Analysis
-
max time kernel
306s -
max time network
312s -
platform
windows10-1703_x64 -
resource
win10-20220718-en -
resource tags
arch:x64arch:x86image:win10-20220718-enlocale:en-usos:windows10-1703-x64system -
submitted
12/08/2022, 06:57
Behavioral task
behavioral1
Sample
357AE268FB3CA9079A3CC844DBB07088D6C4EB8EF18DE7C5E974D8BEAD1CB996.exe
Resource
win7-20220718-en
6 signatures
300 seconds
General
-
Target
357AE268FB3CA9079A3CC844DBB07088D6C4EB8EF18DE7C5E974D8BEAD1CB996.exe
-
Size
4.0MB
-
MD5
e3bd38237b5a50a15c2163135aeb4311
-
SHA1
6e206e1a3dda12e7c10806b06f38e13ed2a10aa3
-
SHA256
357ae268fb3ca9079a3cc844dbb07088d6c4eb8ef18de7c5e974d8bead1cb996
-
SHA512
549bd4aa1ec91a9e8f808c47c33c94a8539bb3e1274d1fd6b19534d6fe31a685af86b5273d17792e492cc8c8fa4c740bd1afb15558dda781c4e0d1323e8fbb79
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral2/memory/4008-117-0x0000000000080000-0x0000000000E59000-memory.dmp family_ytstealer behavioral2/memory/4008-120-0x0000000000080000-0x0000000000E59000-memory.dmp family_ytstealer -
resource yara_rule behavioral2/memory/4008-117-0x0000000000080000-0x0000000000E59000-memory.dmp upx behavioral2/memory/4008-120-0x0000000000080000-0x0000000000E59000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4008 357AE268FB3CA9079A3CC844DBB07088D6C4EB8EF18DE7C5E974D8BEAD1CB996.exe 4008 357AE268FB3CA9079A3CC844DBB07088D6C4EB8EF18DE7C5E974D8BEAD1CB996.exe 4008 357AE268FB3CA9079A3CC844DBB07088D6C4EB8EF18DE7C5E974D8BEAD1CB996.exe 4008 357AE268FB3CA9079A3CC844DBB07088D6C4EB8EF18DE7C5E974D8BEAD1CB996.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4008 wrote to memory of 4056 4008 357AE268FB3CA9079A3CC844DBB07088D6C4EB8EF18DE7C5E974D8BEAD1CB996.exe 68 PID 4008 wrote to memory of 4056 4008 357AE268FB3CA9079A3CC844DBB07088D6C4EB8EF18DE7C5E974D8BEAD1CB996.exe 68 PID 4056 wrote to memory of 2256 4056 cmd.exe 70 PID 4056 wrote to memory of 2256 4056 cmd.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\357AE268FB3CA9079A3CC844DBB07088D6C4EB8EF18DE7C5E974D8BEAD1CB996.exe"C:\Users\Admin\AppData\Local\Temp\357AE268FB3CA9079A3CC844DBB07088D6C4EB8EF18DE7C5E974D8BEAD1CB996.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\357AE268FB3CA9079A3CC844DBB07088D6C4EB8EF18DE7C5E974D8BEAD1CB996.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:2256
-
-