Analysis
-
max time kernel
40s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
12-08-2022 06:58
Behavioral task
behavioral1
Sample
357CE30C8F64FF9FCBFE6AD248314448121B4170E73F40ED5BF73F93E327784F.exe
Resource
win7-20220715-en
windows7-x64
7 signatures
300 seconds
General
-
Target
357CE30C8F64FF9FCBFE6AD248314448121B4170E73F40ED5BF73F93E327784F.exe
-
Size
4.0MB
-
MD5
e2000fde77951994b583b3fdadce18fd
-
SHA1
8308cc2a7c8a9e038b8d7d4765c192d1986e2b5d
-
SHA256
357ce30c8f64ff9fcbfe6ad248314448121b4170e73f40ed5bf73f93e327784f
-
SHA512
b691edae0036a5cb4ba89da2600214a83293ad1adb57e55e124389acfe61d1cae1170eb24d54c4f9095c15e9418de323820eb4ac1af2096f62569e37906395f9
Malware Config
Signatures
-
YTStealer payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1708-54-0x0000000000FC0000-0x0000000001D99000-memory.dmp family_ytstealer behavioral1/memory/1708-57-0x0000000000FC0000-0x0000000001D99000-memory.dmp family_ytstealer -
Processes:
resource yara_rule behavioral1/memory/1708-54-0x0000000000FC0000-0x0000000001D99000-memory.dmp upx behavioral1/memory/1708-57-0x0000000000FC0000-0x0000000001D99000-memory.dmp upx -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 520 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
357CE30C8F64FF9FCBFE6AD248314448121B4170E73F40ED5BF73F93E327784F.exepid process 1708 357CE30C8F64FF9FCBFE6AD248314448121B4170E73F40ED5BF73F93E327784F.exe 1708 357CE30C8F64FF9FCBFE6AD248314448121B4170E73F40ED5BF73F93E327784F.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
357CE30C8F64FF9FCBFE6AD248314448121B4170E73F40ED5BF73F93E327784F.execmd.exedescription pid process target process PID 1708 wrote to memory of 520 1708 357CE30C8F64FF9FCBFE6AD248314448121B4170E73F40ED5BF73F93E327784F.exe cmd.exe PID 1708 wrote to memory of 520 1708 357CE30C8F64FF9FCBFE6AD248314448121B4170E73F40ED5BF73F93E327784F.exe cmd.exe PID 1708 wrote to memory of 520 1708 357CE30C8F64FF9FCBFE6AD248314448121B4170E73F40ED5BF73F93E327784F.exe cmd.exe PID 520 wrote to memory of 1696 520 cmd.exe choice.exe PID 520 wrote to memory of 1696 520 cmd.exe choice.exe PID 520 wrote to memory of 1696 520 cmd.exe choice.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\357CE30C8F64FF9FCBFE6AD248314448121B4170E73F40ED5BF73F93E327784F.exe"C:\Users\Admin\AppData\Local\Temp\357CE30C8F64FF9FCBFE6AD248314448121B4170E73F40ED5BF73F93E327784F.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\357CE30C8F64FF9FCBFE6AD248314448121B4170E73F40ED5BF73F93E327784F.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:1696