Analysis
-
max time kernel
42s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/08/2022, 01:41
Behavioral task
behavioral1
Sample
3fd03e97e6f2458b005bdce0947812b5eba12f37580e4a961730fee4868b0fa4.exe
Resource
win7-20220812-en
6 signatures
300 seconds
General
-
Target
3fd03e97e6f2458b005bdce0947812b5eba12f37580e4a961730fee4868b0fa4.exe
-
Size
4.0MB
-
MD5
23194ead1c594b2fc17bdf0ff9f14e7f
-
SHA1
9ff70e5e430341d34323b180b9ea8de49a3071ee
-
SHA256
3fd03e97e6f2458b005bdce0947812b5eba12f37580e4a961730fee4868b0fa4
-
SHA512
92dc140b35f798bbf944fa2e907e84feb8745bbf59190a5f5b851de14f6d4d546c2d8d6c6525b044d9d5864ceaad17853926d2f16694a5b35e2ce8d15375e361
-
SSDEEP
98304:eUSajavrf7m2MVFjhjGM6w/7bju8VJFHt7SER4iWXO:DSajavfm2MVBhKM1eKwE6iWXO
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral1/memory/1184-54-0x00000000001E0000-0x0000000000FA8000-memory.dmp family_ytstealer behavioral1/memory/1184-57-0x00000000001E0000-0x0000000000FA8000-memory.dmp family_ytstealer -
resource yara_rule behavioral1/memory/1184-54-0x00000000001E0000-0x0000000000FA8000-memory.dmp upx behavioral1/memory/1184-57-0x00000000001E0000-0x0000000000FA8000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1184 3fd03e97e6f2458b005bdce0947812b5eba12f37580e4a961730fee4868b0fa4.exe 1184 3fd03e97e6f2458b005bdce0947812b5eba12f37580e4a961730fee4868b0fa4.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1184 wrote to memory of 364 1184 3fd03e97e6f2458b005bdce0947812b5eba12f37580e4a961730fee4868b0fa4.exe 27 PID 1184 wrote to memory of 364 1184 3fd03e97e6f2458b005bdce0947812b5eba12f37580e4a961730fee4868b0fa4.exe 27 PID 1184 wrote to memory of 364 1184 3fd03e97e6f2458b005bdce0947812b5eba12f37580e4a961730fee4868b0fa4.exe 27 PID 364 wrote to memory of 1804 364 cmd.exe 29 PID 364 wrote to memory of 1804 364 cmd.exe 29 PID 364 wrote to memory of 1804 364 cmd.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\3fd03e97e6f2458b005bdce0947812b5eba12f37580e4a961730fee4868b0fa4.exe"C:\Users\Admin\AppData\Local\Temp\3fd03e97e6f2458b005bdce0947812b5eba12f37580e4a961730fee4868b0fa4.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\3fd03e97e6f2458b005bdce0947812b5eba12f37580e4a961730fee4868b0fa4.exe2⤵
- Suspicious use of WriteProcessMemory
PID:364 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:1804
-
-