Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
12-08-2022 06:56
Behavioral task
behavioral1
Sample
2844E85A36A29A037EAF1273133B7A83F65C6DB637443568703F0052DC7CB1C6.exe
Resource
win7-20220718-en
windows7-x64
6 signatures
300 seconds
General
-
Target
2844E85A36A29A037EAF1273133B7A83F65C6DB637443568703F0052DC7CB1C6.exe
-
Size
4.0MB
-
MD5
ea914f2309b04f7a061e41cccaa95b20
-
SHA1
d251f0ed55f5bcf928d5290e80d2551bc267a47c
-
SHA256
2844e85a36a29a037eaf1273133b7a83f65c6db637443568703f0052dc7cb1c6
-
SHA512
72129505f858d29bfe3751a1023a6618e2c22665d190dec7c3f89d81a7aa829a2837c32dd5959f92dbe2349d761521b73be2ec1480a14393b69d0f421582f03e
Malware Config
Signatures
-
YTStealer payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1044-57-0x00000000011A0000-0x0000000001F79000-memory.dmp family_ytstealer -
Processes:
resource yara_rule behavioral1/memory/1044-54-0x00000000011A0000-0x0000000001F79000-memory.dmp upx behavioral1/memory/1044-57-0x00000000011A0000-0x0000000001F79000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
2844E85A36A29A037EAF1273133B7A83F65C6DB637443568703F0052DC7CB1C6.exepid process 1044 2844E85A36A29A037EAF1273133B7A83F65C6DB637443568703F0052DC7CB1C6.exe 1044 2844E85A36A29A037EAF1273133B7A83F65C6DB637443568703F0052DC7CB1C6.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
2844E85A36A29A037EAF1273133B7A83F65C6DB637443568703F0052DC7CB1C6.execmd.exedescription pid process target process PID 1044 wrote to memory of 376 1044 2844E85A36A29A037EAF1273133B7A83F65C6DB637443568703F0052DC7CB1C6.exe cmd.exe PID 1044 wrote to memory of 376 1044 2844E85A36A29A037EAF1273133B7A83F65C6DB637443568703F0052DC7CB1C6.exe cmd.exe PID 1044 wrote to memory of 376 1044 2844E85A36A29A037EAF1273133B7A83F65C6DB637443568703F0052DC7CB1C6.exe cmd.exe PID 376 wrote to memory of 1156 376 cmd.exe choice.exe PID 376 wrote to memory of 1156 376 cmd.exe choice.exe PID 376 wrote to memory of 1156 376 cmd.exe choice.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2844E85A36A29A037EAF1273133B7A83F65C6DB637443568703F0052DC7CB1C6.exe"C:\Users\Admin\AppData\Local\Temp\2844E85A36A29A037EAF1273133B7A83F65C6DB637443568703F0052DC7CB1C6.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\2844E85A36A29A037EAF1273133B7A83F65C6DB637443568703F0052DC7CB1C6.exe2⤵
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:1156