Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30-08-2022 01:34
Behavioral task
behavioral1
Sample
30db81495da8ed2569c3d3db00ad3f475b808b1384d8ac1374a30773b9164ed9.exe
Resource
win7-20220812-en
windows7-x64
7 signatures
300 seconds
General
-
Target
30db81495da8ed2569c3d3db00ad3f475b808b1384d8ac1374a30773b9164ed9.exe
-
Size
4.0MB
-
MD5
a35dde4d696eae7395a9770456a2f6d6
-
SHA1
5a351bb8cb5fc5e336faf84094af9aa7bfe12801
-
SHA256
30db81495da8ed2569c3d3db00ad3f475b808b1384d8ac1374a30773b9164ed9
-
SHA512
a4123d86ca313842ed343762319a0c69b4b8e06f29a47ea9cc0019fc4f6240ed7b997145f5b555daf03e22935015b2cc299f3df1bec338151735425b91ec3822
-
SSDEEP
98304:otzxFM8z4xO7C7hTV/V4OoOt6XsWE/wS:otzxFMo4V9V4OoE/
Malware Config
Signatures
-
YTStealer payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/816-54-0x0000000000F50000-0x0000000001D19000-memory.dmp family_ytstealer behavioral1/memory/816-56-0x0000000000F50000-0x0000000001D19000-memory.dmp family_ytstealer -
Processes:
resource yara_rule behavioral1/memory/816-54-0x0000000000F50000-0x0000000001D19000-memory.dmp upx behavioral1/memory/816-56-0x0000000000F50000-0x0000000001D19000-memory.dmp upx -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1320 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
30db81495da8ed2569c3d3db00ad3f475b808b1384d8ac1374a30773b9164ed9.exepid process 816 30db81495da8ed2569c3d3db00ad3f475b808b1384d8ac1374a30773b9164ed9.exe 816 30db81495da8ed2569c3d3db00ad3f475b808b1384d8ac1374a30773b9164ed9.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
30db81495da8ed2569c3d3db00ad3f475b808b1384d8ac1374a30773b9164ed9.execmd.exedescription pid process target process PID 816 wrote to memory of 1320 816 30db81495da8ed2569c3d3db00ad3f475b808b1384d8ac1374a30773b9164ed9.exe cmd.exe PID 816 wrote to memory of 1320 816 30db81495da8ed2569c3d3db00ad3f475b808b1384d8ac1374a30773b9164ed9.exe cmd.exe PID 816 wrote to memory of 1320 816 30db81495da8ed2569c3d3db00ad3f475b808b1384d8ac1374a30773b9164ed9.exe cmd.exe PID 1320 wrote to memory of 636 1320 cmd.exe choice.exe PID 1320 wrote to memory of 636 1320 cmd.exe choice.exe PID 1320 wrote to memory of 636 1320 cmd.exe choice.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\30db81495da8ed2569c3d3db00ad3f475b808b1384d8ac1374a30773b9164ed9.exe"C:\Users\Admin\AppData\Local\Temp\30db81495da8ed2569c3d3db00ad3f475b808b1384d8ac1374a30773b9164ed9.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\30db81495da8ed2569c3d3db00ad3f475b808b1384d8ac1374a30773b9164ed9.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:636