Analysis
-
max time kernel
44s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
12-08-2022 07:01
Behavioral task
behavioral1
Sample
5372839745D599CAF94C606AEB7E806F37CD009CE207481E6ADC19F34A96C249.exe
Resource
win7-20220715-en
windows7-x64
6 signatures
300 seconds
General
-
Target
5372839745D599CAF94C606AEB7E806F37CD009CE207481E6ADC19F34A96C249.exe
-
Size
4.0MB
-
MD5
e41c5f31d33c7419b7cf7ac0292efcf5
-
SHA1
d27d577fa8b52100c8a96291d34b2976fb55c7b4
-
SHA256
5372839745d599caf94c606aeb7e806f37cd009ce207481e6adc19f34a96c249
-
SHA512
f6c9558b93055aa9dfec7f5ca3cc8ee1b465fa3b81abbbd3fac7a9d1cfa1a4eb896af46cdce7c6269c9ecae45c6da6085203beb990e987ea22742a6fb91914af
Malware Config
Signatures
-
YTStealer payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1864-54-0x0000000000DA0000-0x0000000001B68000-memory.dmp family_ytstealer behavioral1/memory/1864-57-0x0000000000DA0000-0x0000000001B68000-memory.dmp family_ytstealer -
Processes:
resource yara_rule behavioral1/memory/1864-54-0x0000000000DA0000-0x0000000001B68000-memory.dmp upx behavioral1/memory/1864-57-0x0000000000DA0000-0x0000000001B68000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
5372839745D599CAF94C606AEB7E806F37CD009CE207481E6ADC19F34A96C249.exepid process 1864 5372839745D599CAF94C606AEB7E806F37CD009CE207481E6ADC19F34A96C249.exe 1864 5372839745D599CAF94C606AEB7E806F37CD009CE207481E6ADC19F34A96C249.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
5372839745D599CAF94C606AEB7E806F37CD009CE207481E6ADC19F34A96C249.execmd.exedescription pid process target process PID 1864 wrote to memory of 1848 1864 5372839745D599CAF94C606AEB7E806F37CD009CE207481E6ADC19F34A96C249.exe cmd.exe PID 1864 wrote to memory of 1848 1864 5372839745D599CAF94C606AEB7E806F37CD009CE207481E6ADC19F34A96C249.exe cmd.exe PID 1864 wrote to memory of 1848 1864 5372839745D599CAF94C606AEB7E806F37CD009CE207481E6ADC19F34A96C249.exe cmd.exe PID 1848 wrote to memory of 1692 1848 cmd.exe choice.exe PID 1848 wrote to memory of 1692 1848 cmd.exe choice.exe PID 1848 wrote to memory of 1692 1848 cmd.exe choice.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5372839745D599CAF94C606AEB7E806F37CD009CE207481E6ADC19F34A96C249.exe"C:\Users\Admin\AppData\Local\Temp\5372839745D599CAF94C606AEB7E806F37CD009CE207481E6ADC19F34A96C249.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\5372839745D599CAF94C606AEB7E806F37CD009CE207481E6ADC19F34A96C249.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:1692