Analysis
-
max time kernel
44s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/08/2022, 01:49
Behavioral task
behavioral1
Sample
5b08e063218b4594107fc3df89fdd21856df8c30578968f0918d8e1b0e059a52.exe
Resource
win7-20220812-en
6 signatures
300 seconds
General
-
Target
5b08e063218b4594107fc3df89fdd21856df8c30578968f0918d8e1b0e059a52.exe
-
Size
4.0MB
-
MD5
4bfc574d33adc8f1338efc458332abf3
-
SHA1
b19fea82232343239776997398871648673cfd6a
-
SHA256
5b08e063218b4594107fc3df89fdd21856df8c30578968f0918d8e1b0e059a52
-
SHA512
5dfcbc60b7e104236cf4f6d2734452ad78361bac9c0ebcb0af37d157b1b8b72f1b54448b7cf743be452c4074f85ab126cd8b3b1d424f81b6024f35d0877a8034
-
SSDEEP
98304:YQgmjyQJ3l9xYCEn3M/PYVd7CLQgDjPQqV/5ya:1EQFl9xtEAulGRDjoqJ5
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral1/memory/1972-54-0x0000000000B30000-0x00000000018F9000-memory.dmp family_ytstealer behavioral1/memory/1972-57-0x0000000000B30000-0x00000000018F9000-memory.dmp family_ytstealer -
resource yara_rule behavioral1/memory/1972-54-0x0000000000B30000-0x00000000018F9000-memory.dmp upx behavioral1/memory/1972-57-0x0000000000B30000-0x00000000018F9000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1972 5b08e063218b4594107fc3df89fdd21856df8c30578968f0918d8e1b0e059a52.exe 1972 5b08e063218b4594107fc3df89fdd21856df8c30578968f0918d8e1b0e059a52.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1972 wrote to memory of 876 1972 5b08e063218b4594107fc3df89fdd21856df8c30578968f0918d8e1b0e059a52.exe 28 PID 1972 wrote to memory of 876 1972 5b08e063218b4594107fc3df89fdd21856df8c30578968f0918d8e1b0e059a52.exe 28 PID 1972 wrote to memory of 876 1972 5b08e063218b4594107fc3df89fdd21856df8c30578968f0918d8e1b0e059a52.exe 28 PID 876 wrote to memory of 524 876 cmd.exe 30 PID 876 wrote to memory of 524 876 cmd.exe 30 PID 876 wrote to memory of 524 876 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b08e063218b4594107fc3df89fdd21856df8c30578968f0918d8e1b0e059a52.exe"C:\Users\Admin\AppData\Local\Temp\5b08e063218b4594107fc3df89fdd21856df8c30578968f0918d8e1b0e059a52.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\5b08e063218b4594107fc3df89fdd21856df8c30578968f0918d8e1b0e059a52.exe2⤵
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:524
-
-