Analysis
-
max time kernel
45s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/08/2022, 02:01
Behavioral task
behavioral1
Sample
760e4cd6277c63927d031900078026a6e6ec7fe51af50be0b49f02623ed93417.exe
Resource
win7-20220812-en
6 signatures
300 seconds
General
-
Target
760e4cd6277c63927d031900078026a6e6ec7fe51af50be0b49f02623ed93417.exe
-
Size
4.0MB
-
MD5
49edb34f7910d34568fc7da6b698c0f1
-
SHA1
f5257bc23a0e0009e83e2c119a1fea520ef0799f
-
SHA256
760e4cd6277c63927d031900078026a6e6ec7fe51af50be0b49f02623ed93417
-
SHA512
0eb6558a689f3032d0d8df3d1844efbcb47c0ea453d216fa4ef0cc7ae2da43287039a5a3fa038edbc0b953f03cd87028425d2c60491f1d26f7218cb1f095f296
-
SSDEEP
98304:T32oYXcI0tyHLoL25BQEM2sQ4rbSkJiLVIbAVpDY2F3:T32dczA8a5BQp2sdrbSbBIb4DY2F
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral1/memory/1848-54-0x0000000000950000-0x0000000001719000-memory.dmp family_ytstealer behavioral1/memory/1848-57-0x0000000000950000-0x0000000001719000-memory.dmp family_ytstealer -
resource yara_rule behavioral1/memory/1848-54-0x0000000000950000-0x0000000001719000-memory.dmp upx behavioral1/memory/1848-57-0x0000000000950000-0x0000000001719000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1848 760e4cd6277c63927d031900078026a6e6ec7fe51af50be0b49f02623ed93417.exe 1848 760e4cd6277c63927d031900078026a6e6ec7fe51af50be0b49f02623ed93417.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1848 wrote to memory of 1932 1848 760e4cd6277c63927d031900078026a6e6ec7fe51af50be0b49f02623ed93417.exe 29 PID 1848 wrote to memory of 1932 1848 760e4cd6277c63927d031900078026a6e6ec7fe51af50be0b49f02623ed93417.exe 29 PID 1848 wrote to memory of 1932 1848 760e4cd6277c63927d031900078026a6e6ec7fe51af50be0b49f02623ed93417.exe 29 PID 1932 wrote to memory of 600 1932 cmd.exe 31 PID 1932 wrote to memory of 600 1932 cmd.exe 31 PID 1932 wrote to memory of 600 1932 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\760e4cd6277c63927d031900078026a6e6ec7fe51af50be0b49f02623ed93417.exe"C:\Users\Admin\AppData\Local\Temp\760e4cd6277c63927d031900078026a6e6ec7fe51af50be0b49f02623ed93417.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\760e4cd6277c63927d031900078026a6e6ec7fe51af50be0b49f02623ed93417.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:600
-
-