Analysis
-
max time kernel
47s -
max time network
53s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30-08-2022 02:07
Behavioral task
behavioral1
Sample
842d2cc4d04a5b9bd14eba10eb29476ec4709bb2a7ede0a5056d43a7c086e6af.exe
Resource
win7-20220812-en
windows7-x64
6 signatures
300 seconds
General
-
Target
842d2cc4d04a5b9bd14eba10eb29476ec4709bb2a7ede0a5056d43a7c086e6af.exe
-
Size
4.0MB
-
MD5
1cd70426af9a82a96b94854a228a81c0
-
SHA1
6a381521fb566212a6e87dd3f218b71a9017effb
-
SHA256
842d2cc4d04a5b9bd14eba10eb29476ec4709bb2a7ede0a5056d43a7c086e6af
-
SHA512
c4e4bbaf2b1126ecd5925548ca0638f35cb626ceccbbc455f3c78a88b5d3372a9cd11860e4ca0b2fe312eda5c3442ffc98bc32dae00cd8e179db17ead082b741
-
SSDEEP
98304:vKsjPKYlf+6Nwf/+juH/8uFC+PjJ1LarEoY5FNLB:vKsjPKqwf/d/6+LJ1zF
Malware Config
Signatures
-
YTStealer payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1708-54-0x0000000000BF0000-0x00000000019C9000-memory.dmp family_ytstealer behavioral1/memory/1708-57-0x0000000000BF0000-0x00000000019C9000-memory.dmp family_ytstealer -
Processes:
resource yara_rule behavioral1/memory/1708-54-0x0000000000BF0000-0x00000000019C9000-memory.dmp upx behavioral1/memory/1708-57-0x0000000000BF0000-0x00000000019C9000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
842d2cc4d04a5b9bd14eba10eb29476ec4709bb2a7ede0a5056d43a7c086e6af.exepid process 1708 842d2cc4d04a5b9bd14eba10eb29476ec4709bb2a7ede0a5056d43a7c086e6af.exe 1708 842d2cc4d04a5b9bd14eba10eb29476ec4709bb2a7ede0a5056d43a7c086e6af.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
842d2cc4d04a5b9bd14eba10eb29476ec4709bb2a7ede0a5056d43a7c086e6af.execmd.exedescription pid process target process PID 1708 wrote to memory of 932 1708 842d2cc4d04a5b9bd14eba10eb29476ec4709bb2a7ede0a5056d43a7c086e6af.exe cmd.exe PID 1708 wrote to memory of 932 1708 842d2cc4d04a5b9bd14eba10eb29476ec4709bb2a7ede0a5056d43a7c086e6af.exe cmd.exe PID 1708 wrote to memory of 932 1708 842d2cc4d04a5b9bd14eba10eb29476ec4709bb2a7ede0a5056d43a7c086e6af.exe cmd.exe PID 932 wrote to memory of 1760 932 cmd.exe choice.exe PID 932 wrote to memory of 1760 932 cmd.exe choice.exe PID 932 wrote to memory of 1760 932 cmd.exe choice.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\842d2cc4d04a5b9bd14eba10eb29476ec4709bb2a7ede0a5056d43a7c086e6af.exe"C:\Users\Admin\AppData\Local\Temp\842d2cc4d04a5b9bd14eba10eb29476ec4709bb2a7ede0a5056d43a7c086e6af.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\842d2cc4d04a5b9bd14eba10eb29476ec4709bb2a7ede0a5056d43a7c086e6af.exe2⤵
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:1760
-
-