Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/08/2022, 01:59
Behavioral task
behavioral1
Sample
707ec54aeda2964b06523a949aa7fa0a65c803c9ac048f9424c261007b3d8967.exe
Resource
win7-20220812-en
7 signatures
300 seconds
General
-
Target
707ec54aeda2964b06523a949aa7fa0a65c803c9ac048f9424c261007b3d8967.exe
-
Size
4.0MB
-
MD5
ffffccd1e70c4b9fb98eee125e57f9fb
-
SHA1
d97a24d6b58380b8b89bccd90fbae80ed2a91bad
-
SHA256
707ec54aeda2964b06523a949aa7fa0a65c803c9ac048f9424c261007b3d8967
-
SHA512
9b4cb5144765d1ac52eebe49722c7ce67208536bc584f97f41c62de28584ebd481448cc5502b9a3b17c3bf73531b5b2b91bf723b7a153329dfc488c5c881c6d7
-
SSDEEP
98304:84FJlHKWbazi1dbxGbWqRllYGIxty3TbT4zkxsWLn3YvLtgXn:8azHKWMkv2lmrjeTbkmL3ICX
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral1/memory/1280-54-0x00000000010B0000-0x0000000001E78000-memory.dmp family_ytstealer behavioral1/memory/1280-57-0x00000000010B0000-0x0000000001E78000-memory.dmp family_ytstealer -
resource yara_rule behavioral1/memory/1280-54-0x00000000010B0000-0x0000000001E78000-memory.dmp upx behavioral1/memory/1280-57-0x00000000010B0000-0x0000000001E78000-memory.dmp upx -
Deletes itself 1 IoCs
pid Process 1240 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1280 707ec54aeda2964b06523a949aa7fa0a65c803c9ac048f9424c261007b3d8967.exe 1280 707ec54aeda2964b06523a949aa7fa0a65c803c9ac048f9424c261007b3d8967.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1280 wrote to memory of 1240 1280 707ec54aeda2964b06523a949aa7fa0a65c803c9ac048f9424c261007b3d8967.exe 29 PID 1280 wrote to memory of 1240 1280 707ec54aeda2964b06523a949aa7fa0a65c803c9ac048f9424c261007b3d8967.exe 29 PID 1280 wrote to memory of 1240 1280 707ec54aeda2964b06523a949aa7fa0a65c803c9ac048f9424c261007b3d8967.exe 29 PID 1240 wrote to memory of 1520 1240 cmd.exe 31 PID 1240 wrote to memory of 1520 1240 cmd.exe 31 PID 1240 wrote to memory of 1520 1240 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\707ec54aeda2964b06523a949aa7fa0a65c803c9ac048f9424c261007b3d8967.exe"C:\Users\Admin\AppData\Local\Temp\707ec54aeda2964b06523a949aa7fa0a65c803c9ac048f9424c261007b3d8967.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\707ec54aeda2964b06523a949aa7fa0a65c803c9ac048f9424c261007b3d8967.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:1520
-
-