Analysis
-
max time kernel
41s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/08/2022, 01:42
Behavioral task
behavioral1
Sample
45a0ab555680bd5d74472ec1fa7c56092fb2eee5123e35f74b44f807d087e1ef.exe
Resource
win7-20220812-en
7 signatures
300 seconds
General
-
Target
45a0ab555680bd5d74472ec1fa7c56092fb2eee5123e35f74b44f807d087e1ef.exe
-
Size
4.0MB
-
MD5
98d436062464b3b15630ba3e0935d919
-
SHA1
6ba6f6f0ece9507e32cc1a0620253f173f98aa73
-
SHA256
45a0ab555680bd5d74472ec1fa7c56092fb2eee5123e35f74b44f807d087e1ef
-
SHA512
1e8cae5ce8f4833c9517749e799f81677208bc98fdcb8890333a4aafd10ebc0580db7b82a2436c23eab06111e13258889051aec7183d4462f179308ef26a0999
-
SSDEEP
98304:piPfQEDr7CBGZ/j+yhNMWJu4OzzUtuIZqA72M9T2hYN8s:piPfVn/dfMWnOzz2ZFx9ChA8s
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral1/memory/968-54-0x0000000000390000-0x0000000001168000-memory.dmp family_ytstealer behavioral1/memory/968-57-0x0000000000390000-0x0000000001168000-memory.dmp family_ytstealer -
resource yara_rule behavioral1/memory/968-54-0x0000000000390000-0x0000000001168000-memory.dmp upx behavioral1/memory/968-57-0x0000000000390000-0x0000000001168000-memory.dmp upx -
Deletes itself 1 IoCs
pid Process 568 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 968 45a0ab555680bd5d74472ec1fa7c56092fb2eee5123e35f74b44f807d087e1ef.exe 968 45a0ab555680bd5d74472ec1fa7c56092fb2eee5123e35f74b44f807d087e1ef.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 968 wrote to memory of 568 968 45a0ab555680bd5d74472ec1fa7c56092fb2eee5123e35f74b44f807d087e1ef.exe 28 PID 968 wrote to memory of 568 968 45a0ab555680bd5d74472ec1fa7c56092fb2eee5123e35f74b44f807d087e1ef.exe 28 PID 968 wrote to memory of 568 968 45a0ab555680bd5d74472ec1fa7c56092fb2eee5123e35f74b44f807d087e1ef.exe 28 PID 568 wrote to memory of 1992 568 cmd.exe 30 PID 568 wrote to memory of 1992 568 cmd.exe 30 PID 568 wrote to memory of 1992 568 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\45a0ab555680bd5d74472ec1fa7c56092fb2eee5123e35f74b44f807d087e1ef.exe"C:\Users\Admin\AppData\Local\Temp\45a0ab555680bd5d74472ec1fa7c56092fb2eee5123e35f74b44f807d087e1ef.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\45a0ab555680bd5d74472ec1fa7c56092fb2eee5123e35f74b44f807d087e1ef.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:1992
-
-