Analysis
-
max time kernel
45s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30-08-2022 01:23
Behavioral task
behavioral1
Sample
2039dea342aa1e589203cbfbcda1bb56b8dc9caac73d512ad1be8e61b0bb8398.exe
Resource
win7-20220812-en
windows7-x64
7 signatures
300 seconds
General
-
Target
2039dea342aa1e589203cbfbcda1bb56b8dc9caac73d512ad1be8e61b0bb8398.exe
-
Size
4.0MB
-
MD5
471f775c761f5b6dd31fedc8e3a1350b
-
SHA1
0f9e6515e9364279b63b86b5978c845240f51e9c
-
SHA256
2039dea342aa1e589203cbfbcda1bb56b8dc9caac73d512ad1be8e61b0bb8398
-
SHA512
a63e4219d20cc92197bace9849895ff96e78f85840a1f9c059de12d8797a641801d1b4ed362be83c719259c5dc65b998f77ee4632718454de5d095c74e2112f9
-
SSDEEP
98304:FgPIo5vcyr1SMR2iQ7uxX4hLnApgyZIu7JI7g:Fbo5vt52iQK1qLAGXIJI7
Malware Config
Signatures
-
YTStealer payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1904-54-0x0000000001050000-0x0000000001E29000-memory.dmp family_ytstealer behavioral1/memory/1904-56-0x0000000001050000-0x0000000001E29000-memory.dmp family_ytstealer -
Processes:
resource yara_rule behavioral1/memory/1904-54-0x0000000001050000-0x0000000001E29000-memory.dmp upx behavioral1/memory/1904-56-0x0000000001050000-0x0000000001E29000-memory.dmp upx -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 820 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
2039dea342aa1e589203cbfbcda1bb56b8dc9caac73d512ad1be8e61b0bb8398.exepid process 1904 2039dea342aa1e589203cbfbcda1bb56b8dc9caac73d512ad1be8e61b0bb8398.exe 1904 2039dea342aa1e589203cbfbcda1bb56b8dc9caac73d512ad1be8e61b0bb8398.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
2039dea342aa1e589203cbfbcda1bb56b8dc9caac73d512ad1be8e61b0bb8398.execmd.exedescription pid process target process PID 1904 wrote to memory of 820 1904 2039dea342aa1e589203cbfbcda1bb56b8dc9caac73d512ad1be8e61b0bb8398.exe cmd.exe PID 1904 wrote to memory of 820 1904 2039dea342aa1e589203cbfbcda1bb56b8dc9caac73d512ad1be8e61b0bb8398.exe cmd.exe PID 1904 wrote to memory of 820 1904 2039dea342aa1e589203cbfbcda1bb56b8dc9caac73d512ad1be8e61b0bb8398.exe cmd.exe PID 820 wrote to memory of 1304 820 cmd.exe choice.exe PID 820 wrote to memory of 1304 820 cmd.exe choice.exe PID 820 wrote to memory of 1304 820 cmd.exe choice.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2039dea342aa1e589203cbfbcda1bb56b8dc9caac73d512ad1be8e61b0bb8398.exe"C:\Users\Admin\AppData\Local\Temp\2039dea342aa1e589203cbfbcda1bb56b8dc9caac73d512ad1be8e61b0bb8398.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\2039dea342aa1e589203cbfbcda1bb56b8dc9caac73d512ad1be8e61b0bb8398.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:1304