Analysis
-
max time kernel
38s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/08/2022, 01:12
Behavioral task
behavioral1
Sample
012004bffb762db987ee4d432d5a45dbbc82b9cd1280b5a0a8daf5a0dc9111f6.exe
Resource
win7-20220812-en
7 signatures
300 seconds
General
-
Target
012004bffb762db987ee4d432d5a45dbbc82b9cd1280b5a0a8daf5a0dc9111f6.exe
-
Size
4.0MB
-
MD5
11e297d097bff88e58835867e494d1a2
-
SHA1
d97bb1ac9a51523e88d81c4784d1357d40402e7c
-
SHA256
012004bffb762db987ee4d432d5a45dbbc82b9cd1280b5a0a8daf5a0dc9111f6
-
SHA512
20b7c28e56e022da450977f8e3a7cd7c5e8e0610419aabc5ba5a6eb9bdf91b6d35f17161e3ba99af1c088fb3081ca236923062d69d6f4fc369f975e807f73cef
-
SSDEEP
98304:3r1poVKykpQU06bbjADiUO1+f0LRssPPyHyRjv2:3rzoVKygS6bbfjAIPyHov
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral1/memory/1612-54-0x0000000001140000-0x0000000001F19000-memory.dmp family_ytstealer behavioral1/memory/1612-56-0x0000000001140000-0x0000000001F19000-memory.dmp family_ytstealer -
resource yara_rule behavioral1/memory/1612-54-0x0000000001140000-0x0000000001F19000-memory.dmp upx behavioral1/memory/1612-56-0x0000000001140000-0x0000000001F19000-memory.dmp upx -
Deletes itself 1 IoCs
pid Process 1120 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1612 012004bffb762db987ee4d432d5a45dbbc82b9cd1280b5a0a8daf5a0dc9111f6.exe 1612 012004bffb762db987ee4d432d5a45dbbc82b9cd1280b5a0a8daf5a0dc9111f6.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1612 wrote to memory of 1120 1612 012004bffb762db987ee4d432d5a45dbbc82b9cd1280b5a0a8daf5a0dc9111f6.exe 27 PID 1612 wrote to memory of 1120 1612 012004bffb762db987ee4d432d5a45dbbc82b9cd1280b5a0a8daf5a0dc9111f6.exe 27 PID 1612 wrote to memory of 1120 1612 012004bffb762db987ee4d432d5a45dbbc82b9cd1280b5a0a8daf5a0dc9111f6.exe 27 PID 1120 wrote to memory of 1748 1120 cmd.exe 29 PID 1120 wrote to memory of 1748 1120 cmd.exe 29 PID 1120 wrote to memory of 1748 1120 cmd.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\012004bffb762db987ee4d432d5a45dbbc82b9cd1280b5a0a8daf5a0dc9111f6.exe"C:\Users\Admin\AppData\Local\Temp\012004bffb762db987ee4d432d5a45dbbc82b9cd1280b5a0a8daf5a0dc9111f6.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\012004bffb762db987ee4d432d5a45dbbc82b9cd1280b5a0a8daf5a0dc9111f6.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:1748
-
-