Analysis
-
max time kernel
42s -
max time network
55s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
12-08-2022 06:55
Behavioral task
behavioral1
Sample
18FB5108DC25CAAC2C5CCCFF5583A297D3EFF58EC86A28B6FD6B3E5C542C5F78.exe
Resource
win7-20220718-en
windows7-x64
6 signatures
300 seconds
General
-
Target
18FB5108DC25CAAC2C5CCCFF5583A297D3EFF58EC86A28B6FD6B3E5C542C5F78.exe
-
Size
4.0MB
-
MD5
ed6dddc2516c34092d53008a482784dc
-
SHA1
8569ebfeba7c442af07555325dffa09cb164d139
-
SHA256
18fb5108dc25caac2c5cccff5583a297d3eff58ec86a28b6fd6b3e5c542c5f78
-
SHA512
93b83727d8311e52087cc30156ee8cc958474d47bd86d2f52424b0bfe34adc483d4980a29aef684ec69292024f57a444bb02b308a1cb254ae5bc48b809012e79
Malware Config
Signatures
-
YTStealer payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1904-54-0x0000000001230000-0x0000000001FF9000-memory.dmp family_ytstealer behavioral1/memory/1904-57-0x0000000001230000-0x0000000001FF9000-memory.dmp family_ytstealer -
Processes:
resource yara_rule behavioral1/memory/1904-54-0x0000000001230000-0x0000000001FF9000-memory.dmp upx behavioral1/memory/1904-57-0x0000000001230000-0x0000000001FF9000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
18FB5108DC25CAAC2C5CCCFF5583A297D3EFF58EC86A28B6FD6B3E5C542C5F78.exepid process 1904 18FB5108DC25CAAC2C5CCCFF5583A297D3EFF58EC86A28B6FD6B3E5C542C5F78.exe 1904 18FB5108DC25CAAC2C5CCCFF5583A297D3EFF58EC86A28B6FD6B3E5C542C5F78.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
18FB5108DC25CAAC2C5CCCFF5583A297D3EFF58EC86A28B6FD6B3E5C542C5F78.execmd.exedescription pid process target process PID 1904 wrote to memory of 1720 1904 18FB5108DC25CAAC2C5CCCFF5583A297D3EFF58EC86A28B6FD6B3E5C542C5F78.exe cmd.exe PID 1904 wrote to memory of 1720 1904 18FB5108DC25CAAC2C5CCCFF5583A297D3EFF58EC86A28B6FD6B3E5C542C5F78.exe cmd.exe PID 1904 wrote to memory of 1720 1904 18FB5108DC25CAAC2C5CCCFF5583A297D3EFF58EC86A28B6FD6B3E5C542C5F78.exe cmd.exe PID 1720 wrote to memory of 1744 1720 cmd.exe choice.exe PID 1720 wrote to memory of 1744 1720 cmd.exe choice.exe PID 1720 wrote to memory of 1744 1720 cmd.exe choice.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\18FB5108DC25CAAC2C5CCCFF5583A297D3EFF58EC86A28B6FD6B3E5C542C5F78.exe"C:\Users\Admin\AppData\Local\Temp\18FB5108DC25CAAC2C5CCCFF5583A297D3EFF58EC86A28B6FD6B3E5C542C5F78.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\18FB5108DC25CAAC2C5CCCFF5583A297D3EFF58EC86A28B6FD6B3E5C542C5F78.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:1744