Analysis
-
max time kernel
37s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/08/2022, 02:00
Behavioral task
behavioral1
Sample
70d68416e3c45a4e97372123c59b43fcaf5556537c8a725827a93484d5569f5b.exe
Resource
win7-20220812-en
7 signatures
300 seconds
General
-
Target
70d68416e3c45a4e97372123c59b43fcaf5556537c8a725827a93484d5569f5b.exe
-
Size
4.0MB
-
MD5
a3b91b215ed2a17209b8cb630d78ceca
-
SHA1
71c7246123ac052304af7050442bef4aa810d00b
-
SHA256
70d68416e3c45a4e97372123c59b43fcaf5556537c8a725827a93484d5569f5b
-
SHA512
f0c25f247dbad0df5637dae142def8b80747e30353fdc1df8205e3498b08cf6e0447a24b716ec37f7e78f87aeddd2815962ebf7e37fb28fc224bc1a3ccf46001
-
SSDEEP
98304:nteZ9uwGNWxnBjSgIjfNXmcszIiUlfSz3oTpN7CWmcmp8b5bW:teRjxnCbQHzBUZTpN22E8J
Malware Config
Signatures
-
YTStealer payload 1 IoCs
resource yara_rule behavioral1/memory/748-56-0x00000000008E0000-0x00000000016B8000-memory.dmp family_ytstealer -
resource yara_rule behavioral1/memory/748-54-0x00000000008E0000-0x00000000016B8000-memory.dmp upx behavioral1/memory/748-56-0x00000000008E0000-0x00000000016B8000-memory.dmp upx -
Deletes itself 1 IoCs
pid Process 1700 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 748 70d68416e3c45a4e97372123c59b43fcaf5556537c8a725827a93484d5569f5b.exe 748 70d68416e3c45a4e97372123c59b43fcaf5556537c8a725827a93484d5569f5b.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 748 wrote to memory of 1700 748 70d68416e3c45a4e97372123c59b43fcaf5556537c8a725827a93484d5569f5b.exe 28 PID 748 wrote to memory of 1700 748 70d68416e3c45a4e97372123c59b43fcaf5556537c8a725827a93484d5569f5b.exe 28 PID 748 wrote to memory of 1700 748 70d68416e3c45a4e97372123c59b43fcaf5556537c8a725827a93484d5569f5b.exe 28 PID 1700 wrote to memory of 524 1700 cmd.exe 30 PID 1700 wrote to memory of 524 1700 cmd.exe 30 PID 1700 wrote to memory of 524 1700 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\70d68416e3c45a4e97372123c59b43fcaf5556537c8a725827a93484d5569f5b.exe"C:\Users\Admin\AppData\Local\Temp\70d68416e3c45a4e97372123c59b43fcaf5556537c8a725827a93484d5569f5b.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\70d68416e3c45a4e97372123c59b43fcaf5556537c8a725827a93484d5569f5b.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:524
-
-