Analysis
-
max time kernel
44s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/08/2022, 02:03
Behavioral task
behavioral1
Sample
7de45b5b9c0dfa341a12269f1f700ed5a79ee9ba1a847386ece190c9a0984c77.exe
Resource
win7-20220812-en
6 signatures
300 seconds
General
-
Target
7de45b5b9c0dfa341a12269f1f700ed5a79ee9ba1a847386ece190c9a0984c77.exe
-
Size
4.0MB
-
MD5
9a715d540082ccc793e90343355c3b66
-
SHA1
21b92977e852cbf690385ca705ac48d5794168c0
-
SHA256
7de45b5b9c0dfa341a12269f1f700ed5a79ee9ba1a847386ece190c9a0984c77
-
SHA512
10521cccb9e57b7296e688d654b154cb44951912979981c2a2678549915415ae6e57ba66da323ae966438bbca470108c18a0bf54d8febd42b72aedbe9f7b02e4
-
SSDEEP
98304:b/ppMa1kN/bwERc3/jfLUBAC45rh+GQnkMp6FQw+m9rq:bBmsm/bbc3rfLUBAC4NEHnAt79r
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral1/memory/1816-54-0x0000000001160000-0x0000000001F29000-memory.dmp family_ytstealer behavioral1/memory/1816-57-0x0000000001160000-0x0000000001F29000-memory.dmp family_ytstealer -
resource yara_rule behavioral1/memory/1816-54-0x0000000001160000-0x0000000001F29000-memory.dmp upx behavioral1/memory/1816-57-0x0000000001160000-0x0000000001F29000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1816 7de45b5b9c0dfa341a12269f1f700ed5a79ee9ba1a847386ece190c9a0984c77.exe 1816 7de45b5b9c0dfa341a12269f1f700ed5a79ee9ba1a847386ece190c9a0984c77.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1816 wrote to memory of 1992 1816 7de45b5b9c0dfa341a12269f1f700ed5a79ee9ba1a847386ece190c9a0984c77.exe 27 PID 1816 wrote to memory of 1992 1816 7de45b5b9c0dfa341a12269f1f700ed5a79ee9ba1a847386ece190c9a0984c77.exe 27 PID 1816 wrote to memory of 1992 1816 7de45b5b9c0dfa341a12269f1f700ed5a79ee9ba1a847386ece190c9a0984c77.exe 27 PID 1992 wrote to memory of 1464 1992 cmd.exe 29 PID 1992 wrote to memory of 1464 1992 cmd.exe 29 PID 1992 wrote to memory of 1464 1992 cmd.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\7de45b5b9c0dfa341a12269f1f700ed5a79ee9ba1a847386ece190c9a0984c77.exe"C:\Users\Admin\AppData\Local\Temp\7de45b5b9c0dfa341a12269f1f700ed5a79ee9ba1a847386ece190c9a0984c77.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\7de45b5b9c0dfa341a12269f1f700ed5a79ee9ba1a847386ece190c9a0984c77.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:1464
-
-