Analysis
-
max time kernel
37s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/08/2022, 01:40
Behavioral task
behavioral1
Sample
3e2980f34749013a901ddae7bc1dbd1554fd216fe82fef7c6675285ca8ccae2b.exe
Resource
win7-20220812-en
7 signatures
300 seconds
General
-
Target
3e2980f34749013a901ddae7bc1dbd1554fd216fe82fef7c6675285ca8ccae2b.exe
-
Size
4.0MB
-
MD5
cc0c683485f43904d7b1bee163079def
-
SHA1
b5bdaff75da21e8db009b0450f11f678225d6f8d
-
SHA256
3e2980f34749013a901ddae7bc1dbd1554fd216fe82fef7c6675285ca8ccae2b
-
SHA512
e470f18e3473ffef994ddae3271f2c679c0e91461fddfc9a8cc63d26ba75d681dadee8fe4fcb194506cf834054d264728a406c4b3d52892596e21a4df580a082
-
SSDEEP
98304:q4gr1RUyVlkXIwy7xiu0TzeFJ+UWyHIOFk+VzLWEC4aY:7K2klAykuQaQyHNn5LcY
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral1/memory/1512-54-0x0000000000370000-0x0000000001138000-memory.dmp family_ytstealer behavioral1/memory/1512-56-0x0000000000370000-0x0000000001138000-memory.dmp family_ytstealer -
resource yara_rule behavioral1/memory/1512-54-0x0000000000370000-0x0000000001138000-memory.dmp upx behavioral1/memory/1512-56-0x0000000000370000-0x0000000001138000-memory.dmp upx -
Deletes itself 1 IoCs
pid Process 628 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1512 3e2980f34749013a901ddae7bc1dbd1554fd216fe82fef7c6675285ca8ccae2b.exe 1512 3e2980f34749013a901ddae7bc1dbd1554fd216fe82fef7c6675285ca8ccae2b.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1512 wrote to memory of 628 1512 3e2980f34749013a901ddae7bc1dbd1554fd216fe82fef7c6675285ca8ccae2b.exe 28 PID 1512 wrote to memory of 628 1512 3e2980f34749013a901ddae7bc1dbd1554fd216fe82fef7c6675285ca8ccae2b.exe 28 PID 1512 wrote to memory of 628 1512 3e2980f34749013a901ddae7bc1dbd1554fd216fe82fef7c6675285ca8ccae2b.exe 28 PID 628 wrote to memory of 920 628 cmd.exe 30 PID 628 wrote to memory of 920 628 cmd.exe 30 PID 628 wrote to memory of 920 628 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e2980f34749013a901ddae7bc1dbd1554fd216fe82fef7c6675285ca8ccae2b.exe"C:\Users\Admin\AppData\Local\Temp\3e2980f34749013a901ddae7bc1dbd1554fd216fe82fef7c6675285ca8ccae2b.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\3e2980f34749013a901ddae7bc1dbd1554fd216fe82fef7c6675285ca8ccae2b.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:920
-
-