Analysis
-
max time kernel
47s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/08/2022, 01:34
Behavioral task
behavioral1
Sample
30b27481f8000aa358881a5d0a60f5eee60ece9ef73765db686e8f3e6a37367e.exe
Resource
win7-20220812-en
6 signatures
300 seconds
General
-
Target
30b27481f8000aa358881a5d0a60f5eee60ece9ef73765db686e8f3e6a37367e.exe
-
Size
4.0MB
-
MD5
9e6c8bc80a0453eb61a1525a5d5256c7
-
SHA1
9e462edc0a9b07d5096fc58a245e4c5430e9212d
-
SHA256
30b27481f8000aa358881a5d0a60f5eee60ece9ef73765db686e8f3e6a37367e
-
SHA512
0094607be9c15aeb5ce325a09825266cc0a542d44d430a8be66e628bcc6a3e19bc4edcb61ce53f14a946015da633778e96c17925b281d3b8edf6aa7cc300e86d
-
SSDEEP
98304:SxflX0KdTxd4THKt2TCXqY/d4iSBYhxH/P15uGUIxMX:qNN4THAIC6Y/iBYnnu7I2
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral1/memory/1176-54-0x0000000000E40000-0x0000000001C18000-memory.dmp family_ytstealer behavioral1/memory/1176-57-0x0000000000E40000-0x0000000001C18000-memory.dmp family_ytstealer -
resource yara_rule behavioral1/memory/1176-54-0x0000000000E40000-0x0000000001C18000-memory.dmp upx behavioral1/memory/1176-57-0x0000000000E40000-0x0000000001C18000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1176 30b27481f8000aa358881a5d0a60f5eee60ece9ef73765db686e8f3e6a37367e.exe 1176 30b27481f8000aa358881a5d0a60f5eee60ece9ef73765db686e8f3e6a37367e.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1176 wrote to memory of 456 1176 30b27481f8000aa358881a5d0a60f5eee60ece9ef73765db686e8f3e6a37367e.exe 27 PID 1176 wrote to memory of 456 1176 30b27481f8000aa358881a5d0a60f5eee60ece9ef73765db686e8f3e6a37367e.exe 27 PID 1176 wrote to memory of 456 1176 30b27481f8000aa358881a5d0a60f5eee60ece9ef73765db686e8f3e6a37367e.exe 27 PID 456 wrote to memory of 668 456 cmd.exe 29 PID 456 wrote to memory of 668 456 cmd.exe 29 PID 456 wrote to memory of 668 456 cmd.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\30b27481f8000aa358881a5d0a60f5eee60ece9ef73765db686e8f3e6a37367e.exe"C:\Users\Admin\AppData\Local\Temp\30b27481f8000aa358881a5d0a60f5eee60ece9ef73765db686e8f3e6a37367e.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\30b27481f8000aa358881a5d0a60f5eee60ece9ef73765db686e8f3e6a37367e.exe2⤵
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:668
-
-