Analysis
-
max time kernel
39s -
max time network
43s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/08/2022, 01:57
Behavioral task
behavioral1
Sample
6d2496735dc831b335c0e4440ef1ff2ca468e4115c1eec18dd6719a1fc18c3bd.exe
Resource
win7-20220812-en
6 signatures
300 seconds
General
-
Target
6d2496735dc831b335c0e4440ef1ff2ca468e4115c1eec18dd6719a1fc18c3bd.exe
-
Size
4.0MB
-
MD5
ce3e307c0152742b3c2a20060a9053e7
-
SHA1
0eea6a1295e9f2eb2abc0bcf3aa34fc8a8764244
-
SHA256
6d2496735dc831b335c0e4440ef1ff2ca468e4115c1eec18dd6719a1fc18c3bd
-
SHA512
b93f05bdcf098d3e18909980a436abb724dfdfb99eba3a9c08e72c3882f192373a740cd2570458d376bccc19559a6de322f4f9be8482695a7d5a6e410acc7486
-
SSDEEP
98304:wfNEcitJk83NblWe38x4NH2mYBdUfevdB8f5a762XQ8O:wlEcA15+mWmzfevdB8f5a7lXQ8O
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral1/memory/1504-54-0x0000000000890000-0x0000000001658000-memory.dmp family_ytstealer behavioral1/memory/1504-57-0x0000000000890000-0x0000000001658000-memory.dmp family_ytstealer -
resource yara_rule behavioral1/memory/1504-54-0x0000000000890000-0x0000000001658000-memory.dmp upx behavioral1/memory/1504-57-0x0000000000890000-0x0000000001658000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1504 6d2496735dc831b335c0e4440ef1ff2ca468e4115c1eec18dd6719a1fc18c3bd.exe 1504 6d2496735dc831b335c0e4440ef1ff2ca468e4115c1eec18dd6719a1fc18c3bd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1504 wrote to memory of 1772 1504 6d2496735dc831b335c0e4440ef1ff2ca468e4115c1eec18dd6719a1fc18c3bd.exe 27 PID 1504 wrote to memory of 1772 1504 6d2496735dc831b335c0e4440ef1ff2ca468e4115c1eec18dd6719a1fc18c3bd.exe 27 PID 1504 wrote to memory of 1772 1504 6d2496735dc831b335c0e4440ef1ff2ca468e4115c1eec18dd6719a1fc18c3bd.exe 27 PID 1772 wrote to memory of 468 1772 cmd.exe 29 PID 1772 wrote to memory of 468 1772 cmd.exe 29 PID 1772 wrote to memory of 468 1772 cmd.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\6d2496735dc831b335c0e4440ef1ff2ca468e4115c1eec18dd6719a1fc18c3bd.exe"C:\Users\Admin\AppData\Local\Temp\6d2496735dc831b335c0e4440ef1ff2ca468e4115c1eec18dd6719a1fc18c3bd.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\6d2496735dc831b335c0e4440ef1ff2ca468e4115c1eec18dd6719a1fc18c3bd.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:468
-
-