Analysis
-
max time kernel
45s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/08/2022, 02:09
Behavioral task
behavioral1
Sample
8c0391f7670e8328b7c350bd9e144ecab2ab84434b15007b39ecf41d68d854aa.exe
Resource
win7-20220812-en
6 signatures
300 seconds
General
-
Target
8c0391f7670e8328b7c350bd9e144ecab2ab84434b15007b39ecf41d68d854aa.exe
-
Size
4.0MB
-
MD5
46c0d9c4e8db1eaf2687789644d39866
-
SHA1
6f2c69937950d0282b707e9e98247dce569b3fdc
-
SHA256
8c0391f7670e8328b7c350bd9e144ecab2ab84434b15007b39ecf41d68d854aa
-
SHA512
7b7235357b039b8d8e39455982194aba1544684eda6adf72559878fc8ddd33e24ee602f9ee29d89108b42ed9becb175a9d6f58e4a56067a688a999e6219b0f42
-
SSDEEP
98304:P12iEhf20tpcvJRdM+qi0gbGuB9/uFGYUxs15xaCRNL3VIx:PhO2mpcvJRXqHgbhYmGfd3V
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral1/memory/1544-54-0x00000000003A0000-0x0000000001168000-memory.dmp family_ytstealer behavioral1/memory/1544-57-0x00000000003A0000-0x0000000001168000-memory.dmp family_ytstealer -
resource yara_rule behavioral1/memory/1544-54-0x00000000003A0000-0x0000000001168000-memory.dmp upx behavioral1/memory/1544-57-0x00000000003A0000-0x0000000001168000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1544 8c0391f7670e8328b7c350bd9e144ecab2ab84434b15007b39ecf41d68d854aa.exe 1544 8c0391f7670e8328b7c350bd9e144ecab2ab84434b15007b39ecf41d68d854aa.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1544 wrote to memory of 512 1544 8c0391f7670e8328b7c350bd9e144ecab2ab84434b15007b39ecf41d68d854aa.exe 28 PID 1544 wrote to memory of 512 1544 8c0391f7670e8328b7c350bd9e144ecab2ab84434b15007b39ecf41d68d854aa.exe 28 PID 1544 wrote to memory of 512 1544 8c0391f7670e8328b7c350bd9e144ecab2ab84434b15007b39ecf41d68d854aa.exe 28 PID 512 wrote to memory of 1176 512 cmd.exe 30 PID 512 wrote to memory of 1176 512 cmd.exe 30 PID 512 wrote to memory of 1176 512 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c0391f7670e8328b7c350bd9e144ecab2ab84434b15007b39ecf41d68d854aa.exe"C:\Users\Admin\AppData\Local\Temp\8c0391f7670e8328b7c350bd9e144ecab2ab84434b15007b39ecf41d68d854aa.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\8c0391f7670e8328b7c350bd9e144ecab2ab84434b15007b39ecf41d68d854aa.exe2⤵
- Suspicious use of WriteProcessMemory
PID:512 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:1176
-
-