Analysis
-
max time kernel
41s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/08/2022, 02:11
Behavioral task
behavioral1
Sample
9a734074c7190a12a3d0d7f9b163c56660673e932d2f65613ad7e1c04c61adca.exe
Resource
win7-20220812-en
6 signatures
300 seconds
General
-
Target
9a734074c7190a12a3d0d7f9b163c56660673e932d2f65613ad7e1c04c61adca.exe
-
Size
4.0MB
-
MD5
a12744e96bef678dde29ac3537e598fd
-
SHA1
4488277a53b1c5f1660880656f4ddde35765fce0
-
SHA256
9a734074c7190a12a3d0d7f9b163c56660673e932d2f65613ad7e1c04c61adca
-
SHA512
cc77a97b4bcafdb14a2189816d47c10ef960f9ea5eda11073f1e7c2a268dd4b04f37d594f7df46b0fa4eee837ed05fcc1f17c9de90fac9d4a2e42706510bfcc6
-
SSDEEP
98304:W5bt7rKuVksbaPi+4N8O7vBx5KtT9hIwLdXsNWIOLuL6c:mRKuVksbaoN8O7vByLuqcNWtL66c
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral1/memory/2044-54-0x0000000000A80000-0x0000000001849000-memory.dmp family_ytstealer behavioral1/memory/2044-57-0x0000000000A80000-0x0000000001849000-memory.dmp family_ytstealer -
resource yara_rule behavioral1/memory/2044-54-0x0000000000A80000-0x0000000001849000-memory.dmp upx behavioral1/memory/2044-57-0x0000000000A80000-0x0000000001849000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2044 9a734074c7190a12a3d0d7f9b163c56660673e932d2f65613ad7e1c04c61adca.exe 2044 9a734074c7190a12a3d0d7f9b163c56660673e932d2f65613ad7e1c04c61adca.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2044 wrote to memory of 1116 2044 9a734074c7190a12a3d0d7f9b163c56660673e932d2f65613ad7e1c04c61adca.exe 27 PID 2044 wrote to memory of 1116 2044 9a734074c7190a12a3d0d7f9b163c56660673e932d2f65613ad7e1c04c61adca.exe 27 PID 2044 wrote to memory of 1116 2044 9a734074c7190a12a3d0d7f9b163c56660673e932d2f65613ad7e1c04c61adca.exe 27 PID 1116 wrote to memory of 520 1116 cmd.exe 29 PID 1116 wrote to memory of 520 1116 cmd.exe 29 PID 1116 wrote to memory of 520 1116 cmd.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\9a734074c7190a12a3d0d7f9b163c56660673e932d2f65613ad7e1c04c61adca.exe"C:\Users\Admin\AppData\Local\Temp\9a734074c7190a12a3d0d7f9b163c56660673e932d2f65613ad7e1c04c61adca.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\9a734074c7190a12a3d0d7f9b163c56660673e932d2f65613ad7e1c04c61adca.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:520
-
-