Analysis
-
max time kernel
40s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04-09-2022 04:49
Behavioral task
behavioral1
Sample
b22daf5bfcbdcd0032f07a012e34ee6eb102203963b2f488dd1cf9d14b60550f.exe
Resource
win7-20220812-en
6 signatures
300 seconds
General
-
Target
b22daf5bfcbdcd0032f07a012e34ee6eb102203963b2f488dd1cf9d14b60550f.exe
-
Size
4.0MB
-
MD5
16ff8074ba61c2a46cdb6c72c2c6057d
-
SHA1
5e7c56085209a3190a2a831fffefdeef192a6b25
-
SHA256
b22daf5bfcbdcd0032f07a012e34ee6eb102203963b2f488dd1cf9d14b60550f
-
SHA512
674c22cee088d96d42d43aa7cbd7988c01318a211185be6767e43c50dbdf5e7f0dd9e65be123127744015e17c34415feef727a08f237e350ccd04068ce28ddce
-
SSDEEP
98304:6frhftGYPM0XYf+XVmWMscdmJ6DVAlyW7:6fZ3PMdf88dscd3Vhe
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral1/memory/580-54-0x0000000000300000-0x00000000010D9000-memory.dmp family_ytstealer behavioral1/memory/580-57-0x0000000000300000-0x00000000010D9000-memory.dmp family_ytstealer -
resource yara_rule behavioral1/memory/580-54-0x0000000000300000-0x00000000010D9000-memory.dmp upx behavioral1/memory/580-57-0x0000000000300000-0x00000000010D9000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 580 b22daf5bfcbdcd0032f07a012e34ee6eb102203963b2f488dd1cf9d14b60550f.exe 580 b22daf5bfcbdcd0032f07a012e34ee6eb102203963b2f488dd1cf9d14b60550f.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 580 wrote to memory of 600 580 b22daf5bfcbdcd0032f07a012e34ee6eb102203963b2f488dd1cf9d14b60550f.exe 29 PID 580 wrote to memory of 600 580 b22daf5bfcbdcd0032f07a012e34ee6eb102203963b2f488dd1cf9d14b60550f.exe 29 PID 580 wrote to memory of 600 580 b22daf5bfcbdcd0032f07a012e34ee6eb102203963b2f488dd1cf9d14b60550f.exe 29 PID 600 wrote to memory of 268 600 cmd.exe 31 PID 600 wrote to memory of 268 600 cmd.exe 31 PID 600 wrote to memory of 268 600 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\b22daf5bfcbdcd0032f07a012e34ee6eb102203963b2f488dd1cf9d14b60550f.exe"C:\Users\Admin\AppData\Local\Temp\b22daf5bfcbdcd0032f07a012e34ee6eb102203963b2f488dd1cf9d14b60550f.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:580 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\b22daf5bfcbdcd0032f07a012e34ee6eb102203963b2f488dd1cf9d14b60550f.exe2⤵
- Suspicious use of WriteProcessMemory
PID:600 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:268
-
-