Analysis
-
max time kernel
28s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
25-08-2022 21:08
Behavioral task
behavioral1
Sample
c3681da8cdbba19041d36bb0fbec162ddaae98a2ba9fe2b29d252e26f64a4ec8.exe
Resource
win7-20220812-en
windows7-x64
6 signatures
150 seconds
General
-
Target
c3681da8cdbba19041d36bb0fbec162ddaae98a2ba9fe2b29d252e26f64a4ec8.exe
-
Size
4.0MB
-
MD5
27167814efa448fec2bbcf35991f5eca
-
SHA1
85a1aae8faa4fbd0985fa357586b3c5bc4f4e3ab
-
SHA256
c3681da8cdbba19041d36bb0fbec162ddaae98a2ba9fe2b29d252e26f64a4ec8
-
SHA512
3832c84b76db5404fb67b5d2c90c59a012dff4631bf9fa276879d11f65ecd14ed0b1b00af6d01eb3854279a874aca5e2d763ff6d316505e67276adc92232a85b
-
SSDEEP
98304:z5B42wq73hy6pTzQDl5sY8SCekSFxfNfe2K/FpK:z5PR73hy6S7kIkSFx5e2KG
Malware Config
Signatures
-
YTStealer payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1732-54-0x0000000001100000-0x0000000001ED8000-memory.dmp family_ytstealer behavioral1/memory/1732-57-0x0000000001100000-0x0000000001ED8000-memory.dmp family_ytstealer -
Processes:
resource yara_rule behavioral1/memory/1732-54-0x0000000001100000-0x0000000001ED8000-memory.dmp upx behavioral1/memory/1732-57-0x0000000001100000-0x0000000001ED8000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
c3681da8cdbba19041d36bb0fbec162ddaae98a2ba9fe2b29d252e26f64a4ec8.exepid process 1732 c3681da8cdbba19041d36bb0fbec162ddaae98a2ba9fe2b29d252e26f64a4ec8.exe 1732 c3681da8cdbba19041d36bb0fbec162ddaae98a2ba9fe2b29d252e26f64a4ec8.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
c3681da8cdbba19041d36bb0fbec162ddaae98a2ba9fe2b29d252e26f64a4ec8.execmd.exedescription pid process target process PID 1732 wrote to memory of 592 1732 c3681da8cdbba19041d36bb0fbec162ddaae98a2ba9fe2b29d252e26f64a4ec8.exe cmd.exe PID 1732 wrote to memory of 592 1732 c3681da8cdbba19041d36bb0fbec162ddaae98a2ba9fe2b29d252e26f64a4ec8.exe cmd.exe PID 1732 wrote to memory of 592 1732 c3681da8cdbba19041d36bb0fbec162ddaae98a2ba9fe2b29d252e26f64a4ec8.exe cmd.exe PID 592 wrote to memory of 764 592 cmd.exe choice.exe PID 592 wrote to memory of 764 592 cmd.exe choice.exe PID 592 wrote to memory of 764 592 cmd.exe choice.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c3681da8cdbba19041d36bb0fbec162ddaae98a2ba9fe2b29d252e26f64a4ec8.exe"C:\Users\Admin\AppData\Local\Temp\c3681da8cdbba19041d36bb0fbec162ddaae98a2ba9fe2b29d252e26f64a4ec8.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\c3681da8cdbba19041d36bb0fbec162ddaae98a2ba9fe2b29d252e26f64a4ec8.exe2⤵
- Suspicious use of WriteProcessMemory
PID:592 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:764