Analysis
-
max time kernel
41s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
12/08/2022, 06:57
Behavioral task
behavioral1
Sample
330505CF36D2BF010FEB21E58EB6C15D2D92FFBEFD50127BF1EE5C6A3D6C6A78.exe
Resource
win7-20220718-en
6 signatures
300 seconds
General
-
Target
330505CF36D2BF010FEB21E58EB6C15D2D92FFBEFD50127BF1EE5C6A3D6C6A78.exe
-
Size
4.0MB
-
MD5
684465275cd9ee7aa9236e95520f4b53
-
SHA1
59e456d6b8877b11713b037077beb431be4ad1fc
-
SHA256
330505cf36d2bf010feb21e58eb6c15d2d92ffbefd50127bf1ee5c6a3d6c6a78
-
SHA512
81b2fcacded28f232ebde68aa8898cb6a64722c77683a70dd0de1899de8b819ddb0e9bcc9a3d62c8fe68bd93513bd5508330c31ccdaa6475e99e524cddd741f5
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral1/memory/1976-54-0x0000000000300000-0x00000000010C9000-memory.dmp family_ytstealer behavioral1/memory/1976-57-0x0000000000300000-0x00000000010C9000-memory.dmp family_ytstealer -
resource yara_rule behavioral1/memory/1976-54-0x0000000000300000-0x00000000010C9000-memory.dmp upx behavioral1/memory/1976-57-0x0000000000300000-0x00000000010C9000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1976 330505CF36D2BF010FEB21E58EB6C15D2D92FFBEFD50127BF1EE5C6A3D6C6A78.exe 1976 330505CF36D2BF010FEB21E58EB6C15D2D92FFBEFD50127BF1EE5C6A3D6C6A78.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1976 wrote to memory of 1444 1976 330505CF36D2BF010FEB21E58EB6C15D2D92FFBEFD50127BF1EE5C6A3D6C6A78.exe 28 PID 1976 wrote to memory of 1444 1976 330505CF36D2BF010FEB21E58EB6C15D2D92FFBEFD50127BF1EE5C6A3D6C6A78.exe 28 PID 1976 wrote to memory of 1444 1976 330505CF36D2BF010FEB21E58EB6C15D2D92FFBEFD50127BF1EE5C6A3D6C6A78.exe 28 PID 1444 wrote to memory of 592 1444 cmd.exe 30 PID 1444 wrote to memory of 592 1444 cmd.exe 30 PID 1444 wrote to memory of 592 1444 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\330505CF36D2BF010FEB21E58EB6C15D2D92FFBEFD50127BF1EE5C6A3D6C6A78.exe"C:\Users\Admin\AppData\Local\Temp\330505CF36D2BF010FEB21E58EB6C15D2D92FFBEFD50127BF1EE5C6A3D6C6A78.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\330505CF36D2BF010FEB21E58EB6C15D2D92FFBEFD50127BF1EE5C6A3D6C6A78.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:592
-
-