Analysis
-
max time kernel
43s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/08/2022, 02:11
Behavioral task
behavioral1
Sample
9799c5284151ae3a2f5bd35ae1312c5af1fe72f444dea624b4339dc8a543b3ae.exe
Resource
win7-20220812-en
7 signatures
300 seconds
General
-
Target
9799c5284151ae3a2f5bd35ae1312c5af1fe72f444dea624b4339dc8a543b3ae.exe
-
Size
4.0MB
-
MD5
df2f938804243b3b2daece0460283185
-
SHA1
c893f0243cf833dc4250234b4dd720ca782ff38e
-
SHA256
9799c5284151ae3a2f5bd35ae1312c5af1fe72f444dea624b4339dc8a543b3ae
-
SHA512
27c412f137ce057523a584383a274e2c0f85aa409284ffa4ccf5e10be4d93b4a6834dcb574209a7497a8d0b5322f0a48ae53aa573c7f1caa45fd352a0c0c0cf8
-
SSDEEP
98304:CmCKE9PtGQyko8YWDmLUrC8NmY62Mtf6lFCnfMv5y6BHAkvJWAf:TDhkoyDmAr6ZAlFSf6ZvJH
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral1/memory/560-54-0x00000000003F0000-0x00000000011C9000-memory.dmp family_ytstealer behavioral1/memory/560-57-0x00000000003F0000-0x00000000011C9000-memory.dmp family_ytstealer -
resource yara_rule behavioral1/memory/560-54-0x00000000003F0000-0x00000000011C9000-memory.dmp upx behavioral1/memory/560-57-0x00000000003F0000-0x00000000011C9000-memory.dmp upx -
Deletes itself 1 IoCs
pid Process 1492 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 560 9799c5284151ae3a2f5bd35ae1312c5af1fe72f444dea624b4339dc8a543b3ae.exe 560 9799c5284151ae3a2f5bd35ae1312c5af1fe72f444dea624b4339dc8a543b3ae.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 560 wrote to memory of 1492 560 9799c5284151ae3a2f5bd35ae1312c5af1fe72f444dea624b4339dc8a543b3ae.exe 29 PID 560 wrote to memory of 1492 560 9799c5284151ae3a2f5bd35ae1312c5af1fe72f444dea624b4339dc8a543b3ae.exe 29 PID 560 wrote to memory of 1492 560 9799c5284151ae3a2f5bd35ae1312c5af1fe72f444dea624b4339dc8a543b3ae.exe 29 PID 1492 wrote to memory of 268 1492 cmd.exe 31 PID 1492 wrote to memory of 268 1492 cmd.exe 31 PID 1492 wrote to memory of 268 1492 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\9799c5284151ae3a2f5bd35ae1312c5af1fe72f444dea624b4339dc8a543b3ae.exe"C:\Users\Admin\AppData\Local\Temp\9799c5284151ae3a2f5bd35ae1312c5af1fe72f444dea624b4339dc8a543b3ae.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\9799c5284151ae3a2f5bd35ae1312c5af1fe72f444dea624b4339dc8a543b3ae.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:268
-
-