Analysis
-
max time kernel
44s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/08/2022, 01:56
Behavioral task
behavioral1
Sample
6bf7bef9de2dcf0a7df5bd49ba7e6b96303bde5ebfda923b9b2cb04798be9472.exe
Resource
win7-20220812-en
6 signatures
300 seconds
General
-
Target
6bf7bef9de2dcf0a7df5bd49ba7e6b96303bde5ebfda923b9b2cb04798be9472.exe
-
Size
4.0MB
-
MD5
e548a5db7e04a8627fa928f0cfba8a74
-
SHA1
976591f972e588bee67825fb5dfcaca345c338ba
-
SHA256
6bf7bef9de2dcf0a7df5bd49ba7e6b96303bde5ebfda923b9b2cb04798be9472
-
SHA512
7ddd5fa359007f0085d55f7c6c9b990fd58b00718f2cf7c4b68d63a591a1565281493acf9a35e6e5011b684f49ad665d3c7be0626fa5c55d88b0c3e2c219fc12
-
SSDEEP
98304:wh4c+YXzywFPxMtXtAdAlysz1ZKxk01es3sUODLk2N:C3BjyqPxMtdAdAlysz11e03k2
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral1/memory/1064-54-0x0000000000880000-0x0000000001649000-memory.dmp family_ytstealer behavioral1/memory/1064-57-0x0000000000880000-0x0000000001649000-memory.dmp family_ytstealer -
resource yara_rule behavioral1/memory/1064-54-0x0000000000880000-0x0000000001649000-memory.dmp upx behavioral1/memory/1064-57-0x0000000000880000-0x0000000001649000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1064 6bf7bef9de2dcf0a7df5bd49ba7e6b96303bde5ebfda923b9b2cb04798be9472.exe 1064 6bf7bef9de2dcf0a7df5bd49ba7e6b96303bde5ebfda923b9b2cb04798be9472.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1064 wrote to memory of 284 1064 6bf7bef9de2dcf0a7df5bd49ba7e6b96303bde5ebfda923b9b2cb04798be9472.exe 27 PID 1064 wrote to memory of 284 1064 6bf7bef9de2dcf0a7df5bd49ba7e6b96303bde5ebfda923b9b2cb04798be9472.exe 27 PID 1064 wrote to memory of 284 1064 6bf7bef9de2dcf0a7df5bd49ba7e6b96303bde5ebfda923b9b2cb04798be9472.exe 27 PID 284 wrote to memory of 1476 284 cmd.exe 29 PID 284 wrote to memory of 1476 284 cmd.exe 29 PID 284 wrote to memory of 1476 284 cmd.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\6bf7bef9de2dcf0a7df5bd49ba7e6b96303bde5ebfda923b9b2cb04798be9472.exe"C:\Users\Admin\AppData\Local\Temp\6bf7bef9de2dcf0a7df5bd49ba7e6b96303bde5ebfda923b9b2cb04798be9472.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\6bf7bef9de2dcf0a7df5bd49ba7e6b96303bde5ebfda923b9b2cb04798be9472.exe2⤵
- Suspicious use of WriteProcessMemory
PID:284 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:1476
-
-