Analysis
-
max time kernel
43s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/08/2022, 01:38
Behavioral task
behavioral1
Sample
37c78bff561491a320de992ff41277fd830e100c5ae3e7e83427f854b13c6355.exe
Resource
win7-20220812-en
7 signatures
300 seconds
General
-
Target
37c78bff561491a320de992ff41277fd830e100c5ae3e7e83427f854b13c6355.exe
-
Size
4.0MB
-
MD5
2701033d21e002170ba74701bc43e318
-
SHA1
61b2e6a1e5cbe0ef2f7e29234af2e703e0698aeb
-
SHA256
37c78bff561491a320de992ff41277fd830e100c5ae3e7e83427f854b13c6355
-
SHA512
fcf656986080282380a4fa6b8f5931bbb594b7ad18574d2a96224f5fd94318bd7cf5a07b4acfadbd8c2400a4b817b47a390f90f2eb905d946f486b426eb1fcb4
-
SSDEEP
98304:qzFhhI+mgePySZ2oVAtIoz7T9St0d51nOwX13NMTV3kNiy1m:qZhhZ1eq4Atwt0dGwX138VkNiu
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral1/memory/1088-54-0x0000000001140000-0x0000000001F09000-memory.dmp family_ytstealer behavioral1/memory/1088-57-0x0000000001140000-0x0000000001F09000-memory.dmp family_ytstealer -
resource yara_rule behavioral1/memory/1088-54-0x0000000001140000-0x0000000001F09000-memory.dmp upx behavioral1/memory/1088-57-0x0000000001140000-0x0000000001F09000-memory.dmp upx -
Deletes itself 1 IoCs
pid Process 1764 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1088 37c78bff561491a320de992ff41277fd830e100c5ae3e7e83427f854b13c6355.exe 1088 37c78bff561491a320de992ff41277fd830e100c5ae3e7e83427f854b13c6355.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1088 wrote to memory of 1764 1088 37c78bff561491a320de992ff41277fd830e100c5ae3e7e83427f854b13c6355.exe 29 PID 1088 wrote to memory of 1764 1088 37c78bff561491a320de992ff41277fd830e100c5ae3e7e83427f854b13c6355.exe 29 PID 1088 wrote to memory of 1764 1088 37c78bff561491a320de992ff41277fd830e100c5ae3e7e83427f854b13c6355.exe 29 PID 1764 wrote to memory of 1332 1764 cmd.exe 31 PID 1764 wrote to memory of 1332 1764 cmd.exe 31 PID 1764 wrote to memory of 1332 1764 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\37c78bff561491a320de992ff41277fd830e100c5ae3e7e83427f854b13c6355.exe"C:\Users\Admin\AppData\Local\Temp\37c78bff561491a320de992ff41277fd830e100c5ae3e7e83427f854b13c6355.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\37c78bff561491a320de992ff41277fd830e100c5ae3e7e83427f854b13c6355.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:1332
-
-