Analysis
-
max time kernel
43s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/08/2022, 01:56
Behavioral task
behavioral1
Sample
6ad8bc7136105d471a876539af977d451f772d9d2c1a301e1866907c9458d28d.exe
Resource
win7-20220812-en
6 signatures
300 seconds
General
-
Target
6ad8bc7136105d471a876539af977d451f772d9d2c1a301e1866907c9458d28d.exe
-
Size
4.0MB
-
MD5
8648d46565f4833d9371229608283074
-
SHA1
434fc1302821ad46941d01981ec7c47b509250ef
-
SHA256
6ad8bc7136105d471a876539af977d451f772d9d2c1a301e1866907c9458d28d
-
SHA512
4a3c95fd78347bfd39fd235452fa3e8b54d6b25fc9f20c94d802c3d0844e558a6023c889d2003d445e8bf518424ef7720bc5a712b7b1ed469bfa48556bef2de8
-
SSDEEP
98304:PuMPstYmbe+0YhlsuTcUhRSkN8bSpAr40ZzdP4q5qLdFe:n2D0MlcUhRSk+Zr405dQOqI
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral1/memory/1736-54-0x0000000000020000-0x0000000000DF9000-memory.dmp family_ytstealer behavioral1/memory/1736-57-0x0000000000020000-0x0000000000DF9000-memory.dmp family_ytstealer -
resource yara_rule behavioral1/memory/1736-54-0x0000000000020000-0x0000000000DF9000-memory.dmp upx behavioral1/memory/1736-57-0x0000000000020000-0x0000000000DF9000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1736 6ad8bc7136105d471a876539af977d451f772d9d2c1a301e1866907c9458d28d.exe 1736 6ad8bc7136105d471a876539af977d451f772d9d2c1a301e1866907c9458d28d.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1736 wrote to memory of 524 1736 6ad8bc7136105d471a876539af977d451f772d9d2c1a301e1866907c9458d28d.exe 28 PID 1736 wrote to memory of 524 1736 6ad8bc7136105d471a876539af977d451f772d9d2c1a301e1866907c9458d28d.exe 28 PID 1736 wrote to memory of 524 1736 6ad8bc7136105d471a876539af977d451f772d9d2c1a301e1866907c9458d28d.exe 28 PID 524 wrote to memory of 1768 524 cmd.exe 30 PID 524 wrote to memory of 1768 524 cmd.exe 30 PID 524 wrote to memory of 1768 524 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\6ad8bc7136105d471a876539af977d451f772d9d2c1a301e1866907c9458d28d.exe"C:\Users\Admin\AppData\Local\Temp\6ad8bc7136105d471a876539af977d451f772d9d2c1a301e1866907c9458d28d.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\6ad8bc7136105d471a876539af977d451f772d9d2c1a301e1866907c9458d28d.exe2⤵
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:1768
-
-