Analysis
-
max time kernel
37s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/08/2022, 01:31
Behavioral task
behavioral1
Sample
2ced681e3ece2aab547683b77b59ac24b72dda095ab37cd4bdbf7de47d9d356a.exe
Resource
win7-20220812-en
6 signatures
300 seconds
General
-
Target
2ced681e3ece2aab547683b77b59ac24b72dda095ab37cd4bdbf7de47d9d356a.exe
-
Size
4.0MB
-
MD5
67891cd60e6fc2e1acbc9fe6dc5ceac9
-
SHA1
374f5e49e0dccc49d4642b055e8554d23f8446d1
-
SHA256
2ced681e3ece2aab547683b77b59ac24b72dda095ab37cd4bdbf7de47d9d356a
-
SHA512
b35da63a7158c33dc13f6144ded2f33f1c83221b8026c05414755fad4d12337e035d9da9f86539c17741451844ddf199d21e3ff046c069ac6e3fbc33b27baf80
-
SSDEEP
98304:0iJhxBxZCW7B7JEcwCH04CZ9KUafpW3BpCTd:08h/xcWtJEcw9/KpfpW3XCT
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral1/memory/748-54-0x0000000000380000-0x0000000001149000-memory.dmp family_ytstealer behavioral1/memory/748-57-0x0000000000380000-0x0000000001149000-memory.dmp family_ytstealer -
resource yara_rule behavioral1/memory/748-54-0x0000000000380000-0x0000000001149000-memory.dmp upx behavioral1/memory/748-57-0x0000000000380000-0x0000000001149000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 748 2ced681e3ece2aab547683b77b59ac24b72dda095ab37cd4bdbf7de47d9d356a.exe 748 2ced681e3ece2aab547683b77b59ac24b72dda095ab37cd4bdbf7de47d9d356a.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 748 wrote to memory of 1700 748 2ced681e3ece2aab547683b77b59ac24b72dda095ab37cd4bdbf7de47d9d356a.exe 28 PID 748 wrote to memory of 1700 748 2ced681e3ece2aab547683b77b59ac24b72dda095ab37cd4bdbf7de47d9d356a.exe 28 PID 748 wrote to memory of 1700 748 2ced681e3ece2aab547683b77b59ac24b72dda095ab37cd4bdbf7de47d9d356a.exe 28 PID 1700 wrote to memory of 1784 1700 cmd.exe 30 PID 1700 wrote to memory of 1784 1700 cmd.exe 30 PID 1700 wrote to memory of 1784 1700 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ced681e3ece2aab547683b77b59ac24b72dda095ab37cd4bdbf7de47d9d356a.exe"C:\Users\Admin\AppData\Local\Temp\2ced681e3ece2aab547683b77b59ac24b72dda095ab37cd4bdbf7de47d9d356a.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\2ced681e3ece2aab547683b77b59ac24b72dda095ab37cd4bdbf7de47d9d356a.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:1784
-
-