Analysis
-
max time kernel
17s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
12-08-2022 07:03
Behavioral task
behavioral1
Sample
6CA42861F2ABD2C81D9652A26349E9121F475D004935882E1BC555406C4EFAB4.exe
Resource
win7-20220718-en
windows7-x64
6 signatures
300 seconds
General
-
Target
6CA42861F2ABD2C81D9652A26349E9121F475D004935882E1BC555406C4EFAB4.exe
-
Size
4.0MB
-
MD5
4945783940926753d62da3141229556a
-
SHA1
3562e7321cf516d390af1e877d2a249d5e7d405f
-
SHA256
6ca42861f2abd2c81d9652a26349e9121f475d004935882e1bc555406c4efab4
-
SHA512
eae1595039b6aa1719cf8195adfe0f05cfa4dde1d8f6cd66e7757fbf3757a3c61b35d743e3d39d0672e869dc72d625b8c9b73b8905c1043eaf7f396d5757bb97
Malware Config
Signatures
-
YTStealer payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/364-54-0x0000000000930000-0x00000000016F8000-memory.dmp family_ytstealer behavioral1/memory/364-57-0x0000000000930000-0x00000000016F8000-memory.dmp family_ytstealer -
Processes:
resource yara_rule behavioral1/memory/364-54-0x0000000000930000-0x00000000016F8000-memory.dmp upx behavioral1/memory/364-57-0x0000000000930000-0x00000000016F8000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
6CA42861F2ABD2C81D9652A26349E9121F475D004935882E1BC555406C4EFAB4.exepid process 364 6CA42861F2ABD2C81D9652A26349E9121F475D004935882E1BC555406C4EFAB4.exe 364 6CA42861F2ABD2C81D9652A26349E9121F475D004935882E1BC555406C4EFAB4.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
6CA42861F2ABD2C81D9652A26349E9121F475D004935882E1BC555406C4EFAB4.execmd.exedescription pid process target process PID 364 wrote to memory of 2032 364 6CA42861F2ABD2C81D9652A26349E9121F475D004935882E1BC555406C4EFAB4.exe cmd.exe PID 364 wrote to memory of 2032 364 6CA42861F2ABD2C81D9652A26349E9121F475D004935882E1BC555406C4EFAB4.exe cmd.exe PID 364 wrote to memory of 2032 364 6CA42861F2ABD2C81D9652A26349E9121F475D004935882E1BC555406C4EFAB4.exe cmd.exe PID 2032 wrote to memory of 1564 2032 cmd.exe choice.exe PID 2032 wrote to memory of 1564 2032 cmd.exe choice.exe PID 2032 wrote to memory of 1564 2032 cmd.exe choice.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6CA42861F2ABD2C81D9652A26349E9121F475D004935882E1BC555406C4EFAB4.exe"C:\Users\Admin\AppData\Local\Temp\6CA42861F2ABD2C81D9652A26349E9121F475D004935882E1BC555406C4EFAB4.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:364 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\6CA42861F2ABD2C81D9652A26349E9121F475D004935882E1BC555406C4EFAB4.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:1564