Analysis
-
max time kernel
47s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
15-09-2022 03:35
Behavioral task
behavioral1
Sample
d66c835ffce7413ed28d1252c814787083aab6fcdc20df38120b5da13991f9c3.exe
Resource
win7-20220901-en
windows7-x64
6 signatures
300 seconds
General
-
Target
d66c835ffce7413ed28d1252c814787083aab6fcdc20df38120b5da13991f9c3.exe
-
Size
4.0MB
-
MD5
808d028a359d6ff9668e4881fdb28042
-
SHA1
1fec4d3e24d6e54d24b0d716afa7e6435cd92f37
-
SHA256
d66c835ffce7413ed28d1252c814787083aab6fcdc20df38120b5da13991f9c3
-
SHA512
b829c4ab50c5fb0b763b7f8059f062ceec19b78d2f72999cc3876fd038b1249df256a243e661070a5cc047267b5df711d03dc8f959ba1fa56fe6435d86a031e3
-
SSDEEP
98304:MJG5Di+xypFMcj77V9gSF09HdsOn5J8wtK8iij/:MJkXxwFMGfrC9HE/S
Malware Config
Signatures
-
YTStealer payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1204-54-0x00000000011D0000-0x0000000001F99000-memory.dmp family_ytstealer behavioral1/memory/1204-57-0x00000000011D0000-0x0000000001F99000-memory.dmp family_ytstealer -
Processes:
resource yara_rule behavioral1/memory/1204-54-0x00000000011D0000-0x0000000001F99000-memory.dmp upx behavioral1/memory/1204-57-0x00000000011D0000-0x0000000001F99000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
d66c835ffce7413ed28d1252c814787083aab6fcdc20df38120b5da13991f9c3.exepid Process 1204 d66c835ffce7413ed28d1252c814787083aab6fcdc20df38120b5da13991f9c3.exe 1204 d66c835ffce7413ed28d1252c814787083aab6fcdc20df38120b5da13991f9c3.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
d66c835ffce7413ed28d1252c814787083aab6fcdc20df38120b5da13991f9c3.execmd.exedescription pid Process procid_target PID 1204 wrote to memory of 700 1204 d66c835ffce7413ed28d1252c814787083aab6fcdc20df38120b5da13991f9c3.exe 28 PID 1204 wrote to memory of 700 1204 d66c835ffce7413ed28d1252c814787083aab6fcdc20df38120b5da13991f9c3.exe 28 PID 1204 wrote to memory of 700 1204 d66c835ffce7413ed28d1252c814787083aab6fcdc20df38120b5da13991f9c3.exe 28 PID 700 wrote to memory of 1416 700 cmd.exe 30 PID 700 wrote to memory of 1416 700 cmd.exe 30 PID 700 wrote to memory of 1416 700 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\d66c835ffce7413ed28d1252c814787083aab6fcdc20df38120b5da13991f9c3.exe"C:\Users\Admin\AppData\Local\Temp\d66c835ffce7413ed28d1252c814787083aab6fcdc20df38120b5da13991f9c3.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\d66c835ffce7413ed28d1252c814787083aab6fcdc20df38120b5da13991f9c3.exe2⤵
- Suspicious use of WriteProcessMemory
PID:700 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:1416
-
-