Analysis
-
max time kernel
46s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/08/2022, 01:47
Behavioral task
behavioral1
Sample
51a7a812de5da10e17419c51af06c5dc9b24e4ce4bc7625ebdc8972c5f81df6b.exe
Resource
win7-20220812-en
6 signatures
300 seconds
General
-
Target
51a7a812de5da10e17419c51af06c5dc9b24e4ce4bc7625ebdc8972c5f81df6b.exe
-
Size
4.0MB
-
MD5
67d33bde0b55c5894611f6afa3d4f858
-
SHA1
28161d3b9beefb983b20cae8617b33796e2b984e
-
SHA256
51a7a812de5da10e17419c51af06c5dc9b24e4ce4bc7625ebdc8972c5f81df6b
-
SHA512
16f025ae442137f007dc30b1ae4d75cac2f26dea2d2bfbb96113ced1cbde079104dec11d99bc208ad9a8943f5b1dc28a30aae6899b07a7233d023f6c3b5c4996
-
SSDEEP
98304:3Rr8OpkVJOgtpnCUIMK1DOJlwTTGuKqfZ+H4FQFDdrJ9FX:hofVJOgtRJIMGD+uN24QFDd
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral1/memory/1980-54-0x0000000000170000-0x0000000000F49000-memory.dmp family_ytstealer behavioral1/memory/1980-57-0x0000000000170000-0x0000000000F49000-memory.dmp family_ytstealer -
resource yara_rule behavioral1/memory/1980-54-0x0000000000170000-0x0000000000F49000-memory.dmp upx behavioral1/memory/1980-57-0x0000000000170000-0x0000000000F49000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1980 51a7a812de5da10e17419c51af06c5dc9b24e4ce4bc7625ebdc8972c5f81df6b.exe 1980 51a7a812de5da10e17419c51af06c5dc9b24e4ce4bc7625ebdc8972c5f81df6b.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1980 wrote to memory of 1372 1980 51a7a812de5da10e17419c51af06c5dc9b24e4ce4bc7625ebdc8972c5f81df6b.exe 29 PID 1980 wrote to memory of 1372 1980 51a7a812de5da10e17419c51af06c5dc9b24e4ce4bc7625ebdc8972c5f81df6b.exe 29 PID 1980 wrote to memory of 1372 1980 51a7a812de5da10e17419c51af06c5dc9b24e4ce4bc7625ebdc8972c5f81df6b.exe 29 PID 1372 wrote to memory of 1940 1372 cmd.exe 31 PID 1372 wrote to memory of 1940 1372 cmd.exe 31 PID 1372 wrote to memory of 1940 1372 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\51a7a812de5da10e17419c51af06c5dc9b24e4ce4bc7625ebdc8972c5f81df6b.exe"C:\Users\Admin\AppData\Local\Temp\51a7a812de5da10e17419c51af06c5dc9b24e4ce4bc7625ebdc8972c5f81df6b.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\51a7a812de5da10e17419c51af06c5dc9b24e4ce4bc7625ebdc8972c5f81df6b.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:1940
-
-