Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/08/2022, 01:45
Behavioral task
behavioral1
Sample
4ddb26f36c7d56f8ca1699f7078e9479e6fb2d056fa3eb8c9d0298a1a19f9a0f.exe
Resource
win7-20220812-en
6 signatures
300 seconds
General
-
Target
4ddb26f36c7d56f8ca1699f7078e9479e6fb2d056fa3eb8c9d0298a1a19f9a0f.exe
-
Size
4.0MB
-
MD5
ea1d0c47ec3a857f9622b84134daf52e
-
SHA1
6e4b3d0b3d75c259c45630053d4a3f2a6bef7b52
-
SHA256
4ddb26f36c7d56f8ca1699f7078e9479e6fb2d056fa3eb8c9d0298a1a19f9a0f
-
SHA512
71c925f661cce20c27e4c9db9a7fa3f07024616af81eaaab1750e4ae3a645f43cf0bdb9adaa18f01aa9736dd5694e7c5ad03e1f6eef140a8d828d278c6b61145
-
SSDEEP
98304:iI4A7Axh4f/9F5fc6VRjQTzUGLD+EVz7qXxgXsS:Nh7Ax2feKRjUzf5puBgc
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral1/memory/2000-54-0x0000000000E00000-0x0000000001BC8000-memory.dmp family_ytstealer behavioral1/memory/2000-57-0x0000000000E00000-0x0000000001BC8000-memory.dmp family_ytstealer -
resource yara_rule behavioral1/memory/2000-54-0x0000000000E00000-0x0000000001BC8000-memory.dmp upx behavioral1/memory/2000-57-0x0000000000E00000-0x0000000001BC8000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2000 4ddb26f36c7d56f8ca1699f7078e9479e6fb2d056fa3eb8c9d0298a1a19f9a0f.exe 2000 4ddb26f36c7d56f8ca1699f7078e9479e6fb2d056fa3eb8c9d0298a1a19f9a0f.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2000 wrote to memory of 1784 2000 4ddb26f36c7d56f8ca1699f7078e9479e6fb2d056fa3eb8c9d0298a1a19f9a0f.exe 29 PID 2000 wrote to memory of 1784 2000 4ddb26f36c7d56f8ca1699f7078e9479e6fb2d056fa3eb8c9d0298a1a19f9a0f.exe 29 PID 2000 wrote to memory of 1784 2000 4ddb26f36c7d56f8ca1699f7078e9479e6fb2d056fa3eb8c9d0298a1a19f9a0f.exe 29 PID 1784 wrote to memory of 620 1784 cmd.exe 31 PID 1784 wrote to memory of 620 1784 cmd.exe 31 PID 1784 wrote to memory of 620 1784 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ddb26f36c7d56f8ca1699f7078e9479e6fb2d056fa3eb8c9d0298a1a19f9a0f.exe"C:\Users\Admin\AppData\Local\Temp\4ddb26f36c7d56f8ca1699f7078e9479e6fb2d056fa3eb8c9d0298a1a19f9a0f.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\4ddb26f36c7d56f8ca1699f7078e9479e6fb2d056fa3eb8c9d0298a1a19f9a0f.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:620
-
-