Analysis
-
max time kernel
46s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/08/2022, 01:38
Behavioral task
behavioral1
Sample
38db8f1fab6ff91d80655882acf4ecd85f5c6d525b033a683ab7999d2bb184fe.exe
Resource
win7-20220812-en
6 signatures
300 seconds
General
-
Target
38db8f1fab6ff91d80655882acf4ecd85f5c6d525b033a683ab7999d2bb184fe.exe
-
Size
4.0MB
-
MD5
b61675436e4f0836e5b6472213dca491
-
SHA1
17a0a030b9f720c6763ece3e3560e004ab21b2fc
-
SHA256
38db8f1fab6ff91d80655882acf4ecd85f5c6d525b033a683ab7999d2bb184fe
-
SHA512
be41fdfe464bf54ba8fadad6f714be0bbe9de406979a9a902ff05b2cb0ebf74a5eb9944bc04a5a8996db4850c5a14d0689c4f2744cd389f84edc9336372ef7ae
-
SSDEEP
98304:Q14Y8uQZcC+0H880EywqLDoOP7qt8ItkvWxnlqkbrXtUGuZA63:Qh8/Zx1H30EKLkm29x3X56
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral1/memory/1740-54-0x0000000000FF0000-0x0000000001DC9000-memory.dmp family_ytstealer behavioral1/memory/1740-57-0x0000000000FF0000-0x0000000001DC9000-memory.dmp family_ytstealer -
resource yara_rule behavioral1/memory/1740-54-0x0000000000FF0000-0x0000000001DC9000-memory.dmp upx behavioral1/memory/1740-57-0x0000000000FF0000-0x0000000001DC9000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1740 38db8f1fab6ff91d80655882acf4ecd85f5c6d525b033a683ab7999d2bb184fe.exe 1740 38db8f1fab6ff91d80655882acf4ecd85f5c6d525b033a683ab7999d2bb184fe.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1740 wrote to memory of 664 1740 38db8f1fab6ff91d80655882acf4ecd85f5c6d525b033a683ab7999d2bb184fe.exe 28 PID 1740 wrote to memory of 664 1740 38db8f1fab6ff91d80655882acf4ecd85f5c6d525b033a683ab7999d2bb184fe.exe 28 PID 1740 wrote to memory of 664 1740 38db8f1fab6ff91d80655882acf4ecd85f5c6d525b033a683ab7999d2bb184fe.exe 28 PID 664 wrote to memory of 1068 664 cmd.exe 30 PID 664 wrote to memory of 1068 664 cmd.exe 30 PID 664 wrote to memory of 1068 664 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\38db8f1fab6ff91d80655882acf4ecd85f5c6d525b033a683ab7999d2bb184fe.exe"C:\Users\Admin\AppData\Local\Temp\38db8f1fab6ff91d80655882acf4ecd85f5c6d525b033a683ab7999d2bb184fe.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\38db8f1fab6ff91d80655882acf4ecd85f5c6d525b033a683ab7999d2bb184fe.exe2⤵
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:1068
-
-