Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
12-08-2022 07:07
Behavioral task
behavioral1
Sample
8FAD375A8A496CE65F85DFD94EF6410123C9FA22A3C0B35D9395B8BD79C29033.exe
Resource
win7-20220718-en
windows7-x64
6 signatures
300 seconds
General
-
Target
8FAD375A8A496CE65F85DFD94EF6410123C9FA22A3C0B35D9395B8BD79C29033.exe
-
Size
4.0MB
-
MD5
6fe551628b87a45b85dd17d99078b0f2
-
SHA1
4b4deab383667dabfd2238ca0e7ceacfec7c881f
-
SHA256
8fad375a8a496ce65f85dfd94ef6410123c9fa22a3c0b35d9395b8bd79c29033
-
SHA512
d8f13d1f9f93f10b9709c33e50e997c908b9c007c9e6b91c5d26dd22717321f3f17683f80407a1512ab91f4ac186fb27ded635c284226b038c50a06d551c9aeb
Malware Config
Signatures
-
YTStealer payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1680-54-0x0000000000090000-0x0000000000E59000-memory.dmp family_ytstealer behavioral1/memory/1680-57-0x0000000000090000-0x0000000000E59000-memory.dmp family_ytstealer -
Processes:
resource yara_rule behavioral1/memory/1680-54-0x0000000000090000-0x0000000000E59000-memory.dmp upx behavioral1/memory/1680-57-0x0000000000090000-0x0000000000E59000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
8FAD375A8A496CE65F85DFD94EF6410123C9FA22A3C0B35D9395B8BD79C29033.exepid process 1680 8FAD375A8A496CE65F85DFD94EF6410123C9FA22A3C0B35D9395B8BD79C29033.exe 1680 8FAD375A8A496CE65F85DFD94EF6410123C9FA22A3C0B35D9395B8BD79C29033.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
8FAD375A8A496CE65F85DFD94EF6410123C9FA22A3C0B35D9395B8BD79C29033.execmd.exedescription pid process target process PID 1680 wrote to memory of 696 1680 8FAD375A8A496CE65F85DFD94EF6410123C9FA22A3C0B35D9395B8BD79C29033.exe cmd.exe PID 1680 wrote to memory of 696 1680 8FAD375A8A496CE65F85DFD94EF6410123C9FA22A3C0B35D9395B8BD79C29033.exe cmd.exe PID 1680 wrote to memory of 696 1680 8FAD375A8A496CE65F85DFD94EF6410123C9FA22A3C0B35D9395B8BD79C29033.exe cmd.exe PID 696 wrote to memory of 268 696 cmd.exe choice.exe PID 696 wrote to memory of 268 696 cmd.exe choice.exe PID 696 wrote to memory of 268 696 cmd.exe choice.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8FAD375A8A496CE65F85DFD94EF6410123C9FA22A3C0B35D9395B8BD79C29033.exe"C:\Users\Admin\AppData\Local\Temp\8FAD375A8A496CE65F85DFD94EF6410123C9FA22A3C0B35D9395B8BD79C29033.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\8FAD375A8A496CE65F85DFD94EF6410123C9FA22A3C0B35D9395B8BD79C29033.exe2⤵
- Suspicious use of WriteProcessMemory
PID:696 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:268