Analysis
-
max time kernel
27s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
12/08/2022, 07:03
Behavioral task
behavioral1
Sample
6C21057B47F4B84990AAE1A7039621FC3C0BDEBDBE3EA2685B6D1F15134CB068.exe
Resource
win7-20220718-en
6 signatures
300 seconds
General
-
Target
6C21057B47F4B84990AAE1A7039621FC3C0BDEBDBE3EA2685B6D1F15134CB068.exe
-
Size
4.0MB
-
MD5
5b07b328013bb904ffbd6aff6032ec74
-
SHA1
347bd61eb0fd12bee4990e234b848a4a936a72b8
-
SHA256
6c21057b47f4b84990aae1a7039621fc3c0bdebdbe3ea2685b6d1f15134cb068
-
SHA512
55e15259da0a06d311821a7cc88079bdc6ac23567e42c4348509846faa56e29b812845ddac7124b29db45409856d7f132a8ed0ec7b2cccf1f4f846c1e37dfe23
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral1/memory/1092-54-0x0000000000110000-0x0000000000ED9000-memory.dmp family_ytstealer behavioral1/memory/1092-57-0x0000000000110000-0x0000000000ED9000-memory.dmp family_ytstealer -
resource yara_rule behavioral1/memory/1092-54-0x0000000000110000-0x0000000000ED9000-memory.dmp upx behavioral1/memory/1092-57-0x0000000000110000-0x0000000000ED9000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1092 6C21057B47F4B84990AAE1A7039621FC3C0BDEBDBE3EA2685B6D1F15134CB068.exe 1092 6C21057B47F4B84990AAE1A7039621FC3C0BDEBDBE3EA2685B6D1F15134CB068.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1092 wrote to memory of 1504 1092 6C21057B47F4B84990AAE1A7039621FC3C0BDEBDBE3EA2685B6D1F15134CB068.exe 29 PID 1092 wrote to memory of 1504 1092 6C21057B47F4B84990AAE1A7039621FC3C0BDEBDBE3EA2685B6D1F15134CB068.exe 29 PID 1092 wrote to memory of 1504 1092 6C21057B47F4B84990AAE1A7039621FC3C0BDEBDBE3EA2685B6D1F15134CB068.exe 29 PID 1504 wrote to memory of 1924 1504 cmd.exe 31 PID 1504 wrote to memory of 1924 1504 cmd.exe 31 PID 1504 wrote to memory of 1924 1504 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\6C21057B47F4B84990AAE1A7039621FC3C0BDEBDBE3EA2685B6D1F15134CB068.exe"C:\Users\Admin\AppData\Local\Temp\6C21057B47F4B84990AAE1A7039621FC3C0BDEBDBE3EA2685B6D1F15134CB068.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\6C21057B47F4B84990AAE1A7039621FC3C0BDEBDBE3EA2685B6D1F15134CB068.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:1924
-
-