Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
12-08-2022 06:54
Behavioral task
behavioral1
Sample
119E5BF72D68C4881A5DFB0A40C85C32ADB85CC7F09071C92FDF03B736D66165.exe
Resource
win7-20220718-en
windows7-x64
6 signatures
300 seconds
General
-
Target
119E5BF72D68C4881A5DFB0A40C85C32ADB85CC7F09071C92FDF03B736D66165.exe
-
Size
4.0MB
-
MD5
2c90b9bd2f5103e4df4d5232ddf4fd33
-
SHA1
3eb10051b0159a5a0d44432e2fe2abf33eb1c931
-
SHA256
119e5bf72d68c4881a5dfb0a40c85c32adb85cc7f09071c92fdf03b736d66165
-
SHA512
dad76f2c6b57840a34cb55f20eec964114b5718f20deeeab0d0f7a70f7a413b46d9ead6bbdbcb92f9751e69ff858897ea98d822ec972bcd1a7adaaed5a12e002
Malware Config
Signatures
-
YTStealer payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1952-54-0x0000000001350000-0x0000000002119000-memory.dmp family_ytstealer behavioral1/memory/1952-57-0x0000000001350000-0x0000000002119000-memory.dmp family_ytstealer -
Processes:
resource yara_rule behavioral1/memory/1952-54-0x0000000001350000-0x0000000002119000-memory.dmp upx behavioral1/memory/1952-57-0x0000000001350000-0x0000000002119000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
119E5BF72D68C4881A5DFB0A40C85C32ADB85CC7F09071C92FDF03B736D66165.exepid process 1952 119E5BF72D68C4881A5DFB0A40C85C32ADB85CC7F09071C92FDF03B736D66165.exe 1952 119E5BF72D68C4881A5DFB0A40C85C32ADB85CC7F09071C92FDF03B736D66165.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
119E5BF72D68C4881A5DFB0A40C85C32ADB85CC7F09071C92FDF03B736D66165.execmd.exedescription pid process target process PID 1952 wrote to memory of 884 1952 119E5BF72D68C4881A5DFB0A40C85C32ADB85CC7F09071C92FDF03B736D66165.exe cmd.exe PID 1952 wrote to memory of 884 1952 119E5BF72D68C4881A5DFB0A40C85C32ADB85CC7F09071C92FDF03B736D66165.exe cmd.exe PID 1952 wrote to memory of 884 1952 119E5BF72D68C4881A5DFB0A40C85C32ADB85CC7F09071C92FDF03B736D66165.exe cmd.exe PID 884 wrote to memory of 524 884 cmd.exe choice.exe PID 884 wrote to memory of 524 884 cmd.exe choice.exe PID 884 wrote to memory of 524 884 cmd.exe choice.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\119E5BF72D68C4881A5DFB0A40C85C32ADB85CC7F09071C92FDF03B736D66165.exe"C:\Users\Admin\AppData\Local\Temp\119E5BF72D68C4881A5DFB0A40C85C32ADB85CC7F09071C92FDF03B736D66165.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\119E5BF72D68C4881A5DFB0A40C85C32ADB85CC7F09071C92FDF03B736D66165.exe2⤵
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:524