Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30-08-2022 01:31
Behavioral task
behavioral1
Sample
2ce48756043a29d1bf6cbf7f54a926036b47f29ddcaa22092d56954635086923.exe
Resource
win7-20220812-en
windows7-x64
6 signatures
300 seconds
General
-
Target
2ce48756043a29d1bf6cbf7f54a926036b47f29ddcaa22092d56954635086923.exe
-
Size
4.0MB
-
MD5
5fc1bd2c88e8fc11a9fe98bc9f0e3e12
-
SHA1
af9ad1a74ffd4824eb0ab24729d671305cf9a73a
-
SHA256
2ce48756043a29d1bf6cbf7f54a926036b47f29ddcaa22092d56954635086923
-
SHA512
81ab699bce6d6ad2143dcd0a0ba7a5c9019bf0ce3cea1f618818d6937258097b14c37efeaf6c7ab0b4e51182471317e8f0e3d49e5d673547896c3c3498f42e45
-
SSDEEP
98304:gLePQnw0CRdjmoKDuOhsfG0W+xz7lPHvqhhAJrxPH6LIjjjT1:gyPQnprBBcPPqhhKcI7
Malware Config
Signatures
-
YTStealer payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1764-54-0x0000000000950000-0x0000000001729000-memory.dmp family_ytstealer behavioral1/memory/1764-56-0x0000000000950000-0x0000000001729000-memory.dmp family_ytstealer -
Processes:
resource yara_rule behavioral1/memory/1764-54-0x0000000000950000-0x0000000001729000-memory.dmp upx behavioral1/memory/1764-56-0x0000000000950000-0x0000000001729000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
2ce48756043a29d1bf6cbf7f54a926036b47f29ddcaa22092d56954635086923.exepid process 1764 2ce48756043a29d1bf6cbf7f54a926036b47f29ddcaa22092d56954635086923.exe 1764 2ce48756043a29d1bf6cbf7f54a926036b47f29ddcaa22092d56954635086923.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
2ce48756043a29d1bf6cbf7f54a926036b47f29ddcaa22092d56954635086923.execmd.exedescription pid process target process PID 1764 wrote to memory of 1836 1764 2ce48756043a29d1bf6cbf7f54a926036b47f29ddcaa22092d56954635086923.exe cmd.exe PID 1764 wrote to memory of 1836 1764 2ce48756043a29d1bf6cbf7f54a926036b47f29ddcaa22092d56954635086923.exe cmd.exe PID 1764 wrote to memory of 1836 1764 2ce48756043a29d1bf6cbf7f54a926036b47f29ddcaa22092d56954635086923.exe cmd.exe PID 1836 wrote to memory of 1068 1836 cmd.exe choice.exe PID 1836 wrote to memory of 1068 1836 cmd.exe choice.exe PID 1836 wrote to memory of 1068 1836 cmd.exe choice.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ce48756043a29d1bf6cbf7f54a926036b47f29ddcaa22092d56954635086923.exe"C:\Users\Admin\AppData\Local\Temp\2ce48756043a29d1bf6cbf7f54a926036b47f29ddcaa22092d56954635086923.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\2ce48756043a29d1bf6cbf7f54a926036b47f29ddcaa22092d56954635086923.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:1068