCE7413ED28D1252C814787083AAB6FCDC20DF38120B5DA13991F9C3.exe
-
Size
4.0MB
-
MD5
808d028a359d6ff9668e4881fdb28042
-
SHA1
1fec4d3e24d6e54d24b0d716afa7e6435cd92f37
-
SHA256
d66c835ffce7413ed28d1252c814787083aab6fcdc20df38120b5da13991f9c3
-
SHA512
b829c4ab50c5fb0b763b7f8059f062ceec19b78d2f72999cc3876fd038b1249df256a243e661070a5cc047267b5df711d03dc8f959ba1fa56fe6435d86a031e3
Malware Config
Signatures
-
YTStealer payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/988-54-0x00000000000B0000-0x0000000000E79000-memory.dmp family_ytstealer behavioral1/memory/988-57-0x00000000000B0000-0x0000000000E79000-memory.dmp family_ytstealer -
Processes:
resource yara_rule behavioral1/memory/988-54-0x00000000000B0000-0x0000000000E79000-memory.dmp upx behavioral1/memory/988-57-0x00000000000B0000-0x0000000000E79000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
D66C835FFCE7413ED28D1252C814787083AAB6FCDC20DF38120B5DA13991F9C3.exepid process 988 D66C835FFCE7413ED28D1252C814787083AAB6FCDC20DF38120B5DA13991F9C3.exe 988 D66C835FFCE7413ED28D1252C814787083AAB6FCDC20DF38120B5DA13991F9C3.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
D66C835FFCE7413ED28D1252C814787083AAB6FCDC20DF38120B5DA13991F9C3.execmd.exedescription pid process target process PID 988 wrote to memory of 1880 988 D66C835FFCE7413ED28D1252C814787083AAB6FCDC20DF38120B5DA13991F9C3.exe cmd.exe PID 988 wrote to memory of 1880 988 D66C835FFCE7413ED28D1252C814787083AAB6FCDC20DF38120B5DA13991F9C3.exe cmd.exe PID 988 wrote to memory of 1880 988 D66C835FFCE7413ED28D1252C814787083AAB6FCDC20DF38120B5DA13991F9C3.exe cmd.exe PID 1880 wrote to memory of 1212 1880 cmd.exe choice.exe PID 1880 wrote to memory of 1212 1880 cmd.exe choice.exe PID 1880 wrote to memory of 1212 1880 cmd.exe choice.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\D66C835FFCE7413ED28D1252C814787083AAB6FCDC20DF38120B5DA13991F9C3.exe"C:\Users\Admin\AppData\Local\Temp\D66C835FFCE7413ED28D1252C814787083AAB6FCDC20DF38120B5DA13991F9C3.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\D66C835FFCE7413ED28D1252C814787083AAB6FCDC20DF38120B5DA13991F9C3.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:1212