Analysis
-
max time kernel
33s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30-08-2022 01:16
Behavioral task
behavioral1
Sample
13e3a662dca14bc7962cf41c51224bead8722a58000b4b0e2f6e65d420e02d03.exe
Resource
win7-20220812-en
windows7-x64
7 signatures
300 seconds
General
-
Target
13e3a662dca14bc7962cf41c51224bead8722a58000b4b0e2f6e65d420e02d03.exe
-
Size
4.0MB
-
MD5
956a88fae33446099370f3d0f4fb32fc
-
SHA1
a4b17747852605693c5e8589421debda67b3af7b
-
SHA256
13e3a662dca14bc7962cf41c51224bead8722a58000b4b0e2f6e65d420e02d03
-
SHA512
753f8d6ade5e33faa761bc78c1b764bb951e51a41b15a1644615fc3910628ff25b19305a5a86b993aacd860d079278bb3c51a28b44aa1a1a7950c26194c11755
-
SSDEEP
98304:GS/b382lN71hxh3XikxD81cgqGFJo8ntsgy2k7+QN87eLR7ViC:t/L82l1nH3Xi06lqGFJBGgm87eLDi
Malware Config
Signatures
-
YTStealer payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/784-54-0x0000000000810000-0x00000000015E9000-memory.dmp family_ytstealer behavioral1/memory/784-56-0x0000000000810000-0x00000000015E9000-memory.dmp family_ytstealer -
Processes:
resource yara_rule behavioral1/memory/784-54-0x0000000000810000-0x00000000015E9000-memory.dmp upx behavioral1/memory/784-56-0x0000000000810000-0x00000000015E9000-memory.dmp upx -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1020 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
13e3a662dca14bc7962cf41c51224bead8722a58000b4b0e2f6e65d420e02d03.exepid process 784 13e3a662dca14bc7962cf41c51224bead8722a58000b4b0e2f6e65d420e02d03.exe 784 13e3a662dca14bc7962cf41c51224bead8722a58000b4b0e2f6e65d420e02d03.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
13e3a662dca14bc7962cf41c51224bead8722a58000b4b0e2f6e65d420e02d03.execmd.exedescription pid process target process PID 784 wrote to memory of 1020 784 13e3a662dca14bc7962cf41c51224bead8722a58000b4b0e2f6e65d420e02d03.exe cmd.exe PID 784 wrote to memory of 1020 784 13e3a662dca14bc7962cf41c51224bead8722a58000b4b0e2f6e65d420e02d03.exe cmd.exe PID 784 wrote to memory of 1020 784 13e3a662dca14bc7962cf41c51224bead8722a58000b4b0e2f6e65d420e02d03.exe cmd.exe PID 1020 wrote to memory of 520 1020 cmd.exe choice.exe PID 1020 wrote to memory of 520 1020 cmd.exe choice.exe PID 1020 wrote to memory of 520 1020 cmd.exe choice.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\13e3a662dca14bc7962cf41c51224bead8722a58000b4b0e2f6e65d420e02d03.exe"C:\Users\Admin\AppData\Local\Temp\13e3a662dca14bc7962cf41c51224bead8722a58000b4b0e2f6e65d420e02d03.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\13e3a662dca14bc7962cf41c51224bead8722a58000b4b0e2f6e65d420e02d03.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:520