Analysis
-
max time kernel
40s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/08/2022, 02:09
Behavioral task
behavioral1
Sample
8b96d21f211fffee984eef42d1628d9ae416e7c5a609304aa343552b7fa28f59.exe
Resource
win7-20220812-en
7 signatures
300 seconds
General
-
Target
8b96d21f211fffee984eef42d1628d9ae416e7c5a609304aa343552b7fa28f59.exe
-
Size
4.0MB
-
MD5
1b0ca419190ec26ca96315dd0d0c0825
-
SHA1
3dcafee02abd721f026cb7021744931decaffd68
-
SHA256
8b96d21f211fffee984eef42d1628d9ae416e7c5a609304aa343552b7fa28f59
-
SHA512
9348520c149cf78bd4540dd3546d9e1cbdc0835cd8e5fb893cfd2b207ad5bdcd4a9860bbbe713d04ebcbd5865c8170348b9ff5edf3e9d5fffaae338b5d248aba
-
SSDEEP
98304:B7ZwwFFhG5SQ4URNywPeElm46ucNulbTGWqyvko4HcWY:5Zww9GgdURNKt46ucNuVbqIx
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral1/memory/1088-54-0x0000000000F10000-0x0000000001CE9000-memory.dmp family_ytstealer behavioral1/memory/1088-56-0x0000000000F10000-0x0000000001CE9000-memory.dmp family_ytstealer -
resource yara_rule behavioral1/memory/1088-54-0x0000000000F10000-0x0000000001CE9000-memory.dmp upx behavioral1/memory/1088-56-0x0000000000F10000-0x0000000001CE9000-memory.dmp upx -
Deletes itself 1 IoCs
pid Process 900 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1088 8b96d21f211fffee984eef42d1628d9ae416e7c5a609304aa343552b7fa28f59.exe 1088 8b96d21f211fffee984eef42d1628d9ae416e7c5a609304aa343552b7fa28f59.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1088 wrote to memory of 900 1088 8b96d21f211fffee984eef42d1628d9ae416e7c5a609304aa343552b7fa28f59.exe 27 PID 1088 wrote to memory of 900 1088 8b96d21f211fffee984eef42d1628d9ae416e7c5a609304aa343552b7fa28f59.exe 27 PID 1088 wrote to memory of 900 1088 8b96d21f211fffee984eef42d1628d9ae416e7c5a609304aa343552b7fa28f59.exe 27 PID 900 wrote to memory of 572 900 cmd.exe 29 PID 900 wrote to memory of 572 900 cmd.exe 29 PID 900 wrote to memory of 572 900 cmd.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b96d21f211fffee984eef42d1628d9ae416e7c5a609304aa343552b7fa28f59.exe"C:\Users\Admin\AppData\Local\Temp\8b96d21f211fffee984eef42d1628d9ae416e7c5a609304aa343552b7fa28f59.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\8b96d21f211fffee984eef42d1628d9ae416e7c5a609304aa343552b7fa28f59.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:572
-
-