Analysis
-
max time kernel
44s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/08/2022, 01:24
Behavioral task
behavioral1
Sample
2355cac9561d6844ccaac868419e1f9a6435d545514ad136ea7017461672045a.exe
Resource
win7-20220812-en
6 signatures
300 seconds
General
-
Target
2355cac9561d6844ccaac868419e1f9a6435d545514ad136ea7017461672045a.exe
-
Size
4.0MB
-
MD5
34d22f6a34e8bccdb0023ded74342657
-
SHA1
f98fb8bcc53dc4e8f23fb680a72d672c9846fb99
-
SHA256
2355cac9561d6844ccaac868419e1f9a6435d545514ad136ea7017461672045a
-
SHA512
2ca97a5969ecd147698122a7e26fd240681a9c47ed75b0cae297236a4860e24ce536bdaffe314172e86c96fe93d7e73131eac8359a9c90160645751f92f6d9ce
-
SSDEEP
98304:jkvZeHa0ag/y+1jSwftd73fxhvqTf+9I7QV9J3v1uWaZQ:jkReHa0SoSCnrvif+2uwnG
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral1/memory/840-54-0x0000000000990000-0x0000000001769000-memory.dmp family_ytstealer behavioral1/memory/840-57-0x0000000000990000-0x0000000001769000-memory.dmp family_ytstealer -
resource yara_rule behavioral1/memory/840-54-0x0000000000990000-0x0000000001769000-memory.dmp upx behavioral1/memory/840-57-0x0000000000990000-0x0000000001769000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 840 2355cac9561d6844ccaac868419e1f9a6435d545514ad136ea7017461672045a.exe 840 2355cac9561d6844ccaac868419e1f9a6435d545514ad136ea7017461672045a.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 840 wrote to memory of 1900 840 2355cac9561d6844ccaac868419e1f9a6435d545514ad136ea7017461672045a.exe 28 PID 840 wrote to memory of 1900 840 2355cac9561d6844ccaac868419e1f9a6435d545514ad136ea7017461672045a.exe 28 PID 840 wrote to memory of 1900 840 2355cac9561d6844ccaac868419e1f9a6435d545514ad136ea7017461672045a.exe 28 PID 1900 wrote to memory of 1844 1900 cmd.exe 30 PID 1900 wrote to memory of 1844 1900 cmd.exe 30 PID 1900 wrote to memory of 1844 1900 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2355cac9561d6844ccaac868419e1f9a6435d545514ad136ea7017461672045a.exe"C:\Users\Admin\AppData\Local\Temp\2355cac9561d6844ccaac868419e1f9a6435d545514ad136ea7017461672045a.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\2355cac9561d6844ccaac868419e1f9a6435d545514ad136ea7017461672045a.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:1844
-
-