Analysis
-
max time kernel
40s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
12-08-2022 07:10
Behavioral task
behavioral1
Sample
C85A77AC7D13BE538B715BA063B3EA8801829DB5A9956087B917079DBA6E5E12.exe
Resource
win7-20220718-en
windows7-x64
6 signatures
300 seconds
General
-
Target
C85A77AC7D13BE538B715BA063B3EA8801829DB5A9956087B917079DBA6E5E12.exe
-
Size
4.0MB
-
MD5
d39d2bd0ea4944a7ed19c0079f4ef121
-
SHA1
0360e4d8cd0f5af4a59dc120fffc9d2a9a6baf1e
-
SHA256
c85a77ac7d13be538b715ba063b3ea8801829db5a9956087b917079dba6e5e12
-
SHA512
a55746eee166053b603ea3a0aa95de2ff67217430319965ffcde44bf3bab4f96674ad81e47f801c00bc16e9d34f0569fca2ebba8580b2f294574cf7b28b256f2
Malware Config
Signatures
-
YTStealer payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1176-54-0x0000000000FC0000-0x0000000001D98000-memory.dmp family_ytstealer behavioral1/memory/1176-57-0x0000000000FC0000-0x0000000001D98000-memory.dmp family_ytstealer -
Processes:
resource yara_rule behavioral1/memory/1176-54-0x0000000000FC0000-0x0000000001D98000-memory.dmp upx behavioral1/memory/1176-57-0x0000000000FC0000-0x0000000001D98000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
C85A77AC7D13BE538B715BA063B3EA8801829DB5A9956087B917079DBA6E5E12.exepid process 1176 C85A77AC7D13BE538B715BA063B3EA8801829DB5A9956087B917079DBA6E5E12.exe 1176 C85A77AC7D13BE538B715BA063B3EA8801829DB5A9956087B917079DBA6E5E12.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
C85A77AC7D13BE538B715BA063B3EA8801829DB5A9956087B917079DBA6E5E12.execmd.exedescription pid process target process PID 1176 wrote to memory of 2024 1176 C85A77AC7D13BE538B715BA063B3EA8801829DB5A9956087B917079DBA6E5E12.exe cmd.exe PID 1176 wrote to memory of 2024 1176 C85A77AC7D13BE538B715BA063B3EA8801829DB5A9956087B917079DBA6E5E12.exe cmd.exe PID 1176 wrote to memory of 2024 1176 C85A77AC7D13BE538B715BA063B3EA8801829DB5A9956087B917079DBA6E5E12.exe cmd.exe PID 2024 wrote to memory of 1496 2024 cmd.exe choice.exe PID 2024 wrote to memory of 1496 2024 cmd.exe choice.exe PID 2024 wrote to memory of 1496 2024 cmd.exe choice.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\C85A77AC7D13BE538B715BA063B3EA8801829DB5A9956087B917079DBA6E5E12.exe"C:\Users\Admin\AppData\Local\Temp\C85A77AC7D13BE538B715BA063B3EA8801829DB5A9956087B917079DBA6E5E12.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\C85A77AC7D13BE538B715BA063B3EA8801829DB5A9956087B917079DBA6E5E12.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:1496