Analysis
-
max time kernel
44s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30-08-2022 01:19
Behavioral task
behavioral1
Sample
1659eeb159c06e2761484246798274d8f23bcd85d7ba540e758c17d8bb9fb2d6.exe
Resource
win7-20220812-en
windows7-x64
6 signatures
300 seconds
General
-
Target
1659eeb159c06e2761484246798274d8f23bcd85d7ba540e758c17d8bb9fb2d6.exe
-
Size
4.0MB
-
MD5
e04b50e6fce81b98b68e30ee7e9a9824
-
SHA1
14f9087b29c8c95911f9de372e3593644c4cb3ad
-
SHA256
1659eeb159c06e2761484246798274d8f23bcd85d7ba540e758c17d8bb9fb2d6
-
SHA512
b57754f02239b4a8d29f241530ab4b9d3716b0f72d784df65f24785163e92a6e97e028db82c8f8f09a2d08c0302a6473232d637cc63a0068ae606df314f8830d
-
SSDEEP
49152:mJ7UieaIxXXggKAmPZ3EgSRYnQlNFEioYLznwZoqaHFYIUbZI7E6feGVWr09e9L:mB7IxHggKnEBW7io4iiWIUFX96MQeh
Malware Config
Signatures
-
YTStealer payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1980-54-0x0000000000E30000-0x0000000001BF9000-memory.dmp family_ytstealer behavioral1/memory/1980-57-0x0000000000E30000-0x0000000001BF9000-memory.dmp family_ytstealer -
Processes:
resource yara_rule behavioral1/memory/1980-54-0x0000000000E30000-0x0000000001BF9000-memory.dmp upx behavioral1/memory/1980-57-0x0000000000E30000-0x0000000001BF9000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
1659eeb159c06e2761484246798274d8f23bcd85d7ba540e758c17d8bb9fb2d6.exepid process 1980 1659eeb159c06e2761484246798274d8f23bcd85d7ba540e758c17d8bb9fb2d6.exe 1980 1659eeb159c06e2761484246798274d8f23bcd85d7ba540e758c17d8bb9fb2d6.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
1659eeb159c06e2761484246798274d8f23bcd85d7ba540e758c17d8bb9fb2d6.execmd.exedescription pid process target process PID 1980 wrote to memory of 836 1980 1659eeb159c06e2761484246798274d8f23bcd85d7ba540e758c17d8bb9fb2d6.exe cmd.exe PID 1980 wrote to memory of 836 1980 1659eeb159c06e2761484246798274d8f23bcd85d7ba540e758c17d8bb9fb2d6.exe cmd.exe PID 1980 wrote to memory of 836 1980 1659eeb159c06e2761484246798274d8f23bcd85d7ba540e758c17d8bb9fb2d6.exe cmd.exe PID 836 wrote to memory of 2036 836 cmd.exe choice.exe PID 836 wrote to memory of 2036 836 cmd.exe choice.exe PID 836 wrote to memory of 2036 836 cmd.exe choice.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1659eeb159c06e2761484246798274d8f23bcd85d7ba540e758c17d8bb9fb2d6.exe"C:\Users\Admin\AppData\Local\Temp\1659eeb159c06e2761484246798274d8f23bcd85d7ba540e758c17d8bb9fb2d6.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\1659eeb159c06e2761484246798274d8f23bcd85d7ba540e758c17d8bb9fb2d6.exe2⤵
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:2036