Analysis
-
max time kernel
41s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30-08-2022 02:00
Behavioral task
behavioral1
Sample
7232f4353c71d5937cac64600fc01804f354603b5d1086921cfda57b0649a1de.exe
Resource
win7-20220812-en
windows7-x64
6 signatures
300 seconds
General
-
Target
7232f4353c71d5937cac64600fc01804f354603b5d1086921cfda57b0649a1de.exe
-
Size
4.0MB
-
MD5
9b38f8f3b26a75b6e13b73a366b61abb
-
SHA1
cc748fb9e5816df5b6e4e5f307bb7b60989c1f9b
-
SHA256
7232f4353c71d5937cac64600fc01804f354603b5d1086921cfda57b0649a1de
-
SHA512
0d15e67c0c07bfe25e41ed35617dfe8cc169edf452559a3212d85f42cd596db0ebe7d060beb2b0b4819db001415cbbcc5057a669776218dc739d66d85cfd046c
-
SSDEEP
98304:MjnOmrXXMvwbxILnJVxeMtfCA9gx7JFTxOBe34N4QtfHewnDM/QJY:MjOGsvw9EnJfCLxmeq1nDM/QJ
Malware Config
Signatures
-
YTStealer payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1668-54-0x0000000000910000-0x00000000016D8000-memory.dmp family_ytstealer behavioral1/memory/1668-57-0x0000000000910000-0x00000000016D8000-memory.dmp family_ytstealer -
Processes:
resource yara_rule behavioral1/memory/1668-54-0x0000000000910000-0x00000000016D8000-memory.dmp upx behavioral1/memory/1668-57-0x0000000000910000-0x00000000016D8000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
7232f4353c71d5937cac64600fc01804f354603b5d1086921cfda57b0649a1de.exepid process 1668 7232f4353c71d5937cac64600fc01804f354603b5d1086921cfda57b0649a1de.exe 1668 7232f4353c71d5937cac64600fc01804f354603b5d1086921cfda57b0649a1de.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
7232f4353c71d5937cac64600fc01804f354603b5d1086921cfda57b0649a1de.execmd.exedescription pid process target process PID 1668 wrote to memory of 1784 1668 7232f4353c71d5937cac64600fc01804f354603b5d1086921cfda57b0649a1de.exe cmd.exe PID 1668 wrote to memory of 1784 1668 7232f4353c71d5937cac64600fc01804f354603b5d1086921cfda57b0649a1de.exe cmd.exe PID 1668 wrote to memory of 1784 1668 7232f4353c71d5937cac64600fc01804f354603b5d1086921cfda57b0649a1de.exe cmd.exe PID 1784 wrote to memory of 1164 1784 cmd.exe choice.exe PID 1784 wrote to memory of 1164 1784 cmd.exe choice.exe PID 1784 wrote to memory of 1164 1784 cmd.exe choice.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7232f4353c71d5937cac64600fc01804f354603b5d1086921cfda57b0649a1de.exe"C:\Users\Admin\AppData\Local\Temp\7232f4353c71d5937cac64600fc01804f354603b5d1086921cfda57b0649a1de.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\7232f4353c71d5937cac64600fc01804f354603b5d1086921cfda57b0649a1de.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:1164
-
-