Analysis
-
max time kernel
46s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/08/2022, 01:43
Behavioral task
behavioral1
Sample
4a0800698528e4d9808db95df7e28fe5a9a8e042427ddd59a95947a086693dcd.exe
Resource
win7-20220812-en
6 signatures
300 seconds
General
-
Target
4a0800698528e4d9808db95df7e28fe5a9a8e042427ddd59a95947a086693dcd.exe
-
Size
4.0MB
-
MD5
ceb960702991dd014f338793ac08615a
-
SHA1
cfcf9af9fd3015279d29b2e8f8e2dd0c0884fb5a
-
SHA256
4a0800698528e4d9808db95df7e28fe5a9a8e042427ddd59a95947a086693dcd
-
SHA512
5ff6e6a82d03a64a342c1d29af5eef137b9ebd515f0c01613bf9eddf2dd5da9ba4af2cbfb3154b56c9351372c6e9716adc3b9ea0692b1dd8050fef4b74c6de4d
-
SSDEEP
98304:UgSFMDZvZLVH5b3FON1vbXSwm2vE7gjk14CczPUTEMIOoUG4erhgvdr+3qX7:ZUMlZLDrcN1vbCwvvYggytPDtOoUG4XL
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral1/memory/556-54-0x0000000001090000-0x0000000001E69000-memory.dmp family_ytstealer behavioral1/memory/556-57-0x0000000001090000-0x0000000001E69000-memory.dmp family_ytstealer -
resource yara_rule behavioral1/memory/556-54-0x0000000001090000-0x0000000001E69000-memory.dmp upx behavioral1/memory/556-57-0x0000000001090000-0x0000000001E69000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 556 4a0800698528e4d9808db95df7e28fe5a9a8e042427ddd59a95947a086693dcd.exe 556 4a0800698528e4d9808db95df7e28fe5a9a8e042427ddd59a95947a086693dcd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 556 wrote to memory of 1752 556 4a0800698528e4d9808db95df7e28fe5a9a8e042427ddd59a95947a086693dcd.exe 27 PID 556 wrote to memory of 1752 556 4a0800698528e4d9808db95df7e28fe5a9a8e042427ddd59a95947a086693dcd.exe 27 PID 556 wrote to memory of 1752 556 4a0800698528e4d9808db95df7e28fe5a9a8e042427ddd59a95947a086693dcd.exe 27 PID 1752 wrote to memory of 1860 1752 cmd.exe 29 PID 1752 wrote to memory of 1860 1752 cmd.exe 29 PID 1752 wrote to memory of 1860 1752 cmd.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a0800698528e4d9808db95df7e28fe5a9a8e042427ddd59a95947a086693dcd.exe"C:\Users\Admin\AppData\Local\Temp\4a0800698528e4d9808db95df7e28fe5a9a8e042427ddd59a95947a086693dcd.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\4a0800698528e4d9808db95df7e28fe5a9a8e042427ddd59a95947a086693dcd.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:1860
-
-