Analysis
-
max time kernel
40s -
max time network
160s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
30-08-2022 01:37
Behavioral task
behavioral1
Sample
357ae268fb3ca9079a3cc844dbb07088d6c4eb8ef18de7c5e974d8bead1cb996.exe
Resource
win7-20220812-en
windows7-x64
7 signatures
300 seconds
General
-
Target
357ae268fb3ca9079a3cc844dbb07088d6c4eb8ef18de7c5e974d8bead1cb996.exe
-
Size
4.0MB
-
MD5
e3bd38237b5a50a15c2163135aeb4311
-
SHA1
6e206e1a3dda12e7c10806b06f38e13ed2a10aa3
-
SHA256
357ae268fb3ca9079a3cc844dbb07088d6c4eb8ef18de7c5e974d8bead1cb996
-
SHA512
549bd4aa1ec91a9e8f808c47c33c94a8539bb3e1274d1fd6b19534d6fe31a685af86b5273d17792e492cc8c8fa4c740bd1afb15558dda781c4e0d1323e8fbb79
-
SSDEEP
98304:Ngt1GfVHUbmuQacY/Ex6hZqxY6X/gQZ5DEmU:mt0N0bm4cu466nX/2m
Malware Config
Signatures
-
YTStealer payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/2968-118-0x0000000000950000-0x0000000001729000-memory.dmp family_ytstealer behavioral2/memory/2968-121-0x0000000000950000-0x0000000001729000-memory.dmp family_ytstealer -
Processes:
resource yara_rule behavioral2/memory/2968-118-0x0000000000950000-0x0000000001729000-memory.dmp upx behavioral2/memory/2968-121-0x0000000000950000-0x0000000001729000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
357ae268fb3ca9079a3cc844dbb07088d6c4eb8ef18de7c5e974d8bead1cb996.exepid process 2968 357ae268fb3ca9079a3cc844dbb07088d6c4eb8ef18de7c5e974d8bead1cb996.exe 2968 357ae268fb3ca9079a3cc844dbb07088d6c4eb8ef18de7c5e974d8bead1cb996.exe 2968 357ae268fb3ca9079a3cc844dbb07088d6c4eb8ef18de7c5e974d8bead1cb996.exe 2968 357ae268fb3ca9079a3cc844dbb07088d6c4eb8ef18de7c5e974d8bead1cb996.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
357ae268fb3ca9079a3cc844dbb07088d6c4eb8ef18de7c5e974d8bead1cb996.execmd.exedescription pid process target process PID 2968 wrote to memory of 1816 2968 357ae268fb3ca9079a3cc844dbb07088d6c4eb8ef18de7c5e974d8bead1cb996.exe cmd.exe PID 2968 wrote to memory of 1816 2968 357ae268fb3ca9079a3cc844dbb07088d6c4eb8ef18de7c5e974d8bead1cb996.exe cmd.exe PID 1816 wrote to memory of 5000 1816 cmd.exe choice.exe PID 1816 wrote to memory of 5000 1816 cmd.exe choice.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\357ae268fb3ca9079a3cc844dbb07088d6c4eb8ef18de7c5e974d8bead1cb996.exe"C:\Users\Admin\AppData\Local\Temp\357ae268fb3ca9079a3cc844dbb07088d6c4eb8ef18de7c5e974d8bead1cb996.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\357ae268fb3ca9079a3cc844dbb07088d6c4eb8ef18de7c5e974d8bead1cb996.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:5000