Analysis
-
max time kernel
46s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/08/2022, 02:12
Behavioral task
behavioral1
Sample
9cd0114e305efd2cb1ed5c9c1c0506e2efa6bf2fd67adebb6efdef782f30367f.exe
Resource
win7-20220812-en
6 signatures
300 seconds
General
-
Target
9cd0114e305efd2cb1ed5c9c1c0506e2efa6bf2fd67adebb6efdef782f30367f.exe
-
Size
4.0MB
-
MD5
1a3b4c65dcd974739d4c099e9d796e6e
-
SHA1
8a8fe3f95ef84d05cff232268f5e2d4d2f73f68b
-
SHA256
9cd0114e305efd2cb1ed5c9c1c0506e2efa6bf2fd67adebb6efdef782f30367f
-
SHA512
e5ed9551aff794e2eb09faf9fa8118d04603fe95caf70576de3ed3269ab526a7d008dcf89f74b41b114a8e9467993419360eeeb7606afa879808f276533f1745
-
SSDEEP
98304:QsHyb3HYXR+kWTcDEIkBLrCLj4xl0Uj05mK5oltG7kiR:QsS0jD1kQj4xGUeLc7
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral1/memory/1916-54-0x0000000001270000-0x0000000002039000-memory.dmp family_ytstealer behavioral1/memory/1916-57-0x0000000001270000-0x0000000002039000-memory.dmp family_ytstealer -
resource yara_rule behavioral1/memory/1916-54-0x0000000001270000-0x0000000002039000-memory.dmp upx behavioral1/memory/1916-57-0x0000000001270000-0x0000000002039000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1916 9cd0114e305efd2cb1ed5c9c1c0506e2efa6bf2fd67adebb6efdef782f30367f.exe 1916 9cd0114e305efd2cb1ed5c9c1c0506e2efa6bf2fd67adebb6efdef782f30367f.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1916 wrote to memory of 520 1916 9cd0114e305efd2cb1ed5c9c1c0506e2efa6bf2fd67adebb6efdef782f30367f.exe 27 PID 1916 wrote to memory of 520 1916 9cd0114e305efd2cb1ed5c9c1c0506e2efa6bf2fd67adebb6efdef782f30367f.exe 27 PID 1916 wrote to memory of 520 1916 9cd0114e305efd2cb1ed5c9c1c0506e2efa6bf2fd67adebb6efdef782f30367f.exe 27 PID 520 wrote to memory of 588 520 cmd.exe 29 PID 520 wrote to memory of 588 520 cmd.exe 29 PID 520 wrote to memory of 588 520 cmd.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\9cd0114e305efd2cb1ed5c9c1c0506e2efa6bf2fd67adebb6efdef782f30367f.exe"C:\Users\Admin\AppData\Local\Temp\9cd0114e305efd2cb1ed5c9c1c0506e2efa6bf2fd67adebb6efdef782f30367f.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\9cd0114e305efd2cb1ed5c9c1c0506e2efa6bf2fd67adebb6efdef782f30367f.exe2⤵
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:588
-
-