Analysis
-
max time kernel
42s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30-08-2022 02:01
Behavioral task
behavioral1
Sample
735ee8f8ebddf606592c427924e473c140574193dfc7a11acb9512c1c0f74506.exe
Resource
win7-20220812-en
windows7-x64
6 signatures
300 seconds
General
-
Target
735ee8f8ebddf606592c427924e473c140574193dfc7a11acb9512c1c0f74506.exe
-
Size
4.0MB
-
MD5
ac324bb2898f21a287a68db796110896
-
SHA1
feceb2ca384301006500956215b2f721b11d7685
-
SHA256
735ee8f8ebddf606592c427924e473c140574193dfc7a11acb9512c1c0f74506
-
SHA512
3af870e7c9e747f61c9aa60c3949a38c4a455c0c7101e9db44eb60fb05e92a9bee89456665b70affcfa89f73049a35416a34e6d363dd893b14fd411c2327666a
-
SSDEEP
98304:nQT43T521Tv9vSS/fnLrictcy1JK0/TbzeDQ+rogors:nQ852RNSS/fLrZmSbbaQ+rogo
Malware Config
Signatures
-
YTStealer payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1184-54-0x0000000000020000-0x0000000000DF9000-memory.dmp family_ytstealer behavioral1/memory/1184-57-0x0000000000020000-0x0000000000DF9000-memory.dmp family_ytstealer -
Processes:
resource yara_rule behavioral1/memory/1184-54-0x0000000000020000-0x0000000000DF9000-memory.dmp upx behavioral1/memory/1184-57-0x0000000000020000-0x0000000000DF9000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
735ee8f8ebddf606592c427924e473c140574193dfc7a11acb9512c1c0f74506.exepid process 1184 735ee8f8ebddf606592c427924e473c140574193dfc7a11acb9512c1c0f74506.exe 1184 735ee8f8ebddf606592c427924e473c140574193dfc7a11acb9512c1c0f74506.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
735ee8f8ebddf606592c427924e473c140574193dfc7a11acb9512c1c0f74506.execmd.exedescription pid process target process PID 1184 wrote to memory of 648 1184 735ee8f8ebddf606592c427924e473c140574193dfc7a11acb9512c1c0f74506.exe cmd.exe PID 1184 wrote to memory of 648 1184 735ee8f8ebddf606592c427924e473c140574193dfc7a11acb9512c1c0f74506.exe cmd.exe PID 1184 wrote to memory of 648 1184 735ee8f8ebddf606592c427924e473c140574193dfc7a11acb9512c1c0f74506.exe cmd.exe PID 648 wrote to memory of 636 648 cmd.exe choice.exe PID 648 wrote to memory of 636 648 cmd.exe choice.exe PID 648 wrote to memory of 636 648 cmd.exe choice.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\735ee8f8ebddf606592c427924e473c140574193dfc7a11acb9512c1c0f74506.exe"C:\Users\Admin\AppData\Local\Temp\735ee8f8ebddf606592c427924e473c140574193dfc7a11acb9512c1c0f74506.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\735ee8f8ebddf606592c427924e473c140574193dfc7a11acb9512c1c0f74506.exe2⤵
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:636
-
-